×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [8]
Authors
ZHOU YICONG [4]
ZHOU JIANTAO [2]
FONG SIMON JAMES [1]
LIU ZHI [1]
Document Type
Journal article [7]
Conference paper [1]
Date Issued
2021 [1]
2020 [1]
2017 [1]
2016 [3]
2014 [2]
Language
英語English [8]
Source Publication
IEEE TRANSACTION... [1]
IEEE Transaction... [1]
INFORMATION SCIE... [1]
Information Scie... [1]
Journal of Stati... [1]
Neurocomputing [1]
More...
Indexed By
SCIE [7]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-8 of 8
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos
Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(6), 2494-2508.
Authors:
Chen, Junxin
;
Chen, Lei
;
Zhou, Yicong
Favorite
|
TC[WOS]:
38
TC[Scopus]:
40
IF:
8.3
/
7.1
|
Submit date:2021/12/08
Chosen-ciphertext Attack
Permutation Substitution
Bit-wise Xor
Image Encryption
Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes
Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes[J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 23, 2372-2385.
Authors:
Chen, Junxin
;
Chen, Lei
;
Zhou, Yicong
Favorite
|
TC[WOS]:
39
TC[Scopus]:
40
IF:
8.4
/
8.0
|
Submit date:2022/05/13
Chosen-ciphertext Attack
Cryptanalysis
Modular Addition
Substitution And Permutation
Improved known-plaintext attack to permutation-only multimedia ciphers
Journal article
Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen. Improved known-plaintext attack to permutation-only multimedia ciphers[J]. INFORMATION SCIENCES, 2017, 430, 228-239.
Authors:
Leo Yu Zhang
;
Yuansheng Liu
;
Cong Wang
;
Jiantao Zhou
;
Yushu Zhang
; et al.
Adobe PDF
|
Favorite
|
TC[WOS]:
60
TC[Scopus]:
65
IF:
0
/
0
|
Submit date:2018/10/30
Cryptanalysis
Known-plaintext Attack (Kpa)
Multimedia Encryption
Permutation
Transposition
A test for the complete independence of high-dimensional random vectors
Journal article
Li W., Liu Z.. A test for the complete independence of high-dimensional random vectors[J]. Journal of Statistical Computation and Simulation, 2016, 86(16), 3135-3140.
Authors:
Li W.
;
Liu Z.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
2
|
Submit date:2019/02/14
Correlation Matrix
Extreme Value Distribution
High-dimensional
Hypothesis Testing
Permutation Test
Embedding cryptographic features in compressive sensing
Journal article
Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao. Embedding cryptographic features in compressive sensing[J]. Neurocomputing, 2016, 205, 472-480.
Authors:
Yushu Zhang
;
Jiantao Zhou
;
Fei Chen
;
Leo Yu Zhang
;
Kwok-Wo Wong
; et al.
Adobe PDF
|
Favorite
|
TC[WOS]:
84
TC[Scopus]:
103
IF:
5.5
/
5.5
|
Submit date:2018/10/30
Parallel Compressive Sensing
Random Permutation
Secure Compressive Sensing
Symmetric-key Cipher
Applying a Chaos-Based Firefly Algorithm to the Permutation Flow Shop Scheduling Problem
Conference paper
Hui-long Lo, Simon Fong, Yan Zhuang, Xi Wang, Thomas Hanne. Applying a Chaos-Based Firefly Algorithm to the Permutation Flow Shop Scheduling Problem[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016, 51-57.
Authors:
Hui-long Lo
;
Simon Fong
;
Yan Zhuang
;
Xi Wang
;
Thomas Hanne
Favorite
|
TC[WOS]:
3
TC[Scopus]:
4
|
Submit date:2019/02/13
Bio-inspired Optimization Algorithms
Permutation Flow Shop Scheduling Problem
Pfsp
Chaos-based Firefly Algorithm
Pso
Ga
Image encryption using binary bitplane
Journal article
Zhou Yicong, Cao Weijia, Philip Chen C.L.. Image encryption using binary bitplane[J]. Signal Processing, 2014, 100, 197-207.
Authors:
Zhou Yicong
;
Cao Weijia
;
Philip Chen C.L.
Favorite
|
TC[WOS]:
153
TC[Scopus]:
173
|
Submit date:2018/10/30
Bit-level Permutation
Bitplane Decomposition
Image Encryption
Security Analysis
Design of image cipher using latin squares
Journal article
Wu Yue, Zhou Yicong, Noonan J.P., Agaian Sos. Design of image cipher using latin squares[J]. Information Sciences, 2014, 264, 317-339.
Authors:
Wu Yue
;
Zhou Yicong
;
Noonan J.P.
;
Agaian Sos
Favorite
|
TC[WOS]:
143
TC[Scopus]:
161
|
Submit date:2018/10/30
Confusion-diffusion
Error Tolerance
Image Encryption
Latin Square
Substitution-permutation Network