UM

Browse/Search Results:  1-10 of 14 Help

Selected(0)Clear Items/Page:    Sort:
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds Journal article
IEEE Transactions on Big Data, 2021,Volume: 7,Issue: 4,Page: 717-728
Authors:  Yushu Zhang;  Jiantao Zhou;  Yong Xiang;  Leo Yu Zhang;  Fei Chen;  Shaoning Pang;  Xiaofeng Liao
Adobe PDF | Favorite |  | TC[WOS]:5 TC[Scopus]:5 | Submit date:2019/04/16
Parallel Compressive Sensing  Sparse Robustness Decoding Service  Packet-loss  Cloud Computing  
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:10 TC[Scopus]:11 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud Journal article
Information Sciences, 2019,Volume: 496,Page: 150-160
Authors:  Yushu Zhang;  Yong Xiang;  Leo Yu Zhang;  Lu-Xing Yang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:15 TC[Scopus]:16 | Submit date:2021/03/11
Asymmetric Verification  Cloud Computing  Compressed Sensing  Compressed Sensing Reconstruction Outsourcing  
Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF) Journal article
IEEE Transactions on Services Computing, 2019,Volume: 14,Issue: 6,Page: 1940-1953
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:6 TC[Scopus]:5 | Submit date:2022/07/07
Robust privacy-Preserving image sharing over online social networks (OSNs) Journal article
ACM Transactions on Multimedia Computing, Communications and Applications, 2018,Volume: 14,Issue: 1
Authors:  Weiwei Sun;  JIANTAO ZHOU;  SHUYUAN ZHU;  YUAN YAN TANG
Adobe PDF | Favorite |  | TC[WOS]:9 TC[Scopus]:14 | Submit date:2021/03/11
Image Sharing  Jpeg  Online Social Networks  Privacy-preserving  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
INFORMATION SCIENCES, 2017,Volume: 430,Page: 228-239
Authors:  Leo Yu Zhang;  Yuansheng Liu;  Cong Wang;  Jiantao Zhou;  Yushu Zhang;  Guanrong Chen
Adobe PDF | Favorite |  | TC[WOS]:39 TC[Scopus]:41 | Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
Bi-level protected compressive sampling Journal article
IEEE Transactions on Multimedia, 2016,Volume: 18,Issue: 9,Page: 1720-1732
Authors:  Leo Yu Zhang;  Kwok-Wo Wong;  Yushu Zhang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:64 TC[Scopus]:64 | Submit date:2018/12/22
Compressive Sampling (Cs)  Encryption  Known/chosen-plaintext Attack  Random Projection  Restricted Isometry Property (Rip)  
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Adobe PDF | Favorite |  | TC[WOS]:130 TC[Scopus]:141 | Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics  
Embedding cryptographic features in compressive sensing Journal article
Neurocomputing, 2016,Volume: 205,Page: 472
Authors:  Yushu Zhang;  Jiantao Zhou;  Fei Chen;  Leo Yu Zhang;  Kwok-Wo Wong;  Xing He;  Di Xiao
Adobe PDF | Favorite |  | TC[WOS]:77 TC[Scopus]:92 | Submit date:2018/10/30
Parallel Compressive Sensing  Random Permutation  Secure Compressive Sensing  Symmetric-key Cipher  
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, USA, 14-16 Dec. 2015
Authors:  Yunyu Li;  Jiantao Zhou;  Yuanman Li;  Oscar C. Au
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2018/12/22
Ciphertext Expansion  Homomorphic Encryption  Linear Interpolation