UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders Journal article
Chen, Bing, Lu, Wei, Huang, Jiwu, Weng, Jian, Zhou, Yicong. Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 978-991.
Authors:  Chen, Bing;  Lu, Wei;  Huang, Jiwu;  Weng, Jian;  Zhou, Yicong
Favorite | TC[WOS]:37 TC[Scopus]:55  IF:7.0/6.8 | Submit date:2022/05/17
Encrypted Images  Multiple Data-hiders  Reversible Data Hiding  Secret Sharing  
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation Journal article
Liu, Zi Long, Pun, Chi Man. Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 1382-1394.
Authors:  Liu, Zi Long;  Pun, Chi Man
Favorite | TC[WOS]:35 TC[Scopus]:44  IF:7.0/6.8 | Submit date:2022/05/17
Reversible Data Hiding  Encrypted Image  Chunk Encryption  Redundancy Matrix Representation  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
Zheng, Yifeng, Duan, Huayi, Tang, Xiaoting, Wang, Cong, Zhou, Jiantao. Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3), 1261-1275.
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite | TC[WOS]:21 TC[Scopus]:25  IF:7.0/6.8 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Modeling and detection of Camouflaging Worm Journal article
Yu W., Wang X., Calyam P., Xuan D., Zhao W.. Modeling and detection of Camouflaging Worm[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(3), 377.
Authors:  Yu W.;  Wang X.;  Calyam P.;  Xuan D.;  Zhao W.
Favorite | TC[WOS]:28 TC[Scopus]:51 | Submit date:2018/10/30
Anomaly Detection  Camouflage  Worm