×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [44]
INSTITUTE OF APP... [1]
THE STATE KEY LA... [1]
Authors
ZHOU YICONG [30]
CHEN CHUN LUNG P... [8]
PUN CHI MAN [3]
ZHOU JIANTAO [3]
TAM LAP MOU [2]
ZHANG LIMING [2]
More...
Document Type
Journal article [35]
Conference pape... [15]
Date Issued
2024 [3]
2023 [2]
2022 [2]
2021 [5]
2020 [4]
2019 [3]
More...
Language
英語English [50]
Source Publication
Information Scie... [9]
Signal Processin... [8]
Conference Proce... [3]
IEEE Transaction... [2]
International Jo... [2]
Optics Communica... [2]
More...
Indexed By
SCIE [39]
CPCI-S [3]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 50
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control
Journal article
Zhang, Yanlin, Yang, Liqiao, Kou, Kit Ian, Liu, Yang. Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control[J]. Knowledge-Based Systems, 2024, 296, 111953.
Authors:
Zhang, Yanlin
;
Yang, Liqiao
;
Kou, Kit Ian
;
Liu, Yang
Favorite
|
TC[WOS]:
2
TC[Scopus]:
2
IF:
7.2
/
7.4
|
Submit date:2024/06/05
Event-triggered Impulsive Control
Finite-time Synchronization
Fractional-order Quaternion-valued Neural Networks
Image Encryption And Decryption
Quaternion-valued Linear Matrix Inequalities
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples
Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:
Liu, Jun
;
Zhou, Jiantao
;
Tian, Jinyu
;
Sun, Weiwei
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
5.2
/
4.9
|
Submit date:2024/06/05
Deep Neural Networks
Encryption
Image Classification
Privacy-preserving
A novel image encryption scheme with adaptive Fourier decomposition
Journal article
Wu, Yongfei, Zhang, Liming, Liu, Xilin, Zhang, Hao. A novel image encryption scheme with adaptive Fourier decomposition[J]. Journal of the Franklin Institute, 2024, 361(4), 106630.
Authors:
Wu, Yongfei
;
Zhang, Liming
;
Liu, Xilin
;
Zhang, Hao
Favorite
|
TC[WOS]:
3
TC[Scopus]:
3
IF:
3.7
/
3.5
|
Submit date:2024/04/02
Adaptive Fourier Decomposition
Bilateral Sequence Diffusion
Image Encryption
Index-sorted Mapping
Pixel Swapping
A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System
Journal article
Li,Shih Yu, Lee,Chun Hung, Tam,Lap Mou. A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System[J]. Sensors, 2023, 23(13), 5906.
Authors:
Li,Shih Yu
;
Lee,Chun Hung
;
Tam,Lap Mou
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
3.4
/
3.7
|
Submit date:2023/08/03
Authorization
Hyper-chaotic System
Novel Image Encryption
Speaker Verification
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics
Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:
Zhang,Chengrui
;
Chen,Junxin
;
Chen,Dongming
;
Wang,Wei
;
Zhang,Yushu
; et al.
Favorite
|
TC[WOS]:
4
TC[Scopus]:
7
IF:
8.4
/
8.0
|
Submit date:2023/08/03
Chosen-plaintext Attack
Ciphers
Decoding
Dna
Dna Coding
Encoding
Encryption
Image Coding
Image Encryption
S-box Matrix
Security
n-Dimensional Chaotic Map with application in secure communication
Journal article
Cao, Weijia, Cai, Hang, Hua, Zhongyun. n-Dimensional Chaotic Map with application in secure communication[J]. Chaos, Solitons and Fractals, 2022, 163, 112519.
Authors:
Cao, Weijia
;
Cai, Hang
;
Hua, Zhongyun
Favorite
|
TC[WOS]:
33
TC[Scopus]:
40
IF:
5.3
/
5.4
|
Submit date:2022/11/07
Chaotic Map
Chaotic System
Secure Communication
Lyapunov Exponent
Image Encryption
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation
Journal article
Liu, Zi Long, Pun, Chi Man. Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 1382-1394.
Authors:
Liu, Zi Long
;
Pun, Chi Man
Favorite
|
TC[WOS]:
35
TC[Scopus]:
44
IF:
7.0
/
6.8
|
Submit date:2022/05/17
Reversible Data Hiding
Encrypted Image
Chunk Encryption
Redundancy Matrix Representation
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking
Journal article
Xilin Liu, Yongfei Wu, Hao Zhang, Jiasong Wu, Liming Zhang. Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking[J]. Signal Processing, 2021, 189, 108275.
Authors:
Xilin Liu
;
Yongfei Wu
;
Hao Zhang
;
Jiasong Wu
;
Liming Zhang
Favorite
|
TC[WOS]:
30
TC[Scopus]:
34
IF:
3.4
/
3.8
|
Submit date:2022/05/13
Color Image Encryption
Color Image Watermarking
Quaternion Discrete Fractional Krawtchouk Transform
Inverse computational ghost imaging for image encryption
Journal article
Zheng, P, Tan, Q, Liu, H.. Inverse computational ghost imaging for image encryption[J]. Optics Express, 2021, 21290-21299.
Authors:
Zheng, P
;
Tan, Q
;
Liu, H.
Favorite
|
IF:
3.2
/
3.4
|
Submit date:2022/06/05
Ghost Imaging
Image Encryption
Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos
Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(6), 2494-2508.
Authors:
Chen, Junxin
;
Chen, Lei
;
Zhou, Yicong
Favorite
|
TC[WOS]:
38
TC[Scopus]:
40
IF:
8.3
/
7.1
|
Submit date:2021/12/08
Chosen-ciphertext Attack
Permutation Substitution
Bit-wise Xor
Image Encryption