UM

Browse/Search Results:  1-10 of 79 Help

Selected(0)Clear Items/Page:    Sort:
Carbon Dots-Inked Paper with Single/Two-Photon Excited Dual-Mode Thermochromic Afterglow for Advanced Dynamic Information Encryption Journal article
Liu, Yupeng, Cheng, Dengke, Wang, Bingzhe, Yang, Junxiang, Hao, Yiming, Tan, Jing, Li, Qijun, Qu, Songnan. Carbon Dots-Inked Paper with Single/Two-Photon Excited Dual-Mode Thermochromic Afterglow for Advanced Dynamic Information Encryption[J]. Advanced Materials, 2024, 36, 2401775.
Authors:  Liu, Yupeng;  Cheng, Dengke;  Wang, Bingzhe;  Yang, Junxiang;  Hao, Yiming; et al.
Favorite | TC[WOS]:9 TC[Scopus]:19  IF:27.4/30.2 | Submit date:2024/06/05
Carbon Dots  Information Encryption  Room Temperature Phosphorescence  Thermally Activated Delayed Fluorescence  Thermochromic Afterglow  
Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control Journal article
Zhang, Yanlin, Yang, Liqiao, Kou, Kit Ian, Liu, Yang. Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control[J]. Knowledge-Based Systems, 2024, 296, 111953.
Authors:  Zhang, Yanlin;  Yang, Liqiao;  Kou, Kit Ian;  Liu, Yang
Favorite | TC[WOS]:2 TC[Scopus]:2  IF:7.2/7.4 | Submit date:2024/06/05
Event-triggered Impulsive Control  Finite-time Synchronization  Fractional-order Quaternion-valued Neural Networks  Image Encryption And Decryption  Quaternion-valued Linear Matrix Inequalities  
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:  Liu, Jun;  Zhou, Jiantao;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:5.2/4.9 | Submit date:2024/06/05
Deep Neural Networks  Encryption  Image Classification  Privacy-preserving  
B and N Co-doped carbon dots for the ratiometric fluorescence detection of riboflavin and information security with room temperature phosphorescence Journal article
Wei, Na, Yan, Yanan, Sun, Ning, Huang, Yue, Liu, Yang, Dong, Wenjuan, Gong, Xiaojuan, Zhao, Jie, Wang, Ruinbing, Song, Shengmei, Dong, Chuan. B and N Co-doped carbon dots for the ratiometric fluorescence detection of riboflavin and information security with room temperature phosphorescence[J]. Journal of Luminescence, 2024, 269, 120456.
Authors:  Wei, Na;  Yan, Yanan;  Sun, Ning;  Huang, Yue;  Liu, Yang; et al.
Favorite | TC[WOS]:3 TC[Scopus]:3  IF:3.3/3.1 | Submit date:2024/05/16
Carbon Dots  Information Encryption  Ratiometric Fluorescence  Riboflavin  Room Temperature Phosphorescence  
Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design Journal article
Fang, Long, Lin, Ziwei, Zhang, Yang, Ye, Bin, Li, Jing, Ran, Qishan, Wang, Xiaotong, Yang, Meijia, Yuan, Zhongke, Lin, Xiaofeng, Yu, Dingshan, Chen, Xudong, Li, Quan. Robust, Ultrafast and Reversible Photoswitching in Bulk Polymers Enabled by Octupolar Molecule Design[J]. ANGEWANDTE CHEMIE-INTERNATIONAL EDITION, 2024, 63(16), e202402349.
Authors:  Fang, Long;  Lin, Ziwei;  Zhang, Yang;  Ye, Bin;  Li, Jing; et al.
Favorite | TC[WOS]:5 TC[Scopus]:5  IF:16.1/16.2 | Submit date:2024/05/02
Donor–acceptor Stenhouse Adducts  Information Encryption  Octupole  Photochromic Films  Time-temperature Indicators  
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture Journal article
Wu, Haiqin, Düdder, Boris, Wang, Liangmin, Cao, Zhenfu, Zhou, Jun, Feng, Xia. Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture[J]. ACM Computing Surveys, 2024, 56(3), 63.
Authors:  Wu, Haiqin;  Düdder, Boris;  Wang, Liangmin;  Cao, Zhenfu;  Zhou, Jun; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:23.8/21.1 | Submit date:2024/01/10
Outsourced Keyword Search  Searchable Encryption  Cloud Security  Blockchain  Verifiability  
A novel image encryption scheme with adaptive Fourier decomposition Journal article
Wu, Yongfei, Zhang, Liming, Liu, Xilin, Zhang, Hao. A novel image encryption scheme with adaptive Fourier decomposition[J]. Journal of the Franklin Institute, 2024, 361(4), 106630.
Authors:  Wu, Yongfei;  Zhang, Liming;  Liu, Xilin;  Zhang, Hao
Favorite | TC[WOS]:3 TC[Scopus]:3  IF:3.7/3.5 | Submit date:2024/04/02
Adaptive Fourier Decomposition  Bilateral Sequence Diffusion  Image Encryption  Index-sorted Mapping  Pixel Swapping  
Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme Journal article
Zhu, Kaiqun, Wang, Zidong, Ding, Derui, Dong, Hongli, Xu, Cheng Zhong. Secure State Estimation for Artificial Neural Networks With Unknown-But-Bounded Noises: A Homomorphic Encryption Scheme[J]. IEEE Transactions on Neural Networks and Learning Systems, 2024.
Authors:  Zhu, Kaiqun;  Wang, Zidong;  Ding, Derui;  Dong, Hongli;  Xu, Cheng Zhong
Favorite | TC[WOS]:0 TC[Scopus]:2  IF:10.2/10.4 | Submit date:2024/05/16
Artificial Neural Networks  Artificial Neural Networks (Anns)  Bandwidth  Bandwidth Constraints  Cryptography  Encryption  Homomorphic Encryption Scheme (Hes)  Noise  Secure State Estimation  Security  Set-membership State Estimation  State Estimation  
A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System Journal article
Li,Shih Yu, Lee,Chun Hung, Tam,Lap Mou. A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System[J]. Sensors, 2023, 23(13), 5906.
Authors:  Li,Shih Yu;  Lee,Chun Hung;  Tam,Lap Mou
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:3.4/3.7 | Submit date:2023/08/03
Authorization  Hyper-chaotic System  Novel Image Encryption  Speaker Verification  
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT Journal article
Rezaeibagha, Fatemeh, Mu, Yi, Huang, Ke, Chen, Lanxiang, Zhang, Leyou. Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT[J]. IEEE Transactions on Services Computing, 2023, 16(3), 1664-1672.
Authors:  Rezaeibagha, Fatemeh;  Mu, Yi;  Huang, Ke;  Chen, Lanxiang;  Zhang, Leyou
Favorite | TC[WOS]:4 TC[Scopus]:6  IF:5.5/5.9 | Submit date:2024/01/10
Cloud Computing  Data Security  Homomorphic Encryption  Internet Of Things