×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [15]
Authors
ZHOU YICONG [13]
CHEN CHUN LUNG P... [8]
PUN CHI MAN [3]
TAM LAP MOU [1]
ZHOU JIANTAO [1]
Document Type
Journal article [10]
Conference paper [6]
Date Issued
2023 [1]
2022 [1]
2019 [1]
2017 [1]
2016 [2]
2015 [3]
More...
Language
英語English [16]
Source Publication
Conference Proce... [3]
Information Scie... [3]
Signal Processin... [3]
CSAE 2012 - Proc... [1]
Chaos, Solitons ... [1]
IEEE Transaction... [1]
More...
Indexed By
SCIE [14]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 16
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Submit date Ascending
Submit date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System
Journal article
Li,Shih Yu, Lee,Chun Hung, Tam,Lap Mou. A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System[J]. Sensors, 2023, 23(13), 5906.
Authors:
Li,Shih Yu
;
Lee,Chun Hung
;
Tam,Lap Mou
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
3.4
/
3.7
|
Submit date:2023/08/03
Authorization
Hyper-chaotic System
Novel Image Encryption
Speaker Verification
n-Dimensional Chaotic Map with application in secure communication
Journal article
Cao, Weijia, Cai, Hang, Hua, Zhongyun. n-Dimensional Chaotic Map with application in secure communication[J]. Chaos, Solitons and Fractals, 2022, 163, 112519.
Authors:
Cao, Weijia
;
Cai, Hang
;
Hua, Zhongyun
Favorite
|
TC[WOS]:
34
TC[Scopus]:
40
IF:
5.3
/
5.4
|
Submit date:2022/11/07
Chaotic Map
Chaotic System
Secure Communication
Lyapunov Exponent
Image Encryption
Cosine-transform-based chaotic system for image encryption
Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:
Hua, Zhongyun
;
Zhou, Yicong
;
Huang, Hejiao
Favorite
|
TC[WOS]:
516
TC[Scopus]:
596
IF:
0
/
0
|
Submit date:2022/05/23
Chaos-based Encryption
Chaotic System
Cryptography
Image Encryption
Image Privacy
Security Analysis
Medical image encryption using edge maps
Journal article
Cao, Weijia, Zhou, Yicong, Chen, C. L. Philip, Xia, Liming. Medical image encryption using edge maps[J]. Signal Processing, 2017, 132, 96-109.
Authors:
Cao, Weijia
;
Zhou, Yicong
;
Chen, C. L. Philip
;
Xia, Liming
Favorite
|
TC[WOS]:
118
TC[Scopus]:
153
IF:
3.4
/
3.8
|
Submit date:2018/10/30
Bit-plane Decomposition
Chaotic Map
Dge Map
Medical Image Encryption
Image encryption using 2D Logistic-adjusted-Sine map
Journal article
Hua Zhongyun, Zhou Yicong. Image encryption using 2D Logistic-adjusted-Sine map[J]. Information Sciences, 2016, 339, 237-253.
Authors:
Hua Zhongyun
;
Zhou Yicong
Favorite
|
TC[WOS]:
555
TC[Scopus]:
641
|
Submit date:2018/10/30
Chaotic Encryption
Chaotic Map
Confusion And Diffusion
Image Encryption
Image Cipher Using a New Interactive Two-Dimensional Chaotic Map
Conference paper
Hua Zhongyun, Wang Yiran, Zhou Yicong. Image Cipher Using a New Interactive Two-Dimensional Chaotic Map[C], 2016, 1804-1808.
Authors:
Hua Zhongyun
;
Wang Yiran
;
Zhou Yicong
Favorite
|
TC[WOS]:
6
TC[Scopus]:
6
|
Submit date:2018/12/21
Chaotic Map
Image Encryption
Two-dimensional (2d) Tent-cascade-logistic Map (2d-tclm)
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization
Journal article
Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su. Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization[J]. Security and Communication Networks, 2015, 9(1), 43-53.
Authors:
Yushu Zhang
;
Di Xiao
;
Kwok-Wo Wong
;
Jiantao Zhou
;
Sen Bai
; et al.
Adobe PDF
|
Favorite
|
TC[WOS]:
3
TC[Scopus]:
4
IF:
1.968
/
2.079
|
Submit date:2018/12/22
Arithmetic Coding
Chaotic Map
Joint Compression And Encryption
Perturbation
Cascade Chaotic System with Applications
Journal article
Zhou Yicong, Hua Zhongyun, Pun C.-M., Philip Chen C.L.. Cascade Chaotic System with Applications[J]. IEEE Transactions on Cybernetics, 2015, 45(9), 2001 - 2012.
Authors:
Zhou Yicong
;
Hua Zhongyun
;
Pun C.-M.
;
Philip Chen C.L.
Favorite
|
TC[WOS]:
273
TC[Scopus]:
309
|
Submit date:2018/10/30
Cascade Chaotic System (Ccs)
Chaotic Map
Data Encryption
Pseudo-random Number Generator (Prng)
2D Sine Logistic modulation map for image encryption
Journal article
Hua Zhongyun, Zhou Yicong, Pun C.-M., Chen C.L.P.. 2D Sine Logistic modulation map for image encryption[J]. Information Sciences, 2015, 297, 80-94.
Authors:
Hua Zhongyun
;
Zhou Yicong
;
Pun C.-M.
;
Chen C.L.P.
Favorite
|
TC[WOS]:
593
TC[Scopus]:
669
|
Submit date:2018/10/30
2d Sine Logistic Modulation Map
Chaotic Magic Transform
Image Encryption
A new 1D chaotic system for image encryption
Journal article
Zhou Yicong, Bao Long, Chen C.L.P.. A new 1D chaotic system for image encryption[J]. Signal Processing, 2014, 97, 172-182.
Authors:
Zhou Yicong
;
Bao Long
;
Chen C.L.P.
Favorite
|
TC[WOS]:
636
TC[Scopus]:
752
|
Submit date:2018/10/30
Chaotic System
Chosen-plaintext Attack
Image Encryption
Security Analysis