×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [5]
Authors
ZHOU YICONG [4]
CHEN CHUN LUNG P... [2]
WANG YE [1]
Document Type
Journal article [4]
Conference paper [2]
Date Issued
2024 [1]
2019 [1]
2014 [2]
2013 [1]
2010 [1]
Language
英語English [6]
Source Publication
Signal Processin... [3]
ICCASM 2010 - 20... [1]
Information Scie... [1]
Proceedings - 20... [1]
Indexed By
SCIE [4]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-6 of 6
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Issue Date Ascending
Issue Date Descending
Submit date Ascending
Submit date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Quantifying the Blockchain Trilemma: A Comparative Analysis of Algorand, Ethereum 2.0, and Beyond
Conference paper
Fu, Yihang, Jing, Mingwei, Zhou, Jiaolun, Wu, Peilin, Wang, Ye, Zhang, Luyao, Hu, Chuang. Quantifying the Blockchain Trilemma: A Comparative Analysis of Algorand, Ethereum 2.0, and Beyond[C]:Institute of Electrical and Electronics Engineers Inc., 2024, 97-104.
Authors:
Fu, Yihang
;
Jing, Mingwei
;
Zhou, Jiaolun
;
Wu, Peilin
;
Wang, Ye
; et al.
Favorite
|
TC[Scopus]:
1
|
Submit date:2024/12/26
Benchmarking And Performance Study
Blockchain Consensus Protocols
Blockchain Protocol Analysis And Security
Data Analytics On Blockchain
Secure Smart Contracts
Throughput And Scalability
Cosine-transform-based chaotic system for image encryption
Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:
Hua, Zhongyun
;
Zhou, Yicong
;
Huang, Hejiao
Favorite
|
TC[WOS]:
533
TC[Scopus]:
613
IF:
0
/
0
|
Submit date:2022/05/23
Chaos-based Encryption
Chaotic System
Cryptography
Image Encryption
Image Privacy
Security Analysis
Image encryption using binary bitplane
Journal article
Zhou Yicong, Cao Weijia, Philip Chen C.L.. Image encryption using binary bitplane[J]. Signal Processing, 2014, 100, 197-207.
Authors:
Zhou Yicong
;
Cao Weijia
;
Philip Chen C.L.
Favorite
|
TC[WOS]:
154
TC[Scopus]:
175
|
Submit date:2018/10/30
Bit-level Permutation
Bitplane Decomposition
Image Encryption
Security Analysis
A new 1D chaotic system for image encryption
Journal article
Zhou Yicong, Bao Long, Chen C.L.P.. A new 1D chaotic system for image encryption[J]. Signal Processing, 2014, 97, 172-182.
Authors:
Zhou Yicong
;
Bao Long
;
Chen C.L.P.
Favorite
|
TC[WOS]:
646
TC[Scopus]:
764
|
Submit date:2018/10/30
Chaotic System
Chosen-plaintext Attack
Image Encryption
Security Analysis
Image encryption using a new parametric switching chaotic system
Journal article
Zhou Yicong, Bao Long, Chen C.L.P.. Image encryption using a new parametric switching chaotic system[J]. Signal Processing, 2013, 93(11), 3039-3052.
Authors:
Zhou Yicong
;
Bao Long
;
Chen C.L.P.
Favorite
|
TC[WOS]:
223
TC[Scopus]:
248
|
Submit date:2018/10/30
Image Encryption
Parametric Switching Chaotic System
Security Analysis
Analyzing and verifying Petri net model of security protocol based on Maria
Conference paper
Wang Y., Zhou J., Li H., Hao Y.. Analyzing and verifying Petri net model of security protocol based on Maria[C], 2010.
Authors:
Wang Y.
;
Zhou J.
;
Li H.
;
Hao Y.
Favorite
|
TC[Scopus]:
1
|
Submit date:2018/12/22
Analysis And Verification
Maria
Petri Net
Security Protocol