UM

Browse/Search Results:  1-10 of 17 Help

Selected(0)Clear Items/Page:    Sort:
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:  Liu, Jun;  Zhou, Jiantao;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:5.2/4.9 | Submit date:2024/06/05
Deep Neural Networks  Encryption  Image Classification  Privacy-preserving  
Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model Journal article
Li, Xin, Zhu, Guopu, Wang, Shen, Zhou, Yicong, Zhang, Xinpeng. Deep Reverse Attack on SIFT Features With a Coarse-to-Fine GAN Model[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34(7), 6391 - 6402.
Authors:  Li, Xin;  Zhu, Guopu;  Wang, Shen;  Zhou, Yicong;  Zhang, Xinpeng
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:8.3/7.1 | Submit date:2024/05/16
Circuits And Systems  Data Privacy  Feature Extraction  Generative Adversarial Network (Gan)  Generative Adversarial Networks  Generators  Image Color Analysis  Image Reconstruction  Image Restoration  Reverse Attack  Scale Invariant Feature Transform (Sift)  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
Zheng, Yifeng, Duan, Huayi, Tang, Xiaoting, Wang, Cong, Zhou, Jiantao. Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3), 1261-1275.
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite | TC[WOS]:21 TC[Scopus]:25  IF:7.0/6.8 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Privacy Leakage of SIFT Features via Deep Generative Model Based Image Reconstruction Journal article
Wu, Haiwei, Zhou, Jiantao. Privacy Leakage of SIFT Features via Deep Generative Model Based Image Reconstruction[J]. IEEE Transactions on Information Forensics and Security, 2021, 16, 2973-2985.
Authors:  Wu, Haiwei;  Zhou, Jiantao
Favorite | TC[WOS]:8 TC[Scopus]:10  IF:6.3/7.3 | Submit date:2022/05/13
Deep Generative Model  Image Reconstruction  Privacy Leakage  Sift  
Homo-ELM: fully homomorphic extreme learning machine Journal article
Wang,Weiru, Gan,Yanfen, Vong,Chi Man, Chen,Chuangquan. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:  Wang,Weiru;  Gan,Yanfen;  Vong,Chi Man;  Chen,Chuangquan
Favorite | TC[WOS]:5 TC[Scopus]:7  IF:3.1/3.6 | Submit date:2021/03/11
Encrypted Image Classification  Encrypted Machine Learning  Extreme Learning Machine  Fully Homomorphic Encryption  Privacy Preservation  
Homo-ELM: fully homomorphic extreme learning machine Journal article
Wang, W.R., Gan, W.F., Vong, C. M., Chen, C.Q.. Homo-ELM: fully homomorphic extreme learning machine[J]. International Journal of Machine Learning and Cybernetics, 2020, 11(7), 1531-1540.
Authors:  Wang, W.R.;  Gan, W.F.;  Vong, C. M.;  Chen, C.Q.
Favorite | TC[WOS]:5 TC[Scopus]:7  IF:3.1/3.6 | Submit date:2022/08/09
Encrypted Machine Learning  Fully Homomorphic Encryption  Privacy Preservation  Extreme Learning Machine  Encrypted Image Classification  
Cosine-transform-based chaotic system for image encryption Journal article
Hua, Zhongyun, Zhou, Yicong, Huang, Hejiao. Cosine-transform-based chaotic system for image encryption[J]. Information Sciences, 2019, 480, 403-419.
Authors:  Hua, Zhongyun;  Zhou, Yicong;  Huang, Hejiao
Favorite | TC[WOS]:512 TC[Scopus]:592  IF:0/0 | Submit date:2022/05/23
Chaos-based Encryption  Chaotic System  Cryptography  Image Encryption  Image Privacy  Security Analysis  
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding Conference paper
Shuang Yi, Yicong Zhou. Reversible Data Hiding in Encrypted Images using Prediction-error Encoding[C], 2019, 1789-1793.
Authors:  Shuang Yi;  Yicong Zhou
Favorite | TC[WOS]:1 TC[Scopus]:2 | Submit date:2019/03/26
Reversible Data Hiding  Encrypted Image  Prediction-error Encoding  Weighted Checkerboard-based Prediction Privacy Protection  
Toward Secure Image Denoising: A Machine Learning Based Realization Conference paper
Yifeng Zheng, Cong Wang, Jiantao Zhou. Toward Secure Image Denoising: A Machine Learning Based Realization[C], 2018, 6936-6940.
Authors:  Yifeng Zheng;  Cong Wang;  Jiantao Zhou
Adobe PDF | Favorite | TC[WOS]:4 TC[Scopus]:3 | Submit date:2018/12/22
Cloud Computing  Image Denoising  Machine Learning  Neural Network  Privacy  
Adaptive code embedding for reversible data hiding in encrypted images Conference paper
Yi Shuang, Zhou Yicong. Adaptive code embedding for reversible data hiding in encrypted images[C], 2018, 4322-4326.
Authors:  Yi Shuang;  Zhou Yicong
Favorite | TC[WOS]:4 TC[Scopus]:10 | Submit date:2018/12/21
Adaptive Code Embedding  Encrypted Image  Privacy Protection  Reversible Data Hiding