×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [5]
Authors
ZHOU YICONG [4]
CHEN CHUN LUNG P... [1]
ZHOU JIANTAO [1]
Document Type
Journal article [5]
Conference paper [1]
Date Issued
2022 [2]
2020 [1]
2017 [2]
2014 [1]
Language
英語English [6]
Source Publication
IEEE Transaction... [2]
Conference Proce... [1]
IEEE TRANSACTION... [1]
IEEE Transaction... [1]
Information Scie... [1]
Indexed By
SCIE [5]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-6 of 6
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders
Journal article
Chen, Bing, Lu, Wei, Huang, Jiwu, Weng, Jian, Zhou, Yicong. Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 978-991.
Authors:
Chen, Bing
;
Lu, Wei
;
Huang, Jiwu
;
Weng, Jian
;
Zhou, Yicong
Favorite
|
TC[WOS]:
37
TC[Scopus]:
55
IF:
7.0
/
6.8
|
Submit date:2022/05/17
Encrypted Images
Multiple Data-hiders
Reversible Data Hiding
Secret Sharing
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
Journal article
Hua, Zhongyun, Wang, Yanxiang, Yi, Shuang, Zhou, Yicong, Jia, Xiaohua. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32(8), 4968-4982.
Authors:
Hua, Zhongyun
;
Wang, Yanxiang
;
Yi, Shuang
;
Zhou, Yicong
;
Jia, Xiaohua
Favorite
|
TC[WOS]:
32
TC[Scopus]:
44
IF:
8.3
/
7.1
|
Submit date:2022/05/17
Reversible Data Hiding
Cipher-feedback Secret Sharing
Encrypted Image
Multiple Data Hiders
Privacy-Preserving distributed deep learning based on secret sharing
Journal article
Jia Duan, Jiantao Zhou, Yuanman Li. Privacy-Preserving distributed deep learning based on secret sharing[J]. Information Sciences, 2020, 527, 108-127.
Authors:
Jia Duan
;
Jiantao Zhou
;
Yuanman Li
Adobe PDF
|
Favorite
|
TC[WOS]:
31
TC[Scopus]:
37
IF:
0
/
0
|
Submit date:2021/03/11
Deep Neural Network
Distributed Deep Learning
Privacy Preserving
Secret Sharing
Secure Multi-party Computation
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing
Journal article
Bao L., Yi S., Zhou Y.. Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:
Bao L.
;
Yi S.
;
Zhou Y.
Favorite
|
TC[WOS]:
56
TC[Scopus]:
63
|
Submit date:2018/12/21
Image Encryption
Secret Image Sharing
Sharing Matrix
Visual Cryptography
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing
Journal article
Bao, Long, Yi, Shuang, Zhou, Yicong. Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:
Bao, Long
;
Yi, Shuang
;
Zhou, Yicong
Favorite
|
TC[WOS]:
56
TC[Scopus]:
63
IF:
10.8
/
12.1
|
Submit date:2018/10/30
Secret Image Sharing
Visual Cryptography
Sharing Matrix
Image Encryption
A lossless (2, 8)-chaos-based secret image sharing scheme
Conference paper
Bao Long, Zhou Yicong, Chen C.L.P.. A lossless (2, 8)-chaos-based secret image sharing scheme[C], 2014, 3209-3214.
Authors:
Bao Long
;
Zhou Yicong
;
Chen C.L.P.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2018/12/21
Chaotic System
Image Encryption
Secret Image Sharing