UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT Journal article
Rezaeibagha, Fatemeh, Mu, Yi, Huang, Ke, Chen, Lanxiang, Zhang, Leyou. Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT[J]. IEEE Transactions on Services Computing, 2023, 16(3), 1664-1672.
Authors:  Rezaeibagha, Fatemeh;  Mu, Yi;  Huang, Ke;  Chen, Lanxiang;  Zhang, Leyou
Favorite | TC[WOS]:5 TC[Scopus]:6  IF:5.5/5.9 | Submit date:2024/01/10
Cloud Computing  Data Security  Homomorphic Encryption  Internet Of Things  
Rational preparation of anti-water phosphorescent carbon-dots and flake C3N4 composites through microwave-heating method for multiple data encryption Journal article
Bao, Xin, Liu, Enshan, Yuan, Xi, Wang, Hui, Li, Haibo, Qu, Songnan. Rational preparation of anti-water phosphorescent carbon-dots and flake C3N4 composites through microwave-heating method for multiple data encryption[J]. Journal of Luminescence, 2022, 248, 118928.
Authors:  Bao, Xin;  Liu, Enshan;  Yuan, Xi;  Wang, Hui;  Li, Haibo; et al.
Favorite | TC[WOS]:10 TC[Scopus]:12  IF:3.3/3.1 | Submit date:2022/05/13
Anti-water Phosphorescence Emission  Carbon Dots  Matrix Structure  Microwave-heating  Multiple Data Encryption  
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation Journal article
Liu, Zi Long, Pun, Chi Man. Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 1382-1394.
Authors:  Liu, Zi Long;  Pun, Chi Man
Favorite | TC[WOS]:35 TC[Scopus]:44  IF:7.0/6.8 | Submit date:2022/05/17
Reversible Data Hiding  Encrypted Image  Chunk Encryption  Redundancy Matrix Representation  
Compressed Sensing Based Selective Encryption with Data Hiding Capability Journal article
Wang, Jia, Zhang, Leo Yu, Chen, Junxin, Hua, Guang, Zhang, Yushu, Xiang, Yong. Compressed Sensing Based Selective Encryption with Data Hiding Capability[J]. IEEE Transactions on Industrial Informatics, 2019, 15(12), 6560-6571.
Authors:  Wang, Jia;  Zhang, Leo Yu;  Chen, Junxin;  Hua, Guang;  Zhang, Yushu; et al.
Favorite | TC[WOS]:35 TC[Scopus]:39  IF:11.7/11.4 | Submit date:2022/05/17
Compressed Sensing (Cs)  Data Hiding  Error Concealment Attack  Selective Encryption  Wireless Sensor Network  
Sed-Dedup: An efficient secure deduplication system with data modifications Conference paper
WenlongTian, Ruixuan Li, Cheng-Zhong Xu, Zhiyong Xu. Sed-Dedup: An efficient secure deduplication system with data modifications[C], 2019, e5350.
Authors:  WenlongTian;  Ruixuan Li;  Cheng-Zhong Xu;  Zhiyong Xu
Favorite | TC[WOS]:3 TC[Scopus]:4 | Submit date:2021/03/09
Chunking Algorithms  Convergent Encryption  Data Modifications  Delta Encoding  Secure Deduplication  
Multilevel Data Encryption Using Thermal-Treatment Controlled Room Temperature Phosphorescence of Carbon Dot/Polyvinylalcohol Composites Journal article
Tian Z., Li D., Ushakova E.V., Maslov V.G., Zhou D., Jing P., Shen D., Qu S., Rogach A.L.. Multilevel Data Encryption Using Thermal-Treatment Controlled Room Temperature Phosphorescence of Carbon Dot/Polyvinylalcohol Composites[J]. Advanced Science, 2018, 5(9).
Authors:  Tian Z.;  Li D.;  Ushakova E.V.;  Maslov V.G.;  Zhou D.; et al.
Favorite | TC[WOS]:192 TC[Scopus]:196  IF:14.3/16.3 | Submit date:2019/04/08
Anti-counterfeiting  Carbon Dots  Data Encryption  Polyvinylalcohol Matrix  Room Temperature Phosphorescence  
Adaptive image encryption for high capacity reversible data hiding Conference paper
Choi K.-C., Pun C.-M.. Adaptive image encryption for high capacity reversible data hiding[C], 2017, 429-432.
Authors:  Choi K.-C.;  Pun C.-M.
Favorite | TC[WOS]:1 TC[Scopus]:1 | Submit date:2019/02/14
Burrow's-wheeler Transform  Generalized Integer Transform  Image Encryption  Lossless Data Hiding  
Binary-block embedding for reversible data hiding in encrypted images Journal article
Yi, Shuang, Zhou, Yicong. Binary-block embedding for reversible data hiding in encrypted images[J]. Signal Processing, 2017, 133, 40-51.
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite | TC[WOS]:121 TC[Scopus]:151  IF:3.4/3.8 | Submit date:2018/10/30
Binary-block Embedding (Bee)  Reversible Data Hiding  Image Encryption  Encrypted Domain  
Cascade Chaotic System with Applications Journal article
Zhou Yicong, Hua Zhongyun, Pun C.-M., Philip Chen C.L.. Cascade Chaotic System with Applications[J]. IEEE Transactions on Cybernetics, 2015, 45(9), 2001 - 2012.
Authors:  Zhou Yicong;  Hua Zhongyun;  Pun C.-M.;  Philip Chen C.L.
Favorite | TC[WOS]:271 TC[Scopus]:309 | Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
An improved reversible data hiding in encrypted images Conference paper
Shuang Yi, Yicong Zhou. An improved reversible data hiding in encrypted images[C], 2015, 225-229.
Authors:  Shuang Yi;  Yicong Zhou
Favorite | TC[WOS]:7 TC[Scopus]:10 | Submit date:2018/12/21
Histogram Shifting  Image Encryption  Prediction Error  Reversible Data Hiding