×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [13]
INSTITUTE OF APP... [4]
THE STATE KEY LA... [2]
THE STATE KEY LA... [1]
INSTITUTE OF MIC... [1]
INSTITUTE OF COL... [1]
More...
Authors
ZHOU YICONG [4]
CHENGZHONG XU [2]
LIU HONGCHAO [2]
RUI PAULO DA SIL... [1]
GONG ZHIGUO [1]
MAK PUI IN [1]
More...
Document Type
Journal article [18]
Book [1]
Conference paper [1]
Date Issued
2024 [2]
2023 [2]
2022 [2]
2020 [2]
2019 [6]
2018 [1]
More...
Language
英語English [18]
中文Chinese [1]
Source Publication
Applied Sciences... [2]
IEEE Transaction... [2]
Optics and Laser... [2]
ACM Internationa... [1]
Advanced Optical... [1]
Applied Sciences [1]
More...
Indexed By
SCIE [11]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 20
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme
Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Xu, Cheng Zhong. Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024.
Authors:
Zhu, Kaiqun
;
Wang, Zidong
;
Ding, Derui
;
Dong, Hongli
;
Xu, Cheng Zhong
Favorite
|
TC[WOS]:
0
TC[Scopus]:
2
IF:
10.2
/
10.4
|
Submit date:2024/05/16
Artificial Neural Networks
Artificial Neural Networks (Anns)
Bandwidth
Bandwidth Constraints
Cryptography
Encryption
Homomorphic Encryption Scheme (Hes)
Noise
Secure State Estimation
Security
Set-membership State Estimation
State Estimation
A 0.012-mm2 0.244-pJ/bit successive approximation register analog-to-digital converter-based true random number generator for Internet of Things applications in a 65-nm complementary metal–oxide–semiconductor
Journal article
Cheng, Kai, Chen, Yong, Stefano, Crovetti Paolo, Martins, Rui P., Mak, Pui In. A 0.012-mm2 0.244-pJ/bit successive approximation register analog-to-digital converter-based true random number generator for Internet of Things applications in a 65-nm complementary metal–oxide–semiconductor[J]. International Journal of Circuit Theory and Applications, 2024.
Authors:
Cheng, Kai
;
Chen, Yong
;
Stefano, Crovetti Paolo
;
Martins, Rui P.
;
Mak, Pui In
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
1.8
/
1.7
|
Submit date:2024/06/05
Analog-to-digital Converter (Adc)
Capacitive Digital-to-analog Converters (Cdacs)
Cryptography
Entropy
National Institute Of StAndards And Technology (Nist)
Successive Approximation Register (Sar)
Thermal Noise
True Random Number Generator (Trng)
A quantum algorithm for finding collision-inducing disturbance vectors in SHA-1
Journal article
Duan, Jiheng, Li, Minghui, Ian, Hou. A quantum algorithm for finding collision-inducing disturbance vectors in SHA-1[J]. Physica Scripta, 2023, 98(11), 115106.
Authors:
Duan, Jiheng
;
Li, Minghui
;
Ian, Hou
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
2.6
/
2.3
|
Submit date:2023/12/04
Optical Parametric Oscillator
Quantum Algorithm
Quantum Entanglement
Sha Cryptography
Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal
Journal article
Qin, Ying, Zhang, Bob. Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal[J]. Applied Sciences (Switzerland), 2023, 13(14).
Authors:
Qin, Ying
;
Zhang, Bob
Favorite
|
TC[WOS]:
1
TC[Scopus]:
5
IF:
2.5
/
2.7
|
Submit date:2023/08/25
Arnold Transform
Cryptography
Digital Signature
Elgamal Algorithm
Privacy-preserving Biometrics
A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification
Journal article
Peng Lin, Kejiang Ye, Yishen Hu, Yanying Lin, Cheng Zhong Xu. A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification[J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 31(3), 1369-1384.
Authors:
Peng Lin
;
Kejiang Ye
;
Yishen Hu
;
Yanying Lin
;
Cheng Zhong Xu
Favorite
|
TC[WOS]:
14
TC[Scopus]:
17
IF:
3.0
/
3.6
|
Submit date:2023/01/30
Cryptography
Deep Learning
Encrypted Traffic Classification
Encryption
Feature Extraction
Markov Processes
Multimodal Learning
Network Security
Protocols
Quality Of Service
Servers
Compressive Imaging Encryption with Secret Sharing Metasurfaces
Journal article
Zheng, Peixia, Li, Jiaxin, Li, Zile, Ge, Mingzheng, Zhang, Shuang, Zheng, Guoxing, Liu, Hong-Chao. Compressive Imaging Encryption with Secret Sharing Metasurfaces[J]. Advanced Optical Materials, 2022, 10(15), 2200257.
Authors:
Zheng, Peixia
;
Li, Jiaxin
;
Li, Zile
;
Ge, Mingzheng
;
Zhang, Shuang
; et al.
Favorite
|
TC[WOS]:
38
TC[Scopus]:
41
IF:
8.0
/
9.0
|
Submit date:2022/08/05
Computational Ghost Imaging
Metasurface Holography
Visual Cryptography
Optical ghost cryptography and steganography
Journal article
Liu, H., Chen, W.. Optical ghost cryptography and steganography[J]. Optics and Lasers in Engineering, 2020, 106094-1-106094-5.
Authors:
Liu, H.
;
Chen, W.
Favorite
|
IF:
3.5
/
4.2
|
Submit date:2022/06/05
ghost imaging
cryptography
steganography
Optical ghost cryptography and steganography
Journal article
Liu, Hong-Chao, Chen, Wen. Optical ghost cryptography and steganography[J]. Optics and Lasers in Engineering, 2020, 130, 106094.
Authors:
Liu, Hong-Chao
;
Chen, Wen
Favorite
|
TC[WOS]:
17
TC[Scopus]:
19
IF:
3.5
/
4.2
|
Submit date:2021/11/30
Computational Ghost Imaging
Ghost Cryptography
Ghost Steganography
Optical Data Processing
Reconstruction Techniques
A novel text encryption algorithm based on core adaptive Fourier decomposition
Conference paper
Dai, Lei, Ye, Zhijing, Zhang, Liming, Qian, Tao. A novel text encryption algorithm based on core adaptive Fourier decomposition[C], New York, NY, United States:Association for Computing Machinery, 2019, 491-497.
Authors:
Dai, Lei
;
Ye, Zhijing
;
Zhang, Liming
;
Qian, Tao
Favorite
|
TC[Scopus]:
1
|
Submit date:2022/05/17
Cryptography
Text Encryption
Adaptive Fourier Decomposition
Signal Processing
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism
Journal article
Shih-Yu Li, Miguel Angel Benalcázar Hernández, Lap-Mou Tam, Chin-Sheng Chen. A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism[J]. Applied Sciences (Switzerland), 2019, 9(23), 5146.
Authors:
Shih-Yu Li
;
Miguel Angel Benalcázar Hernández
;
Lap-Mou Tam
;
Chin-Sheng Chen
Favorite
|
TC[WOS]:
5
TC[Scopus]:
5
IF:
2.5
/
2.7
|
Submit date:2021/03/09
Smart Automation
Cyberphysical Systems
Cloud Data Protection
Cryptography