UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Fooling the Image Dehazing Models by First Order Gradient Journal article
Gui, Jie, Cong, Xiaofeng, Peng, Chengwei, Tang, Yuan Yan, Kwok, James Tin Yau. Fooling the Image Dehazing Models by First Order Gradient[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6265 - 6278.
Authors:  Gui, Jie;  Cong, Xiaofeng;  Peng, Chengwei;  Tang, Yuan Yan;  Kwok, James Tin Yau
Favorite | TC[WOS]:2 TC[Scopus]:6  IF:8.3/7.1 | Submit date:2024/05/16
Image Dehazing  Adversarial Attack And Defense  Security  First Order Gradient  
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:  Zhang,Chengrui;  Chen,Junxin;  Chen,Dongming;  Wang,Wei;  Zhang,Yushu; et al.
Favorite | TC[WOS]:10 TC[Scopus]:10  IF:8.4/8.0 | Submit date:2023/08/03
Chosen-plaintext Attack  Ciphers  Decoding  Dna  Dna Coding  Encoding  Encryption  Image Coding  Image Encryption  S-box Matrix  Security  
Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing Journal article
Hua, Zhongyun, Zhang, Kuiyuan, Li, Yuanman, Zhou, Yicong. Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing[J]. Signal Processing, 2021, 183, 107998.
Authors:  Hua, Zhongyun;  Zhang, Kuiyuan;  Li, Yuanman;  Zhou, Yicong
Favorite | TC[WOS]:124 TC[Scopus]:137  IF:3.4/3.8 | Submit date:2021/12/08
Image Compression  Image Security  Parallel Compressive Sensing  Separable Wavelet Transform  
Content-adaptive image encryption with partial unwinding decomposition Journal article
Wu, Yongfei, Zhang, Liming, Qian, Tao, Liu, Xilin, Xie, Qiwei. Content-adaptive image encryption with partial unwinding decomposition[J]. Signal Processing, 2021, 181, 107911.
Authors:  Wu, Yongfei;  Zhang, Liming;  Qian, Tao;  Liu, Xilin;  Xie, Qiwei
Favorite | TC[WOS]:21 TC[Scopus]:21  IF:3.4/3.8 | Submit date:2021/12/07
Image Encryption  Image-content-adaptive Encryption  Information Security  Partial Unwinding Decomposition  
Racialised Politics of (In)Security and the COVID-19 Westfailure Journal article
Pan, Chengxin. Racialised Politics of (In)Security and the COVID-19 Westfailure[J]. Critical Studies on Security, 2021, 9(1), 40-45.
Authors:  Pan, Chengxin
Favorite | TC[WOS]:8 TC[Scopus]:8 | Submit date:2022/08/09
Western Self-image  Zone Of (In)Security  Racialised Ontology/epistemology  Epistemic Racism  Covid-19 Pandemic  Western Security Practice  
Cosine-transform-based chaotic system for image encryption Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:  ; et al.
Favorite | TC[WOS]:533 TC[Scopus]:613  IF:0/0 | Submit date:2022/05/23
Chaos-based Encryption  Chaotic System  Cryptography  Image Encryption  Image Privacy  Security Analysis  
Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme Journal article
Chen, Lei, Chen, Junxin, Zhao, Geng, Wang, Shihong. Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme[J]. IEEE Access, 2019, 7, 97549-97565.
Authors:  Chen, Lei;  Chen, Junxin;  Zhao, Geng;  Wang, Shihong
Favorite | TC[WOS]:12 TC[Scopus]:16  IF:3.4/3.7 | Submit date:2022/05/23
Chaotic Cryptography  Cryptanalysis  Feature Codes  Image Security  Secure Watermarking  
Image splicing localization via semi-global network and fully connected conditional random fields Conference paper
Cun, Xiaodong, Pun, Chi Man. Image splicing localization via semi-global network and fully connected conditional random fields[C], 2018, 252-266.
Authors:  Cun, Xiaodong;  Pun, Chi Man
Favorite | TC[WOS]:11 TC[Scopus]:9 | Submit date:2022/05/23
Image Forgery Localization  Image Splicing Localization  Multimedia Security  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
Yifeng Zheng, Helei Cui, Cong Wang, Jiantao Zhou. Privacy-Preserving Image Denoising from External Cloud Databases[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6), 1285-1298.
Authors:  Yifeng Zheng;  Helei Cui;  Cong Wang;  Jiantao Zhou
Adobe PDF | Favorite | TC[WOS]:37 TC[Scopus]:44  IF:6.3/7.3 | Submit date:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security  
A Review of Compressive Sensing in Information Security Field Journal article
YUSHU ZHANG, LEO YU ZHANG, JIANTAO ZHOU, LICHENG LIU, FEI CHEN, XING HE. A Review of Compressive Sensing in Information Security Field[J]. IEEE Access, 2016, 4, 2507 - 2519.
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN; et al.
Adobe PDF | Favorite | TC[WOS]:153 TC[Scopus]:165  IF:3.4/3.7 | Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics