UM

Browse/Search Results:  1-10 of 12 Help

Selected(0)Clear Items/Page:    Sort:
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds Journal article
IEEE Transactions on Big Data, 2021,Volume: 7,Issue: 4,Page: 717-728
Authors:  Yushu Zhang;  Jiantao Zhou;  Yong Xiang;  Leo Yu Zhang;  Fei Chen;  Shaoning Pang;  Xiaofeng Liao
Adobe PDF | Favorite |  | TC[WOS]:5 TC[Scopus]:5 | Submit date:2019/04/16
Parallel Compressive Sensing  Sparse Robustness Decoding Service  Packet-loss  Cloud Computing  
Bi-level protected compressive sampling Journal article
IEEE Transactions on Multimedia, 2016,Volume: 18,Issue: 9,Page: 1720-1732
Authors:  Leo Yu Zhang;  Kwok-Wo Wong;  Yushu Zhang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:64 TC[Scopus]:64 | Submit date:2018/12/22
Compressive Sampling (Cs)  Encryption  Known/chosen-plaintext Attack  Random Projection  Restricted Isometry Property (Rip)  
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Adobe PDF | Favorite |  | TC[WOS]:130 TC[Scopus]:142 | Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics  
Embedding cryptographic features in compressive sensing Journal article
Neurocomputing, 2016,Volume: 205,Page: 472-480
Authors:  Yushu Zhang;  Jiantao Zhou;  Fei Chen;  Leo Yu Zhang;  Kwok-Wo Wong;  Xing He;  Di Xiao
Adobe PDF | Favorite |  | TC[WOS]:77 TC[Scopus]:93 | Submit date:2018/10/30
Parallel Compressive Sensing  Random Permutation  Secure Compressive Sensing  Symmetric-key Cipher  
Support-Set-Assured parallel outsourcing of sparse reconstruction service for compressive sensing in multi-clouds Conference paper
Proceedings - 2015 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, Hangzhou, China, 16-18 Nov. 2015
Authors:  Yushu Zhang;  Jiantao Zhou;  Leo Yu Zhang;  Fei Chen;  Xinyu Lei
Adobe PDF | Favorite |  | TC[WOS]:7 TC[Scopus]:11 | Submit date:2018/12/22
Compressive Sensing  Parallel Outsourcing  Sparse Reconstruction Service  Support-set  
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization Journal article
Security and Communication Networks, 2015,Volume: 9,Issue: 1,Page: 43-53
Authors:  Yushu Zhang;  Di Xiao;  Kwok-Wo Wong;  Jiantao Zhou;  Sen Bai;  Moting Su
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2018/12/22
Arithmetic Coding  Chaotic Map  Joint Compression And Encryption  Perturbation  
Robust coding of encrypted images via structural matrix Journal article
Signal Processing: Image Communication, 2015,Volume: 39,Page: 202-211
Authors:  Yushu Zhang;  Kwok-Wo Wong;  Leo Yu Zhang;  Wenying Wen;  Jiantao Zhou;  Xing He
Adobe PDF | Favorite |  | TC[WOS]:16 TC[Scopus]:20 | Submit date:2018/12/22
Multiple Description Code  Packet Loss  Robust Coding Of Encrypted Image  Structural Matrix  
Secure reversible image data hiding over encrypted domain via key modulation Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2015,Volume: 26,Issue: 3,Page: 441-452
Authors:  Jiantao Zhou;  Weiwei Sun;  Li Dong;  Xianming Liu;  Oscar C. Au;  Yuan Yan Tang
Adobe PDF | Favorite |  | TC[WOS]:115 TC[Scopus]:151 | Submit date:2021/03/11
Feature Extraction  Reversible Image Data Hiding (Ridh)  Signal Processing Over Encrypted Domain  Svm  
Scalable compression of stream cipher encrypted images through context-adaptive sampling Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 11,Page: 1857-1868
Authors:  Jiantao Zhou;  Oscar C. Au;  Guangtao Zhai;  Yuan Yan Tang;  Xianming Liu
Adobe PDF | Favorite |  | TC[WOS]:23 TC[Scopus]:33 | Submit date:2021/03/11
Adaptive Sampling  Image Compression  Scalable Coding  Signal ProcessIng In Encrypted domaIn  
Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation Journal article
IEEE Transactions on Information Forensics and Security, 2013,Volume: 9,Issue: 1,Page: 39-50
Authors:  Jiantao Zhou;  Xianming Liu;  Oscar C. Au;  Yuan Yan Tang
Adobe PDF | Favorite |  | TC[WOS]:96 TC[Scopus]:126 | Submit date:2018/10/30
Compression Of Encrypted Image  Encrypted Domain Signal Processing