×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [6]
Authors
ZHOU YICONG [3]
ZHOU JIANTAO [2]
CHEN CHUN LUNG P... [1]
CHENGZHONG XU [1]
Document Type
Journal article [4]
Conference paper [3]
Date Issued
2023 [1]
2022 [1]
2020 [1]
2018 [1]
2017 [2]
2014 [1]
More...
Language
英語English [7]
Source Publication
IEEE Transaction... [2]
ACM Transactions... [1]
Conference Proce... [1]
ICASSP 2023 - 20... [1]
IEEE TRANSACTION... [1]
Proceedings - 20... [1]
More...
Indexed By
SCIE [4]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-7 of 7
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Image Sharing Chain Detection VIA Sequence-To-Sequence Model
Conference paper
You, Jiaxiang, Li, Yuanman, Liang, Rongqin, Tan, Yuxuan, Zhou, Jiantao, Li, Xia. Image Sharing Chain Detection VIA Sequence-To-Sequence Model[C]:Institute of Electrical and Electronics Engineers Inc., 2023, 1-5.
Authors:
You, Jiaxiang
;
Li, Yuanman
;
Liang, Rongqin
;
Tan, Yuxuan
;
Zhou, Jiantao
; et al.
Favorite
|
TC[Scopus]:
3
|
Submit date:2024/02/22
Image Forensics
Online Social Networks
Seq2seq Model
Sharing Chain Detection
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
Journal article
Hua, Zhongyun, Wang, Yanxiang, Yi, Shuang, Zhou, Yicong, Jia, Xiaohua. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32(8), 4968-4982.
Authors:
Hua, Zhongyun
;
Wang, Yanxiang
;
Yi, Shuang
;
Zhou, Yicong
;
Jia, Xiaohua
Favorite
|
TC[WOS]:
32
TC[Scopus]:
44
IF:
8.3
/
7.1
|
Submit date:2022/05/17
Reversible Data Hiding
Cipher-feedback Secret Sharing
Encrypted Image
Multiple Data Hiders
RS-pCloud: A Peer-to-Peer Based Edge-Cloud System for Fast Remote Sensing Image Processing
Conference paper
Tongzheng Sun, Jingpan Xiong, Yang Wang, Tianhui Meng, Xi Chen, Chengzhong Xu. RS-pCloud: A Peer-to-Peer Based Edge-Cloud System for Fast Remote Sensing Image Processing[C]:IEEE, 2020, 15-22.
Authors:
Tongzheng Sun
;
Jingpan Xiong
;
Yang Wang
;
Tianhui Meng
;
Xi Chen
; et al.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
|
Submit date:2021/03/09
Edge-cloud Architecture
Load Sharing
Near-data Computing
Peer-to-peer
Remote Sensing Image
Robust privacy-Preserving image sharing over online social networks (OSNs)
Journal article
Weiwei Sun, JIANTAO ZHOU, SHUYUAN ZHU, YUAN YAN TANG. Robust privacy-Preserving image sharing over online social networks (OSNs)[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2018, 14(1).
Authors:
Weiwei Sun
;
JIANTAO ZHOU
;
SHUYUAN ZHU
;
YUAN YAN TANG
Adobe PDF
|
Favorite
|
TC[WOS]:
20
TC[Scopus]:
25
IF:
5.2
/
4.9
|
Submit date:2021/03/11
Image Sharing
Jpeg
Online Social Networks
Privacy-preserving
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing
Journal article
Bao L., Yi S., Zhou Y.. Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:
Bao L.
;
Yi S.
;
Zhou Y.
Favorite
|
TC[WOS]:
56
TC[Scopus]:
63
|
Submit date:2018/12/21
Image Encryption
Secret Image Sharing
Sharing Matrix
Visual Cryptography
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing
Journal article
Bao, Long, Yi, Shuang, Zhou, Yicong. Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:
Bao, Long
;
Yi, Shuang
;
Zhou, Yicong
Favorite
|
TC[WOS]:
56
TC[Scopus]:
63
IF:
10.8
/
12.1
|
Submit date:2018/10/30
Secret Image Sharing
Visual Cryptography
Sharing Matrix
Image Encryption
A lossless (2, 8)-chaos-based secret image sharing scheme
Conference paper
Bao Long, Zhou Yicong, Chen C.L.P.. A lossless (2, 8)-chaos-based secret image sharing scheme[C], 2014, 3209-3214.
Authors:
Bao Long
;
Zhou Yicong
;
Chen C.L.P.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2018/12/21
Chaotic System
Image Encryption
Secret Image Sharing