UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model Journal article
Yuan, Ke, Huang, Yabing, Du, Zhanfei, Li, Jiabao, Jia, Chunfu. A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model[J]. Complex & Intelligent Systems, 2024, 10(1), 1131-1147.
Authors:  Yuan, Ke;  Huang, Yabing;  Du, Zhanfei;  Li, Jiabao;  Jia, Chunfu
Favorite | TC[WOS]:0 TC[Scopus]:2  IF:5.0/5.2 | Submit date:2024/02/22
Cluster Division Identification  Cryptanalysis  Cryptographic Algorithm Identification  Ensemble Learning  Hybrid RAndom Forest And Logistic Regression  Single-layer Identification  
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms Journal article
Chen, Junxin, Zhang, Leo Yu, Zhou, Yicong. Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31(12), 4747-4758.
Authors:  Chen, Junxin;  Zhang, Leo Yu;  Zhou, Yicong
Favorite | TC[WOS]:5 TC[Scopus]:6  IF:8.3/7.1 | Submit date:2022/01/14
Bitwise Exclusive Or  Cryptanalysis  Image Encryption  Modulo Addition  
Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes[J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 23, 2372-2385.
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite | TC[WOS]:39 TC[Scopus]:40  IF:8.4/8.0 | Submit date:2022/05/13
Chosen-ciphertext Attack  Cryptanalysis  Modular Addition  Substitution And Permutation  
Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table Journal article
Chen, Lei, Chen, Junxin, Ma, Lisha, Wang, Shihong. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table[J]. Nonlinear Dynamics, 2020, 100(4), 3959-3978.
Authors:  Chen, Lei;  Chen, Junxin;  Ma, Lisha;  Wang, Shihong
Favorite | TC[WOS]:12 TC[Scopus]:12  IF:5.2/4.8 | Submit date:2021/12/06
Chaotic Cryptograph  Chaotic Dynamics  Chosen-plaintext Attack  Image Cryptanalysis  Latin Square  
Cryptanalysis of a DNA-based image encryption scheme Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Cryptanalysis of a DNA-based image encryption scheme[J]. Information Sciences, 2020, 520, 130-141.
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite | TC[WOS]:124 TC[Scopus]:151  IF:0/0 | Submit date:2021/12/06
Cryptanalysis  Image Encryption  Hénon-sine Map  Dna Coding  
Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme Journal article
Chen, Lei, Chen, Junxin, Zhao, Geng, Wang, Shihong. Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme[J]. IEEE Access, 2019, 7, 97549-97565.
Authors:  Chen, Lei;  Chen, Junxin;  Zhao, Geng;  Wang, Shihong
Favorite | TC[WOS]:12 TC[Scopus]:16  IF:3.4/3.7 | Submit date:2022/05/23
Chaotic Cryptography  Cryptanalysis  Feature Codes  Image Security  Secure Watermarking  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen. Improved known-plaintext attack to permutation-only multimedia ciphers[J]. INFORMATION SCIENCES, 2017, 430, 228-239.
Authors:  Leo Yu Zhang;  Yuansheng Liu;  Cong Wang;  Jiantao Zhou;  Yushu Zhang; et al.
Adobe PDF | Favorite | TC[WOS]:60 TC[Scopus]:65  IF:0/0 | Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition