检索结果分析
成果/Result
成果类型
- 期刊论文
- 学位论文
- 专利
- 会议论文
- 科技成果
- 标准
- 专著
- 产品
- 科技报告
- 政策法规
- 内部文献
- 报纸
- Image encryption and hiding algorithm based on compressive sensing and random numbers insertion
- SIGNAL PROCESSINGYe, Guodong Pan, Chen Dong, Youxia Shi, Yang Huang, Xiaoling 出版年:2020
- Most current image encryption algorithms encrypt plain images directly into meaningless cipher images. Visually, a few of them are vulnerable to illegal attacks on a few sharing platforms or open channels when bEIng tran...
- An efficient pixel-level chaotic image encryption algorithm
- NONLINEAR DYNAMICSYe, Guodong Pan, Chen Huang, Xiaoling Mei, Qixiang 出版年:2018
- In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position shuf...
- An efficient symmetric image encryption algorithm based on an intertwining logistic map
- NEUROCOMPUTINGYe, Guodong Huang, Xiaoling 出版年:2017
- Differing from the traditional permutation-diffusion architecture, an efficient symmetric image encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a plain-image, which is measured ...
- A Chaotic Image Encryption Algorithm Based on Information Entropy
- INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Pan, Chen Huang, Xiaoling Zhao, Zhenyu He, Jianqing 出版年:2018
- This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich's structure, the proposed method contains permutation, modulation, and diffusion (PMD) operations. This me...
- Entropy-based wEIghts on decision makers in group decision-making setting with hybrid preference representations
- APPLIED SOFT COMPUTINGYue, Chuan 出版年:2017
- The wEIghts of decision makers play an important role in group decision-making problems. Entropy is a very important measure in information science. This work models an approach to determine the wEIghts of decision maker...
- Double image encryption algorithm based on compressive sensing and elliptic curve
- ALEXANDRIA ENGINEERING JOURNALYe, Guodong Liu, Min Wu, Mingfa 出版年:2022
- A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary chaotic state to a hyperchaotic state, that is, chaotic behavior tends to become more comp...
- Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform
- FRONTIERS OF COMPUTER SCIENCEHuang, Xiaoling Dong, Youxia Ye, Guodong Shi, Yang 出版年:2023
- A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA al...
- A novel method for large-scale group decision-making with application to e-commerce software system evaluation
- Applied Soft ComputingYue, Chuan 出版年:2026
- BACKGROUND: Large-scale group decision-making (LSGDM) in big data environments faces challenges in robust data center construction, objective expert wEIghting, and efficient information fusion. OBJECTIVE: This study aims...
- Quantum logistic image encryption algorithm based on SHA-3 and RSA
- NONLINEAR DYNAMICSYe, Guodong Jiao, Kaixin Huang, Xiaoling 出版年:2021
- This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate k...
- A golden section-based group decision-making approach to software trustworthiness evaluation
- Soft ComputingYue, Chuan 出版年:2025
- Software trustworthiness evaluation is a multi-dimensional evaluation problem, which can be accurately evaluated according to decision science. Group decision-making method is a comprehensive method for handing the multi...
- An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
- INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Jiao, Kaixin Wu, Huishan Pan, Chen Huang, Xiaoling 出版年:2020
- HerEIn, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated b...
- Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image
- ALEXANDRIA ENGINEERING JOURNALHuang, Xiaoling Dong, Youxia Zhu, Hongyong Ye, Guodong 出版年:2022
- This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed...
- A dual-path feature reuse multi-scale network for remote sensing image super-resolution
- Journal of SupercomputingXiao, Huanling Chen, Xintong Luo, Liuhui Lin, Cong 出版年:2025
- Deep neural networks have achieved significant success in the super-resolution of remote sensing images. However, existing deep learning models still suffer from the issue of blurry pseudo-artifacts when restoring high-f...
- Two normalized projection models and application to group decision-making
- Journal of Intelligent and Fuzzy SystemsYue, Chuan 出版年:2017
- Projection can measure not only the distance but also the angle between two decision objects. It has become one of important tools for complex decisions. This research finds that the existing projection formulae are unre...
- A visual meaningful encryption and hiding algorithm for multiple images
- NONLINEAR DYNAMICSYe, Guodong Guo, Liming 出版年:2024
- To protect the privacy of multiple images simultaneously in the digital information era, this paper proposes a novel multi-image encryption and hiding algorithm (MiEHA) with the help of a new three-dimensional coupled ch...
- An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
- SECURITY AND COMMUNICATION NETWORKSLin, Riguang Li, Sheng 出版年:2021
- This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algor...
- Authenticated reversible image hiding algorithm based on blockchain technology
- Cluster ComputingYe, Guodong Chen, Zhuozhao 出版年:2025
- An authenticated reversible image hiding algorithm based on blockchain framework is presented in this paper. First, global EIgenvalues of the plain image are extracted as plaintext keys. Meanwhile, a novel key transforma...
- A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition
- TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIESYe, Guodong Pan, Chen Dong, Youxia Jiao, Kaixin Huang, Xiaoling 出版年:2021
- Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi-image visual encryption algorithm based on compressive sensing (CS) and ...
- Modeling extenics innovation software by intelligent service components
- Open Cybernetics and Systemics JournalFan, Rui 出版年:2014
- Independent innovation is the core of the national development strategy. After twenty years, Extenics made great progress in innovation theory, formal method and real application. Developing and manufacturing innovation ...
- A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making
- COMPUTERS & INDUSTRIAL ENGINEERINGYue, Chuan 出版年:2016
- The ranking of interval-valued intuitionistic fuzzy numbers (IVIFNs) is very important for fuzzy decision making problems. This paper presents a geometric approach for ranking IVIFNs. Based on the technique for order per...
- Picture fuzzy normalized projection and extended VIKOR approach to software reliability assessment
- APPLIED SOFT COMPUTINGYue, Chuan 出版年:2020
- An extended Vlsekriterijumska optimizacija i KOmpromisno Resenje (VIKOR) method in group decision-making (GDM) setting is developed in this paper. The decision information is characterized by picture fuzzy number. A new ...
- An intrusion detection method for internet of things based on suppressed fuzzy clustering
- EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKINGLiu, Liqun Xu, Bing Zhang, Xiaoping Wu, Xianjun 出版年:2018
- In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA...
- pLMFPPred: a novel approach for accurate prediction of functional peptides integrating embedding from pre-trained protEIn language model and imbalanced learning
- arXivMa, Zebin Zou, Yonglin Huang, Xiaobin Yan, Wenjin Xu, Hao Yang, Jiexin Zhang, Ying Huang, Jinqi 出版年:2023
- Background Functional peptides have the potential to treat a variety of diseases. ThEIr good therapeutic efficacy and low toxicity make them ideal therapeutic agents. Artificial intelligence-based computational strategie...
- Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion
- OptikLiu, Shoukang Ye, Guodong 出版年:2023
- In order to address the security risks associated with the theft of private images over open Internet of Things (IoT), this paper introduces a new Logistic-Sine-Coupling Map (LoSCM) in three dimensions with a better chao...
- An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
- SECURITY AND COMMUNICATION NETWORKSYe, Guodong Jiao, Kaixin Pan, Chen Huang, Xiaoling 出版年:2018
- In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysi...
- COLLABORATIVE OPTIMIZATION OF MULTICLASS IMBALANCED LEARNING: DENSITY-AWARE AND REGION-GUIDED BOOSTING
- arXivLi, Chuantao Li, Zhi Xu, Jiahao Li, Jie Li, Sheng 出版年:2025
- Numerous studies attempt to mitigate classification bias caused by class imbalance. However, existing studies have yet to explore the collaborative optimization of imbalanced learning and model training. This constraint ...
- Face Template Protection through Residual Learning Based Error-Correcting Codes
- ACM International Conference Proceeding SeriesZhou, Junwei Shang, Delong Lang, Huile Ye, Guodong Xia, Zhe 出版年:2021
- The leakage of the face template leads to severe security problems since the facial image is unique and irreplaceable to each individual. Many researchers have been devoted to protecting the face template. Nevertheless, ...
- Asymmetric Image Encryption-Hiding Scheme Based on Reversible Neural Network
- SSRNLiu, Min Ye, Guodong 出版年:2024
- In this paper, a novel asymmetric image encryption-hiding scheme (AiEhS) using reversible neural network (RNN) is presented, which mainly use the strong learning ability of deep learning for compression and hiding of the...
- Analysis of Machine Learning Methods for Water Quality Evaluation of Penaeus VannamEI
- ACM International Conference Proceeding SeriesPeng, Xiaohong Li, Zixin Ma, Zebin Zhang, Ying 出版年:2023
- In global aquaculture, Penaeus vannamEI stands out due to its immense economic importance. Water quality, bEIng pivotal for its successful cultivation, demands precise evaluation techniques. This research undertook a met...
- Visually meaningful image encryption algorithm based on digital signature
- DIGITAL COMMUNICATIONS AND NETWORKSHuang, Xiaoling Dong, Youxia Ye, Guodong Yap, Wun-She Goi, Bok-Min 出版年:2023
- Traditional image encryption algorithms transform a plain image into a noise-like image. To lower the chances for the encrypted image bEIng detected by the attacker during the image transmission, a visually meaningful im...
