UM

Browse/Search Results:  1-10 of 23 Help

Selected(0)Clear Items/Page:    Sort:
Compressive Imaging Encryption with Secret Sharing Metasurfaces Journal article
Advanced Optical Materials, 2022,Volume: 10,Issue: 15
Authors:  Zheng, Peixia;  Li, Jiaxin;  Li, Zile;  Ge, Mingzheng;  Zhang, Shuang;  Zheng, Guoxing;  Liu, Hong Chao
Favorite |  | TC[WOS]:1 TC[Scopus]:4 | Submit date:2022/08/05
Computational Ghost Imaging  Metasurface Holography  Visual Cryptography  
Privacy-preserving and verifiable deep learning inference based on secret sharing Journal article
Neurocomputing, 2022,Volume: 483,Page: 221-234
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman;  Huang, Caishi
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/04
Deep Learning Prediction  Deep Neural Network Inference  Privacy-preserving  Secure Multi-party Computation  Verifiable Computation  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
IEEE Transactions on Dependable and Secure Computing, 2021,Volume: 18,Issue: 3,Page: 1261-1275
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:8 TC[Scopus]:9 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Detecting online counterfeit-goods seller using connection discovery Journal article
ACM Transactions on Multimedia Computing, Communications and Applications, 2019,Volume: 15,Issue: 2
Authors:  MING CHEUNG;  JAMES SHE;  WEIWEI SUN;  JIANTAO ZHOU
Adobe PDF | Favorite |  | TC[WOS]:2 TC[Scopus]:3 | Submit date:2021/03/11
Counterfeit Seller Detection  Deep Learning  Social Network  
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud Journal article
Information Sciences, 2019,Volume: 496,Page: 150-160
Authors:  Yushu Zhang;  Yong Xiang;  Leo Yu Zhang;  Lu-Xing Yang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:16 TC[Scopus]:17 | Submit date:2021/03/11
Asymmetric Verification  Cloud Computing  Compressed Sensing  Compressed Sensing Reconstruction Outsourcing  
Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF) Journal article
IEEE Transactions on Services Computing, 2019,Volume: 14,Issue: 6,Page: 1940-1953
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:6 TC[Scopus]:6 | Submit date:2022/07/07
A Robust Secret Sharing QR Code via Texture Pattern Design Conference paper
Proceedings, APSIPA Annual Summit and Conference,2018, Honolulu, HI, USA, 12-15 November 2018
Authors:  Xin Zhang;  Jia Duan;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:2 TC[Scopus]:0 | Submit date:2019/04/17
Optimal LSBs-based quantum watermarking with lower distortion Journal article
International Journal of Quantum Information, 2018,Volume: 16,Issue: 7
Authors:  Zhou R.-G.;  Hu W.W.;  Luo G.F.;  Fan P.;  Ian H.
Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2019/04/08
Computational Complexity  Lsbs Steganography  Optimal Lsbs Based  Quantum Watermarking  Visual Effect  
Robust privacy-Preserving image sharing over online social networks (OSNs) Journal article
ACM Transactions on Multimedia Computing, Communications and Applications, 2018,Volume: 14,Issue: 1
Authors:  Weiwei Sun;  JIANTAO ZHOU;  SHUYUAN ZHU;  YUAN YAN TANG
Adobe PDF | Favorite |  | TC[WOS]:9 TC[Scopus]:14 | Submit date:2021/03/11
Image Sharing  Jpeg  Online Social Networks  Privacy-preserving  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
IEEE Transactions on Image Processing, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:37 TC[Scopus]:43 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption