×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [5]
Authors
ZHOU JIANTAO [2]
VONG CHI MAN [1]
ZHOU YICONG [1]
Document Type
Journal article [3]
Conference paper [2]
Date Issued
2022 [1]
2020 [2]
2016 [1]
2015 [1]
Language
英語English [5]
Source Publication
2015 IEEE Global... [1]
IEEE Transaction... [1]
International Jo... [1]
International Jo... [1]
MM 2015 - Procee... [1]
Indexed By
CPCI-S [2]
SCIE [2]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-5 of 5
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Author Ascending
Author Descending
Title Ascending
Title Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Issue Date Ascending
Issue Date Descending
Submit date Ascending
Submit date Descending
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 8,Page: 4968-4982
Authors:
Hua, Zhongyun
;
Wang, Yanxiang
;
Yi, Shuang
;
Zhou, Yicong
;
Jia, Xiaohua
Favorite
|
|
TC[WOS]:
5
TC[Scopus]:
4
|
Submit date:2022/05/17
Cipher-feedback Secret Sharing
Ciphers
Cloud Computing
Correlation
Cryptography
Encrypted Image
Homomorphic Encryption
Multiple Data Hiders
Prediction Methods
Reversible Data Hiding
Servers
Homo-ELM: fully homomorphic extreme learning machine
Journal article
International Journal of Machine Learning and Cybernetics, 2020,Volume: 11,Issue: 7,Page: 1531-1540
Authors:
Wang,Weiru
;
Gan,Yanfen
;
Vong,Chi Man
;
Chen,Chuangquan
Favorite
|
|
TC[WOS]:
3
TC[Scopus]:
5
|
Submit date:2021/03/11
Encrypted Image Classification
Encrypted Machine Learning
Extreme Learning Machine
Fully Homomorphic Encryption
Privacy Preservation
Homo-ELM: fully homomorphic extreme learning machine
Journal article
International Journal of Machine Learning and Cybernetics (SCI-E), 2020,Page: 1531-1540
Authors:
Wang, W.R.
;
Gan, W.F.
;
Vong, C. M.
;
Chen, C.Q.
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2022/08/09
Encrypted Machine Learning
Fully Homomorphic Encryption
Privacy Preservation
Extreme Learning Machine
Encrypted Image Classification
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique
Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, USA, 14-16 Dec. 2015
Authors:
Yunyu Li
;
Jiantao Zhou
;
Yuanman Li
;
Oscar C. Au
Adobe PDF
|
Favorite
|
|
TC[WOS]:
3
TC[Scopus]:
3
|
Submit date:2018/12/22
Ciphertext Expansion
Homomorphic Encryption
Linear Interpolation
Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion
Conference paper
MM 2015 - Proceedings of the 2015 ACM Multimedia Conference, Brisbane, AUSTRALIA, OCT 26-30, 2015
Authors:
Yunyu Li
;
Jiantao Zhou
;
Yuanman Li
Adobe PDF
|
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
2
|
Submit date:2018/12/22
Image Homomorphic Encryption
Ciphertext Expansion
Ciphertextonly Attack