UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:  Zhang,Chengrui;  Chen,Junxin;  Chen,Dongming;  Wang,Wei;  Zhang,Yushu; et al.
Favorite | TC[WOS]:4 TC[Scopus]:6  IF:8.4/8.0 | Submit date:2023/08/03
Chosen-plaintext Attack  Ciphers  Decoding  Dna  Dna Coding  Encoding  Encryption  Image Coding  Image Encryption  S-box Matrix  Security  
Parenting Styles and Children’s Hot and Cool Self-Regulation: The Moderating Role of Parenting Stress Journal article
Sun, Jin, Xu, Xiaohui, Lee, Kerry, Chow, So Sum, Wang, Yushu, Zhang, Li. Parenting Styles and Children’s Hot and Cool Self-Regulation: The Moderating Role of Parenting Stress[J]. Early Childhood Education Journal, 2023.
Authors:  Sun, Jin;  Xu, Xiaohui;  Lee, Kerry;  Chow, So Sum;  Wang, Yushu; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:2.3/2.5 | Submit date:2024/02/22
Cool Self-regulation  Hot Self-regulation  Parenting Stress  Parenting Styles  
A Principled Design of Image Representation: Towards Forensic Tasks Journal article
Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao. A Principled Design of Image Representation: Towards Forensic Tasks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022, 45(5), 5337-5354.
Authors:  Shuren Qi;  Yushu Zhang;  Chao Wang;  Jiantao Zhou;  Xiaochun Cao
Favorite | TC[WOS]:9 TC[Scopus]:10  IF:20.8/22.2 | Submit date:2022/09/14
Dense Invariant Representation  Image Forensics  Orthogonal Moments  Covariance  Fast Fourier Transform  
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction Journal article
Wang, Wei, Chen, Junyang, Zhang, Yushu, Gong, Zhiguo, Kumar, Neeraj, Wei, Wei. A Multi-graph Convolutional Network Framework for Tourist Flow Prediction[J]. ACM Transactions on Internet Technology, 2021, 21(4), 106.
Authors:  Wang, Wei;  Chen, Junyang;  Zhang, Yushu;  Gong, Zhiguo;  Kumar, Neeraj; et al.
Favorite | TC[WOS]:10 TC[Scopus]:14  IF:3.9/3.6 | Submit date:2021/12/08
Cyber Physical Systems  Deep Learning  Smart Tourism  Social Internet Of Things  Tourist Flow Prediction  
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction Journal article
Wang, Wei, Chen, Junyang, Zhang, Yushu, Gong, Zhiguo, Kumar, Neeraj, Wei, Wei. A Multi-graph Convolutional Network Framework for Tourist Flow Prediction[J]. ACM Transactions on Internet Technology, 2021, 21(4), 106.
Authors:  Wang, Wei;  Chen, Junyang;  Zhang, Yushu;  Gong, Zhiguo;  Kumar, Neeraj; et al.
Favorite | TC[WOS]:10 TC[Scopus]:14  IF:3.9/3.6 | Submit date:2022/08/26
Graph  Tourist Flow Prediction  
A survey of orthogonal moments for image representation: Theory, implementation, and evaluation Journal article
SHUREN QI, YUSHU ZHANG, CHAO WANG, JIANTAO ZHOU, XIAOCHUN CAO. A survey of orthogonal moments for image representation: Theory, implementation, and evaluation[J]. ACM COMPUTING SURVEYS, 2021, 55(1), 1-35.
Authors:  SHUREN QI;  YUSHU ZHANG;  CHAO WANG;  JIANTAO ZHOU;  XIAOCHUN CAO
Adobe PDF | Favorite | TC[WOS]:32 TC[Scopus]:39  IF:23.8/21.1 | Submit date:2022/07/07
Pattern Recognition  Image Representation  Orthogonal Moments  Geometric Invariance  Fast Computation  
Compressed Sensing Based Selective Encryption with Data Hiding Capability Journal article
Wang, Jia, Zhang, Leo Yu, Chen, Junxin, Hua, Guang, Zhang, Yushu, Xiang, Yong. Compressed Sensing Based Selective Encryption with Data Hiding Capability[J]. IEEE Transactions on Industrial Informatics, 2019, 15(12), 6560-6571.
Authors:  Wang, Jia;  Zhang, Leo Yu;  Chen, Junxin;  Hua, Guang;  Zhang, Yushu; et al.
Favorite | TC[WOS]:34 TC[Scopus]:39  IF:11.7/11.4 | Submit date:2022/05/17
Compressed Sensing (Cs)  Data Hiding  Error Concealment Attack  Selective Encryption  Wireless Sensor Network  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen. Improved known-plaintext attack to permutation-only multimedia ciphers[J]. INFORMATION SCIENCES, 2017, 430, 228-239.
Authors:  Leo Yu Zhang;  Yuansheng Liu;  Cong Wang;  Jiantao Zhou;  Yushu Zhang; et al.
Adobe PDF | Favorite | TC[WOS]:60 TC[Scopus]:65  IF:0/0 | Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition