×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [16]
THE STATE KEY LA... [2]
Authors
ZHOU JIANTAO [6]
ZHOU YICONG [5]
VONG CHI MAN [2]
CHEN CHUN LUNG P... [1]
WONG PAK KIN [1]
Document Type
Journal article [14]
Conference paper [3]
Date Issued
2024 [2]
2021 [2]
2020 [2]
2019 [2]
2018 [3]
2017 [3]
More...
Language
英語English [17]
Source Publication
ACM Transactions... [2]
IEEE Transaction... [2]
International Jo... [2]
Optics Communica... [2]
ICASSP, IEEE Int... [1]
IEEE Transaction... [1]
More...
Indexed By
SCIE [12]
CPCI-S [2]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 17
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples
Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:
Liu, Jun
;
Zhou, Jiantao
;
Tian, Jinyu
;
Sun, Weiwei
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
IF:
5.2
/
4.9
|
Submit date:2024/06/05
Deep Neural Networks
Encryption
Image Classification
Privacy-preserving
Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model
Journal article
Li, Xin, Zhu, Guopu, Wang, Shen, Zhou, Yicong, Zhang, Xinpeng. Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6391 - 6402.
Authors:
Li, Xin
;
Zhu, Guopu
;
Wang, Shen
;
Zhou, Yicong
;
Zhang, Xinpeng
Favorite
|
TC[WOS]:
0
TC[Scopus]:
1
IF:
8.3
/
7.1
|
Submit date:2024/05/16
Circuits And Systems
Data Privacy
Feature Extraction
Generative Adversarial Network (Gan)
Generative Adversarial Networks
Generators
Image Color Analysis
Image Reconstruction
Image Restoration
Reverse Attack
Scale Invariant Feature Transform (Sift)
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising
Journal article
Zheng, Yifeng, Duan, Huayi, Tang, Xiaoting, Wang, Cong, Zhou, Jiantao. Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3), 1261-1275.
Authors:
Zheng, Yifeng
;
Duan, Huayi
;
Tang, Xiaoting
;
Wang, Cong
;
Zhou, Jiantao
Adobe PDF
|
Favorite
|
TC[WOS]:
21
TC[Scopus]:
25
IF:
7.0
/
6.8
|
Submit date:2021/12/07
Cloud Computing
Deep Neural Networks
Image Denoising
Privacy Preservation
Privacy Leakage of SIFT Features via Deep Generative Model Based Image Reconstruction
Journal article
Wu, Haiwei, Zhou, Jiantao. Privacy Leakage of SIFT Features via Deep Generative Model Based Image Reconstruction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16, 2973-2985.
Authors:
Wu, Haiwei
;
Zhou, Jiantao
Favorite
|
TC[WOS]:
8
TC[Scopus]:
10
IF:
6.3
/
7.3
|
Submit date:2022/05/13
Deep Generative Model
Image Reconstruction
Privacy Leakage
Sift
Homo-ELM: fully homomorphic extreme learning machine
Journal article
Wang,Weiru, Gan,Yanfen, Vong,Chi Man, Chen,Chuangquan. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:
Wang,Weiru
;
Gan,Yanfen
;
Vong,Chi Man
;
Chen,Chuangquan
Favorite
|
TC[WOS]:
5
TC[Scopus]:
7
IF:
3.1
/
3.6
|
Submit date:2021/03/11
Encrypted Image Classification
Encrypted Machine Learning
Extreme Learning Machine
Fully Homomorphic Encryption
Privacy Preservation
Homo-ELM: fully homomorphic extreme learning machine
Journal article
Wang, W.R., Gan, W.F., Vong, C. M., Chen, C.Q.. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:
Wang, W.R.
;
Gan, W.F.
;
Vong, C. M.
;
Chen, C.Q.
Favorite
|
TC[WOS]:
5
TC[Scopus]:
7
IF:
3.1
/
3.6
|
Submit date:2022/08/09
Encrypted Machine Learning
Fully Homomorphic Encryption
Privacy Preservation
Extreme Learning Machine
Encrypted Image Classification
Cosine-transform-based chaotic system for image encryption
Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:
Hua, Zhongyun
;
Zhou, Yicong
;
Huang, Hejiao
Favorite
|
TC[WOS]:
512
TC[Scopus]:
592
IF:
0
/
0
|
Submit date:2022/05/23
Chaos-based Encryption
Chaotic System
Cryptography
Image Encryption
Image Privacy
Security Analysis
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding
Conference paper
Shuang Yi, Yicong Zhou. Reversible Data Hiding in Encrypted Images using Prediction-error Encoding[C], 2019, 1789-1793.
Authors:
Shuang Yi
;
Yicong Zhou
Favorite
|
TC[WOS]:
1
TC[Scopus]:
2
|
Submit date:2019/03/26
Reversible Data Hiding
Encrypted Image
Prediction-error Encoding
Weighted Checkerboard-based Prediction Privacy Protection
Toward Secure Image Denoising: A Machine Learning Based Realization
Conference paper
Yifeng Zheng, Cong Wang, Jiantao Zhou. Toward Secure Image Denoising: A Machine Learning Based Realization[C], 2018, 6936-6940.
Authors:
Yifeng Zheng
;
Cong Wang
;
Jiantao Zhou
Adobe PDF
|
Favorite
|
TC[WOS]:
4
TC[Scopus]:
3
|
Submit date:2018/12/22
Cloud Computing
Image Denoising
Machine Learning
Neural Network
Privacy
Adaptive code embedding for reversible data hiding in encrypted images
Conference paper
Yi Shuang, Zhou Yicong. Adaptive code embedding for reversible data hiding in encrypted images[C], 2018, 4322-4326.
Authors:
Yi Shuang
;
Zhou Yicong
Favorite
|
TC[WOS]:
4
TC[Scopus]:
10
|
Submit date:2018/12/21
Adaptive Code Embedding
Encrypted Image
Privacy Protection
Reversible Data Hiding