UM

Browse/Search Results:  1-10 of 20 Help

Selected(0)Clear Items/Page:    Sort:
Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Xu, Cheng Zhong. Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Ding, Derui;  Dong, Hongli;  Xu, Cheng Zhong
Favorite | TC[WOS]:0 TC[Scopus]:2  IF:10.2/10.4 | Submit date:2024/05/16
Artificial Neural Networks  Artificial Neural Networks (Anns)  Bandwidth  Bandwidth Constraints  Cryptography  Encryption  Homomorphic Encryption Scheme (Hes)  Noise  Secure State Estimation  Security  Set-membership State Estimation  State Estimation  
A 0.012-mm2 0.244-pJ/bit successive approximation register analog-to-digital converter-based true random number generator for Internet of Things applications in a 65-nm complementary metal–oxide–semiconductor Journal article
Cheng, Kai, Chen, Yong, Stefano, Crovetti Paolo, Martins, Rui P., Mak, Pui In. A 0.012-mm2 0.244-pJ/bit successive approximation register analog-to-digital converter-based true random number generator for Internet of Things applications in a 65-nm complementary metal–oxide–semiconductor[J]. International Journal of Circuit Theory and Applications, 2024.
Authors:  Cheng, Kai;  Chen, Yong;  Stefano, Crovetti Paolo;  Martins, Rui P.;  Mak, Pui In
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:1.8/1.7 | Submit date:2024/06/05
Analog-to-digital Converter (Adc)  Capacitive Digital-to-analog Converters (Cdacs)  Cryptography  Entropy  National Institute Of StAndards And Technology (Nist)  Successive Approximation Register (Sar)  Thermal Noise  True Random Number Generator (Trng)  
A quantum algorithm for finding collision-inducing disturbance vectors in SHA-1 Journal article
Duan, Jiheng, Li, Minghui, Ian, Hou. A quantum algorithm for finding collision-inducing disturbance vectors in SHA-1[J]. Physica Scripta, 2023, 98(11), 115106.
Authors:  Duan, Jiheng;  Li, Minghui;  Ian, Hou
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:2.6/2.3 | Submit date:2023/12/04
Optical Parametric Oscillator  Quantum Algorithm  Quantum Entanglement  Sha Cryptography  
Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal Journal article
Qin, Ying, Zhang, Bob. Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal[J]. Applied Sciences (Switzerland), 2023, 13(14).
Authors:  Qin, Ying;  Zhang, Bob
Favorite | TC[WOS]:1 TC[Scopus]:5  IF:2.5/2.7 | Submit date:2023/08/25
Arnold Transform  Cryptography  Digital Signature  Elgamal Algorithm  Privacy-preserving Biometrics  
A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification Journal article
Peng Lin, Kejiang Ye, Yishen Hu, Yanying Lin, Cheng Zhong Xu. A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification[J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 31(3), 1369-1384.
Authors:  Peng Lin;  Kejiang Ye;  Yishen Hu;  Yanying Lin;  Cheng Zhong Xu
Favorite | TC[WOS]:14 TC[Scopus]:17  IF:3.0/3.6 | Submit date:2023/01/30
Cryptography  Deep Learning  Encrypted Traffic Classification  Encryption  Feature Extraction  Markov Processes  Multimodal Learning  Network Security  Protocols  Quality Of Service  Servers  
Compressive Imaging Encryption with Secret Sharing Metasurfaces Journal article
Zheng, Peixia, Li, Jiaxin, Li, Zile, Ge, Mingzheng, Zhang, Shuang, Zheng, Guoxing, Liu, Hong-Chao. Compressive Imaging Encryption with Secret Sharing Metasurfaces[J]. Advanced Optical Materials, 2022, 10(15), 2200257.
Authors:  Zheng, Peixia;  Li, Jiaxin;  Li, Zile;  Ge, Mingzheng;  Zhang, Shuang; et al.
Favorite | TC[WOS]:38 TC[Scopus]:41  IF:8.0/9.0 | Submit date:2022/08/05
Computational Ghost Imaging  Metasurface Holography  Visual Cryptography  
Optical ghost cryptography and steganography Journal article
Liu, H., Chen, W.. Optical ghost cryptography and steganography[J]. Optics and Lasers in Engineering, 2020, 106094-1-106094-5.
Authors:  Liu, H.;  Chen, W.
Favorite |   IF:3.5/4.2 | Submit date:2022/06/05
ghost imaging  cryptography  steganography  
Optical ghost cryptography and steganography Journal article
Liu, Hong-Chao, Chen, Wen. Optical ghost cryptography and steganography[J]. Optics and Lasers in Engineering, 2020, 130, 106094.
Authors:  Liu, Hong-Chao;  Chen, Wen
Favorite | TC[WOS]:17 TC[Scopus]:19  IF:3.5/4.2 | Submit date:2021/11/30
Computational Ghost Imaging  Ghost Cryptography  Ghost Steganography  Optical Data Processing  Reconstruction Techniques  
A novel text encryption algorithm based on core adaptive Fourier decomposition Conference paper
Dai, Lei, Ye, Zhijing, Zhang, Liming, Qian, Tao. A novel text encryption algorithm based on core adaptive Fourier decomposition[C], New York, NY, United States:Association for Computing Machinery, 2019, 491-497.
Authors:  Dai, Lei;  Ye, Zhijing;  Zhang, Liming;  Qian, Tao
Favorite | TC[Scopus]:1 | Submit date:2022/05/17
Cryptography  Text Encryption  Adaptive Fourier Decomposition  Signal Processing  
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism Journal article
Shih-Yu Li, Miguel Angel Benalcázar Hernández, Lap-Mou Tam, Chin-Sheng Chen. A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism[J]. Applied Sciences (Switzerland), 2019, 9(23), 5146.
Authors:  Shih-Yu Li;  Miguel Angel Benalcázar Hernández;  Lap-Mou Tam;  Chin-Sheng Chen
Favorite | TC[WOS]:5 TC[Scopus]:5  IF:2.5/2.7 | Submit date:2021/03/09
Smart Automation  Cyberphysical Systems  Cloud Data Protection  Cryptography