×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [85]
INSTITUTE OF AP... [11]
INSTITUTE OF COL... [2]
STANLEY HO EAST ... [1]
Authors
ZHOU YICONG [39]
ZHOU JIANTAO [31]
CHEN CHUN LUNG ... [11]
LIU HONGCHAO [7]
PUN CHI MAN [5]
TAM LAP MOU [2]
More...
Document Type
Journal article [74]
Conference pape... [27]
Patent [2]
Project [1]
Date Issued
2022 [8]
2021 [13]
2020 [11]
2019 [7]
2018 [7]
2017 [12]
More...
Language
英語English [102]
Source Publication
Information Sci... [11]
Signal Processi... [11]
IEEE Transaction... [6]
Optics Express [6]
Conference Proce... [5]
IEEE Transaction... [3]
More...
Indexed By
SCIE [70]
CPCI-S [11]
CPCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 104
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
n-Dimensional Chaotic Map with application in secure communication
Journal article
Chaos, Solitons and Fractals, 2022,Volume: 163
Authors:
Cao, Weijia
;
Cai, Hang
;
Hua, Zhongyun
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2022/11/07
Chaotic Map
Chaotic System
Image Encryption
Lyapunov Exponent
Secure Communication
Algorithm-Dependent Computational Ghost Encryption and Imaging
Journal article
Physical Review Applied, 2022,Volume: 18,Issue: 3
Authors:
Xiong, Jiahao
;
Zheng, Peixia
;
Gao, Zihan
;
Liu, Hong Chao
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
1
|
Submit date:2022/10/06
Computational ghost imaging encryption with a pattern compression from 3D to 0D
Journal article
Optics Express, 2022,Volume: 30,Issue: 12,Page: 21866-21875
Authors:
Zheng, Peixia
;
Ye, Zhiyuan
;
Xiong, Jun
;
Liu, Hong Chao
Favorite
|
|
TC[WOS]:
2
TC[Scopus]:
1
|
Submit date:2022/08/02
Privacy-preserving and verifiable deep learning inference based on secret sharing
Journal article
Neurocomputing, 2022,Volume: 483,Page: 221-234
Authors:
Duan, Jia
;
Zhou, Jiantao
;
Li, Yuanman
;
Huang, Caishi
Adobe PDF
|
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
3
|
Submit date:2022/05/04
Deep Learning Prediction
Deep Neural Network Inference
Privacy-preserving
Secure Multi-party Computation
Verifiable Computation
Anti-loss-compression image encryption based on computational ghost imaging using discrete cosine transform and orthogonal patterns
Journal article
Optics Express, 2022,Volume: 30,Issue: 9,Page: 14073-14087
Authors:
Liu, Yichen
;
Zheng, Peixia
;
Liu, Hong Chao
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
3
|
Submit date:2022/05/04
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation
Journal article
IEEE Transactions on Dependable and Secure Computing, 2022,Volume: 19,Issue: 2,Page: 1382-1394
Authors:
Liu, Zi Long
;
Pun, Chi Man
Favorite
|
|
TC[WOS]:
8
TC[Scopus]:
10
|
Submit date:2022/05/17
Chunk Encryption
Encrypted Image
Redundancy Matrix Representation
Reversible Data Hiding
Sampling expansions associated with quaternion difference equations
Journal article
Linear and Multilinear Algebra, 2022
Authors:
Cheng, Dong
;
Kou, Kit Ian
;
Xia, Yonghui
;
Xu, Junfeng
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2022/08/05
11r52
12e05
39a12
41a05
Interpolation
Quaternion Difference Equations
Quaternion Polynomials
Sampling Expansions
Tridiagonal Matrices
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 8,Page: 4968-4982
Authors:
Hua, Zhongyun
;
Wang, Yanxiang
;
Yi, Shuang
;
Zhou, Yicong
;
Jia, Xiaohua
Favorite
|
|
TC[WOS]:
5
TC[Scopus]:
4
|
Submit date:2022/05/17
Cipher-feedback Secret Sharing
Ciphers
Cloud Computing
Correlation
Cryptography
Encrypted Image
Homomorphic Encryption
Multiple Data Hiders
Prediction Methods
Reversible Data Hiding
Servers
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2021,Volume: 31,Issue: 12,Page: 4747-4758
Authors:
Chen, Junxin
;
Zhang, Leo Yu
;
Zhou, Yicong
Favorite
|
|
TC[WOS]:
3
TC[Scopus]:
4
|
Submit date:2022/01/14
Bitwise Exclusive Or
Cryptanalysis
Image Encryption
Modulo Addition
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking
Journal article
Signal Processing, 2021,Volume: 189
Authors:
Liu, Xilin
;
Wu, Yongfei
;
Zhang, Hao
;
Wu, Jiasong
;
Zhang, Liming
Favorite
|
|
TC[WOS]:
10
TC[Scopus]:
13
|
Submit date:2022/05/13
Color Image Encryption
Color Image Watermarking
Quaternion Discrete Fractional Krawtchouk Transform