UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
Hua, Zhongyun, Wang, Yanxiang, Yi, Shuang, Zhou, Yicong, Jia, Xiaohua. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32(8), 4968-4982.
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite | TC[WOS]:32 TC[Scopus]:44  IF:8.3/7.1 | Submit date:2022/05/17
Reversible Data Hiding  Cipher-feedback Secret Sharing  Encrypted Image  Multiple Data Hiders  
Throughput Optimization in WLAN/Cellular Integrated Network Using Partially Overlapped Channels Journal article
Li, Jiayue, Cheng, Tracy Yingying, Jia, Xiaohua, Ni, Lionel M.. Throughput Optimization in WLAN/Cellular Integrated Network Using Partially Overlapped Channels[J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17(1), 157-169.
Authors:  Li, Jiayue;  Cheng, Tracy Yingying;  Jia, Xiaohua;  Ni, Lionel M.
Favorite | TC[WOS]:7 TC[Scopus]:8  IF:8.9/8.6 | Submit date:2018/10/30
Wlan/cellular Integrated Network  Lte-advanced  Ieee 802.11ac  Throughput Optimization  Partially Overlapped Channels  
Heuristic token selection for total order reliable multicast communication Conference paper
Jia Weijia, Cao Jiannong, Jia Xiaohua. Heuristic token selection for total order reliable multicast communication[C], 1997, 61-68.
Authors:  Jia Weijia;  Cao Jiannong;  Jia Xiaohua
Favorite |  | Submit date:2019/02/11
Implementation of efficient and reliable multicast servers Conference paper
Jia Weijia, Lee Chan H., Jia Xiaohua, Cao Jiannong. Implementation of efficient and reliable multicast servers[C], 1997, 253-260.
Authors:  Jia Weijia;  Lee Chan H.;  Jia Xiaohua;  Cao Jiannong
Favorite |  | Submit date:2019/02/11
Design and analysis of an efficient algorithm for coordinated checkpointing in distributed systems Conference paper
Cao Jiannong, Jia Weijia, Jia Xiaohua, Cheung To-yat. Design and analysis of an efficient algorithm for coordinated checkpointing in distributed systems[C], 1997, 261-268.
Authors:  Cao Jiannong;  Jia Weijia;  Jia Xiaohua;  Cheung To-yat
Favorite |  | Submit date:2019/02/11