×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [11]
Faculty of Socia... [1]
Authors
ZHOU YICONG [6]
CHEN CHUN LUNG P... [2]
ZHOU JIANTAO [2]
TANG YUAN YAN [1]
PUN CHI MAN [1]
ZHANG LIMING [1]
More...
Document Type
Journal article [12]
Conference paper [1]
Date Issued
2024 [1]
2023 [1]
2021 [3]
2019 [2]
2018 [1]
2017 [1]
More...
Language
英語English [13]
Source Publication
Signal Processin... [5]
IEEE Access [2]
Critical Studies... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
More...
Indexed By
SCIE [10]
CPCI-S [1]
SSCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 13
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Fooling the Image Dehazing Models by First Order Gradient
Journal article
Gui, Jie, Cong, Xiaofeng, Peng, Chengwei, Tang, Yuan Yan, Kwok, James Tin Yau. Fooling the Image Dehazing Models by First Order Gradient[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6265 - 6278.
Authors:
Gui, Jie
;
Cong, Xiaofeng
;
Peng, Chengwei
;
Tang, Yuan Yan
;
Kwok, James Tin Yau
Favorite
|
TC[WOS]:
2
TC[Scopus]:
6
IF:
8.3
/
7.1
|
Submit date:2024/05/16
Image Dehazing
Adversarial Attack And Defense
Security
First Order Gradient
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics
Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:
Zhang,Chengrui
;
Chen,Junxin
;
Chen,Dongming
;
Wang,Wei
;
Zhang,Yushu
; et al.
Favorite
|
TC[WOS]:
10
TC[Scopus]:
10
IF:
8.4
/
8.0
|
Submit date:2023/08/03
Chosen-plaintext Attack
Ciphers
Decoding
Dna
Dna Coding
Encoding
Encryption
Image Coding
Image Encryption
S-box Matrix
Security
Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing
Journal article
Hua, Zhongyun, Zhang, Kuiyuan, Li, Yuanman, Zhou, Yicong. Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing[J]. Signal Processing, 2021, 183, 107998.
Authors:
Hua, Zhongyun
;
Zhang, Kuiyuan
;
Li, Yuanman
;
Zhou, Yicong
Favorite
|
TC[WOS]:
124
TC[Scopus]:
137
IF:
3.4
/
3.8
|
Submit date:2021/12/08
Image Compression
Image Security
Parallel Compressive Sensing
Separable Wavelet Transform
Content-adaptive image encryption with partial unwinding decomposition
Journal article
Wu, Yongfei, Zhang, Liming, Qian, Tao, Liu, Xilin, Xie, Qiwei. Content-adaptive image encryption with partial unwinding decomposition[J]. Signal Processing, 2021, 181, 107911.
Authors:
Wu, Yongfei
;
Zhang, Liming
;
Qian, Tao
;
Liu, Xilin
;
Xie, Qiwei
Favorite
|
TC[WOS]:
21
TC[Scopus]:
21
IF:
3.4
/
3.8
|
Submit date:2021/12/07
Image Encryption
Image-content-adaptive Encryption
Information Security
Partial Unwinding Decomposition
Racialised Politics of (In)Security and the COVID-19 Westfailure
Journal article
Pan, Chengxin. Racialised Politics of (In)Security and the COVID-19 Westfailure[J]. Critical Studies on Security, 2021, 9(1), 40-45.
Authors:
Pan, Chengxin
Favorite
|
TC[WOS]:
8
TC[Scopus]:
8
|
Submit date:2022/08/09
Western Self-image
Zone Of (In)Security
Racialised Ontology/epistemology
Epistemic Racism
Covid-19 Pandemic
Western Security Practice
Cosine-transform-based chaotic system for image encryption
Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors: ; et al.
Favorite
|
TC[WOS]:
533
TC[Scopus]:
613
IF:
0
/
0
|
Submit date:2022/05/23
Chaos-based Encryption
Chaotic System
Cryptography
Image Encryption
Image Privacy
Security Analysis
Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme
Journal article
Chen, Lei, Chen, Junxin, Zhao, Geng, Wang, Shihong. Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme[J]. IEEE Access, 2019, 7, 97549-97565.
Authors:
Chen, Lei
;
Chen, Junxin
;
Zhao, Geng
;
Wang, Shihong
Favorite
|
TC[WOS]:
12
TC[Scopus]:
16
IF:
3.4
/
3.7
|
Submit date:2022/05/23
Chaotic Cryptography
Cryptanalysis
Feature Codes
Image Security
Secure Watermarking
Image splicing localization via semi-global network and fully connected conditional random fields
Conference paper
Cun, Xiaodong, Pun, Chi Man. Image splicing localization via semi-global network and fully connected conditional random fields[C], 2018, 252-266.
Authors:
Cun, Xiaodong
;
Pun, Chi Man
Favorite
|
TC[WOS]:
11
TC[Scopus]:
9
|
Submit date:2022/05/23
Image Forgery Localization
Image Splicing Localization
Multimedia Security
Privacy-Preserving Image Denoising from External Cloud Databases
Journal article
Yifeng Zheng, Helei Cui, Cong Wang, Jiantao Zhou. Privacy-Preserving Image Denoising from External Cloud Databases[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6), 1285-1298.
Authors:
Yifeng Zheng
;
Helei Cui
;
Cong Wang
;
Jiantao Zhou
Adobe PDF
|
Favorite
|
TC[WOS]:
37
TC[Scopus]:
44
IF:
6.3
/
7.3
|
Submit date:2018/12/22
Cloud Computing
External Database
Image Denoising
Privacy
Security
A Review of Compressive Sensing in Information Security Field
Journal article
YUSHU ZHANG, LEO YU ZHANG, JIANTAO ZHOU, LICHENG LIU, FEI CHEN, XING HE. A Review of Compressive Sensing in Information Security Field[J]. IEEE Access, 2016, 4, 2507 - 2519.
Authors:
YUSHU ZHANG
;
LEO YU ZHANG
;
JIANTAO ZHOU
;
LICHENG LIU
;
FEI CHEN
; et al.
Adobe PDF
|
Favorite
|
TC[WOS]:
153
TC[Scopus]:
165
IF:
3.4
/
3.7
|
Submit date:2019/04/16
Compressive Sensing
Theoretical Security
Application Security
Image Cipher
Chaos
Optics