×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [6]
Authors
ZHOU YICONG [3]
ZHOU JIANTAO [1]
Document Type
Journal article [7]
Date Issued
2024 [1]
2021 [1]
2020 [3]
2019 [1]
2017 [1]
Language
英語English [7]
Source Publication
Complex & Intell... [1]
IEEE Access [1]
IEEE TRANSACTION... [1]
IEEE TRANSACTION... [1]
INFORMATION SCIE... [1]
Information Scie... [1]
More...
Indexed By
SCIE [6]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-7 of 7
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model
Journal article
Yuan, Ke, Huang, Yabing, Du, Zhanfei, Li, Jiabao, Jia, Chunfu. A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model[J]. Complex & Intelligent Systems, 2024, 10(1), 1131-1147.
Authors:
Yuan, Ke
;
Huang, Yabing
;
Du, Zhanfei
;
Li, Jiabao
;
Jia, Chunfu
Favorite
|
TC[WOS]:
0
TC[Scopus]:
2
IF:
5.0
/
5.2
|
Submit date:2024/02/22
Cluster Division Identification
Cryptanalysis
Cryptographic Algorithm Identification
Ensemble Learning
Hybrid RAndom Forest And Logistic Regression
Single-layer Identification
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms
Journal article
Chen, Junxin, Zhang, Leo Yu, Zhou, Yicong. Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31(12), 4747-4758.
Authors:
Chen, Junxin
;
Zhang, Leo Yu
;
Zhou, Yicong
Favorite
|
TC[WOS]:
5
TC[Scopus]:
6
IF:
8.3
/
7.1
|
Submit date:2022/01/14
Bitwise Exclusive Or
Cryptanalysis
Image Encryption
Modulo Addition
Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes
Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes[J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 23, 2372-2385.
Authors:
Chen, Junxin
;
Chen, Lei
;
Zhou, Yicong
Favorite
|
TC[WOS]:
39
TC[Scopus]:
40
IF:
8.4
/
8.0
|
Submit date:2022/05/13
Chosen-ciphertext Attack
Cryptanalysis
Modular Addition
Substitution And Permutation
Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table
Journal article
Chen, Lei, Chen, Junxin, Ma, Lisha, Wang, Shihong. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table[J]. Nonlinear Dynamics, 2020, 100(4), 3959-3978.
Authors:
Chen, Lei
;
Chen, Junxin
;
Ma, Lisha
;
Wang, Shihong
Favorite
|
TC[WOS]:
12
TC[Scopus]:
12
IF:
5.2
/
4.8
|
Submit date:2021/12/06
Chaotic Cryptograph
Chaotic Dynamics
Chosen-plaintext Attack
Image Cryptanalysis
Latin Square
Cryptanalysis of a DNA-based image encryption scheme
Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Cryptanalysis of a DNA-based image encryption scheme[J]. Information Sciences, 2020, 520, 130-141.
Authors:
Chen, Junxin
;
Chen, Lei
;
Zhou, Yicong
Favorite
|
TC[WOS]:
124
TC[Scopus]:
151
IF:
0
/
0
|
Submit date:2021/12/06
Cryptanalysis
Image Encryption
Hénon-sine Map
Dna Coding
Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme
Journal article
Chen, Lei, Chen, Junxin, Zhao, Geng, Wang, Shihong. Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme[J]. IEEE Access, 2019, 7, 97549-97565.
Authors:
Chen, Lei
;
Chen, Junxin
;
Zhao, Geng
;
Wang, Shihong
Favorite
|
TC[WOS]:
12
TC[Scopus]:
16
IF:
3.4
/
3.7
|
Submit date:2022/05/23
Chaotic Cryptography
Cryptanalysis
Feature Codes
Image Security
Secure Watermarking
Improved known-plaintext attack to permutation-only multimedia ciphers
Journal article
Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen. Improved known-plaintext attack to permutation-only multimedia ciphers[J]. INFORMATION SCIENCES, 2017, 430, 228-239.
Authors:
Leo Yu Zhang
;
Yuansheng Liu
;
Cong Wang
;
Jiantao Zhou
;
Yushu Zhang
; et al.
Adobe PDF
|
Favorite
|
TC[WOS]:
60
TC[Scopus]:
65
IF:
0
/
0
|
Submit date:2018/10/30
Cryptanalysis
Known-plaintext Attack (Kpa)
Multimedia Encryption
Permutation
Transposition