UM

Browse/Search Results:  1-10 of 51 Help

Selected(0)Clear Items/Page:    Sort:
Advancements in exponential synchronization and encryption techniques: Quaternion-Valued Artificial Neural Networks with two-sided coefficients Journal article
Li, Chenyang, Kou, Kit Ian, Zhang, Yanlin, Liu, Yang. Advancements in exponential synchronization and encryption techniques: Quaternion-Valued Artificial Neural Networks with two-sided coefficients[J]. Neural Networks, 2025, 183.
Authors:  Li, Chenyang;  Kou, Kit Ian;  Zhang, Yanlin;  Liu, Yang
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:6.0/7.9 | Submit date:2025/01/22
Controllers  Encryption Of Image  Exponential Synchronization  Quaternion-valued Artificial Neural Networks  Two-sided Coefficient  
Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control Journal article
Zhang, Yanlin, Yang, Liqiao, Kou, Kit Ian, Liu, Yang. Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control[J]. Knowledge-Based Systems, 2024, 296, 111953.
Authors:  Zhang, Yanlin;  Yang, Liqiao;  Kou, Kit Ian;  Liu, Yang
Favorite | TC[WOS]:3 TC[Scopus]:3  IF:7.2/7.4 | Submit date:2024/06/05
Event-triggered Impulsive Control  Finite-time Synchronization  Fractional-order Quaternion-valued Neural Networks  Image Encryption And Decryption  Quaternion-valued Linear Matrix Inequalities  
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:  Liu, Jun;  Zhou, Jiantao;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:1 TC[Scopus]:2  IF:5.2/4.9 | Submit date:2024/06/05
Deep Neural Networks  Encryption  Image Classification  Privacy-preserving  
A novel image encryption scheme with adaptive Fourier decomposition Journal article
Wu, Yongfei, Zhang, Liming, Liu, Xilin, Zhang, Hao. A novel image encryption scheme with adaptive Fourier decomposition[J]. Journal of the Franklin Institute, 2024, 361(4), 106630.
Authors:  Wu, Yongfei;  Zhang, Liming;  Liu, Xilin;  Zhang, Hao
Favorite | TC[WOS]:5 TC[Scopus]:5  IF:3.7/3.5 | Submit date:2024/04/02
Adaptive Fourier Decomposition  Bilateral Sequence Diffusion  Image Encryption  Index-sorted Mapping  Pixel Swapping  
A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System Journal article
Li,Shih Yu, Lee,Chun Hung, Tam,Lap Mou. A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System[J]. Sensors, 2023, 23(13), 5906.
Authors:  Li,Shih Yu;  Lee,Chun Hung;  Tam,Lap Mou
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:3.4/3.7 | Submit date:2023/08/03
Authorization  Hyper-chaotic System  Novel Image Encryption  Speaker Verification  
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:  Zhang,Chengrui;  Chen,Junxin;  Chen,Dongming;  Wang,Wei;  Zhang,Yushu; et al.
Favorite | TC[WOS]:9 TC[Scopus]:10  IF:8.4/8.0 | Submit date:2023/08/03
Chosen-plaintext Attack  Ciphers  Decoding  Dna  Dna Coding  Encoding  Encryption  Image Coding  Image Encryption  S-box Matrix  Security  
n-Dimensional Chaotic Map with application in secure communication Journal article
Cao, Weijia, Cai, Hang, Hua, Zhongyun. n-Dimensional Chaotic Map with application in secure communication[J]. Chaos, Solitons and Fractals, 2022, 163, 112519.
Authors:  Cao, Weijia;  Cai, Hang;  Hua, Zhongyun
Favorite | TC[WOS]:38 TC[Scopus]:45  IF:5.3/5.4 | Submit date:2022/11/07
Chaotic Map  Chaotic System  Secure Communication  Lyapunov Exponent  Image Encryption  
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation Journal article
Liu, Zi Long, Pun, Chi Man. Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 1382-1394.
Authors:  Liu, Zi Long;  Pun, Chi Man
Favorite | TC[WOS]:37 TC[Scopus]:47  IF:7.0/6.8 | Submit date:2022/05/17
Reversible Data Hiding  Encrypted Image  Chunk Encryption  Redundancy Matrix Representation  
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking Journal article
Xilin Liu, Yongfei Wu, Hao Zhang, Jiasong Wu, Liming Zhang. Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking[J]. Signal Processing, 2021, 189, 108275.
Authors:  Xilin Liu;  Yongfei Wu;  Hao Zhang;  Jiasong Wu;  Liming Zhang
Favorite | TC[WOS]:31 TC[Scopus]:35  IF:3.4/3.8 | Submit date:2022/05/13
Color Image Encryption  Color Image Watermarking  Quaternion Discrete Fractional Krawtchouk Transform  
Inverse computational ghost imaging for image encryption Journal article
Zheng, P, Tan, Q, Liu, H.. Inverse computational ghost imaging for image encryption[J]. Optics Express, 2021, 21290-21299.
Authors:  Zheng, P;  Tan, Q;  Liu, H.
Favorite |   IF:3.2/3.4 | Submit date:2022/06/05
Ghost Imaging  Image Encryption