×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [2]
Authors
ZHOU YICONG [2]
Document Type
Journal article [4]
Date Issued
2019 [3]
2006 [1]
Language
英語English [4]
Source Publication
IEEE Access [1]
IEEE TRANSACTION... [1]
Information Scie... [1]
WSEAS Transactio... [1]
Indexed By
SCIE [2]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-4 of 4
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Issue Date Ascending
Issue Date Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Cosine-transform-based chaotic system for image encryption
Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:
Hua, Zhongyun
;
Zhou, Yicong
;
Huang, Hejiao
Favorite
|
TC[WOS]:
512
TC[Scopus]:
592
IF:
0
/
0
|
Submit date:2022/05/23
Chaos-based Encryption
Chaotic System
Cryptography
Image Encryption
Image Privacy
Security Analysis
Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation
Journal article
Hua, Zhongyun, Zhou, Binghang, Zhou, Yicong. Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation[J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019, 66(2), 1273-1284.
Authors:
Hua, Zhongyun
;
Zhou, Binghang
;
Zhou, Yicong
Favorite
|
TC[WOS]:
178
TC[Scopus]:
198
IF:
7.5
/
8.0
|
Submit date:2018/10/30
Chaotic System
Chaotification
Chaos-based Application
Cryptography
Field-programmable Gate Array (Fpga) Implementation
Nonlinear Control
Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme
Journal article
Chen, Lei, Chen, Junxin, Zhao, Geng, Wang, Shihong. Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme[J]. IEEE Access, 2019, 7, 97549-97565.
Authors:
Chen, Lei
;
Chen, Junxin
;
Zhao, Geng
;
Wang, Shihong
Favorite
|
TC[WOS]:
12
TC[Scopus]:
16
IF:
3.4
/
3.7
|
Submit date:2022/05/23
Chaotic Cryptography
Cryptanalysis
Feature Codes
Image Security
Secure Watermarking
Asymptotic model of deterministic randomness and its application to secure communications
Journal article
Zhou J., Pei W., Wang K., He Z., Au O.. Asymptotic model of deterministic randomness and its application to secure communications[J]. WSEAS Transactions on Circuits and Systems, 2006, 5(3), 305-310.
Authors:
Zhou J.
;
Pei W.
;
Wang K.
;
He Z.
;
Au O.
Favorite
|
|
Submit date:2018/12/22
Chaotic cryptography
Deterministic randomness
Lissajous map