×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [17]
Authors
ZHOU JIANTAO [5]
ZHOU YICONG [5]
PUN CHI MAN [3]
VONG CHI MAN [2]
WONG PAK KIN [1]
Document Type
Journal article [14]
Conference paper [3]
Date Issued
2022 [2]
2020 [2]
2019 [2]
2018 [1]
2017 [4]
2015 [4]
More...
Language
英語English [17]
Source Publication
IEEE Transaction... [2]
IEEE Transaction... [2]
Information Scie... [2]
Signal Processin... [2]
2014 IEEE Intern... [1]
IEEE Internation... [1]
More...
Indexed By
SCIE [14]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 17
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation
Journal article
IEEE Transactions on Dependable and Secure Computing, 2022,Volume: 19,Issue: 2,Page: 1382-1394
Authors:
Liu, Zi Long
;
Pun, Chi Man
Favorite
|
|
TC[WOS]:
8
TC[Scopus]:
10
|
Submit date:2022/05/17
Chunk Encryption
Encrypted Image
Redundancy Matrix Representation
Reversible Data Hiding
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 8,Page: 4968-4982
Authors:
Hua, Zhongyun
;
Wang, Yanxiang
;
Yi, Shuang
;
Zhou, Yicong
;
Jia, Xiaohua
Favorite
|
|
TC[WOS]:
5
TC[Scopus]:
4
|
Submit date:2022/05/17
Cipher-feedback Secret Sharing
Ciphers
Cloud Computing
Correlation
Cryptography
Encrypted Image
Homomorphic Encryption
Multiple Data Hiders
Prediction Methods
Reversible Data Hiding
Servers
Homo-ELM: fully homomorphic extreme learning machine
Journal article
International Journal of Machine Learning and Cybernetics, 2020,Volume: 11,Issue: 7,Page: 1531-1540
Authors:
Wang,Weiru
;
Gan,Yanfen
;
Vong,Chi Man
;
Chen,Chuangquan
Favorite
|
|
TC[WOS]:
3
TC[Scopus]:
5
|
Submit date:2021/03/11
Encrypted Image Classification
Encrypted Machine Learning
Extreme Learning Machine
Fully Homomorphic Encryption
Privacy Preservation
Homo-ELM: fully homomorphic extreme learning machine
Journal article
International Journal of Machine Learning and Cybernetics (SCI-E), 2020,Page: 1531-1540
Authors:
Wang, W.R.
;
Gan, W.F.
;
Vong, C. M.
;
Chen, C.Q.
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2022/08/09
Encrypted Machine Learning
Fully Homomorphic Encryption
Privacy Preservation
Extreme Learning Machine
Encrypted Image Classification
Reversible image reconstruction for reversible data hiding in encrypted images
Journal article
Signal Processing, 2019,Volume: 161,Page: 50-62
Authors:
Liu,Zi Long
;
Pun,Chi Man
Favorite
|
|
TC[WOS]:
11
TC[Scopus]:
11
|
Submit date:2021/03/11
Encrypted Image
Reversible Data Hiding
Reversible Image Reconstruction
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding
Conference paper
IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, Japan, 7-10 Oct. 2018
Authors:
Shuang Yi
;
Yicong Zhou
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
2
|
Submit date:2019/03/26
Reversible Data Hiding
Encrypted Image
Prediction-error Encoding
Weighted Checkerboard-based Prediction Privacy Protection
Adaptive code embedding for reversible data hiding in encrypted images
Conference paper
Proceedings - International Conference on Image Processing, ICIP, Beijing, PEOPLES R CHINA, SEP 17-20, 2017
Authors:
Yi Shuang
;
Zhou Yicong
Favorite
|
|
TC[WOS]:
3
TC[Scopus]:
7
|
Submit date:2018/12/21
Adaptive Code Embedding
Encrypted Image
Privacy Protection
Reversible Data Hiding
Reversible data-hiding in encrypted images by redundant space transfer
Journal article
Information Sciences, 2017,Volume: 433,Page: 188-203
Authors:
Zi-Long Liu
;
Chi-Man Pun
Favorite
|
|
TC[WOS]:
65
TC[Scopus]:
83
|
Submit date:2019/07/30
Reversible Data Hiding
Encrypted Image
Redundant Space Transfer
Encrypted image classification based on multilayer extreme learning machine
Journal article
Multidimensional Systems and Signal Processing (SCI-E), 2017,Page: 851-865
Authors:
Wang, W.
;
Vong, C. M.
;
Yang, Y.
;
Wong, P. K.
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2022/08/09
Encrypted image classification
Privacy preservation
Multi layer extreme learning machine
ELM auto encoder
Encrypted image classification based on multilayer extreme learning machine
Journal article
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017,Volume: 28,Issue: 3,Page: 851-865
Authors:
Wang, Weiru
;
Vong, Chi-Man
;
Yang, Yilong
;
Wong, Pak-Kin
Favorite
|
|
TC[WOS]:
18
TC[Scopus]:
20
|
Submit date:2018/10/30
Encrypted Image Classification
Privacy Preservation
Multi Layer Extreme Learning Machine
Elm Auto Encoder