检索结果分析

成果/Result
成果类型
- 期刊论文
- 学位论文
- 专利
- 会议论文
- 科技成果
- 标准
- 专著
- 产品
- 科技报告
- 政策法规
- 内部文献
- 报纸
- An efficient pixel-level chaotic image encryption algorithm
- NONLINEAR DYNAMICSYe, Guodong Pan, Chen Huang, Xiaoling Mei, Qixiang 出版年:2018
- In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position shuf...
- Image encryption and hiding algorithm based on compressive sensing and random numbers insertion
- SIGNAL PROCESSINGYe, Guodong Pan, Chen Dong, Youxia Shi, Yang Huang, Xiaoling 出版年:2020
- Most current image encryption algorithms encrypt plain images directly into meaningless cipher images. Visually, a few of them are vulnerable to illegal attacks on a few sharing platforms or open channels when being tran...
- An efficient symmetric image encryption algorithm based on an intertwining logistic map
- NEUROCOMPUTINGYe, Guodong Huang, Xiaoling 出版年:2017
- Differing from the traditional permutation-diffusion architecture, an efficient symmetric image encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a plain-image, which is measured ...
- A Chaotic Image Encryption Algorithm Based on Information Entropy
- INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Pan, Chen Huang, Xiaoling Zhao, Zhenyu He, Jianqing 出版年:2018
- This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich's structure, the proposed method contains permutation, modulation, and diffusion (PMD) operations. This me...
- Entropy-based weights on decision makers in group decision-making setting with hybrid preference representations
- APPLIED SOFT COMPUTINGYue, Chuan 出版年:2017
- The weights of decision makers play an important role in group decision-making problems. Entropy is a very important measure in information SCIence. This work models an approach to determine the weights of decision maker...
- Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform
- FRONTIERS OF COMPUTER SCIENCEHuang, Xiaoling Dong, Youxia Ye, Guodong Shi, Yang 出版年:2023
- A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA al...
- Quantum logistic image encryption algorithm based on SHA-3 and RSA
- NONLINEAR DYNAMICSYe, Guodong Jiao, Kaixin Huang, Xiaoling 出版年:2021
- This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate k...
- Double image encryption algorithm based on compressive sensing and elliptic curve
- ALEXANDRIA ENGINEERING JOURNALYe, Guodong Liu, Min Wu, Mingfa 出版年:2022
- A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary chaotic state to a hyperchaotic state, that is, chaotic behavior tends to become more comp...
- An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
- INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Jiao, Kaixin Wu, Huishan Pan, Chen Huang, Xiaoling 出版年:2020
- Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated b...
- Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image
- ALEXANDRIA ENGINEERING JOURNALHuang, Xiaoling Dong, Youxia Zhu, Hongyong Ye, Guodong 出版年:2022
- This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed...
- A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making
- COMPUTERS & INDUSTRIAL ENGINEERINGYue, Chuan 出版年:2016
- The ranking of interval-valued intuitionistic fuzzy numbers (IVIFNs) is very important for fuzzy decision making problems. This paper presents a geometric approach for ranking IVIFNs. Based on the technique for order per...
- A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition
- TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIESYe, Guodong Pan, Chen Dong, Youxia Jiao, Kaixin Huang, Xiaoling 出版年:2021
- Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi-image visual encryption algorithm based on compressive sensing (CS) and ...
- An intrusion detection method for internet of things based on suppressed fuzzy clustering
- EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKINGLiu, Liqun Xu, Bing Zhang, Xiaoping Wu, Xianjun 出版年:2018
- In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA...
- Picture fuzzy normalized projection and extended VIKOR approach to software reliability assessment
- APPLIED SOFT COMPUTINGYue, Chuan 出版年:2020
- An extended Vlsekriterijumska optimizacija i KOmpromisno Resenje (VIKOR) method in group decision-making (GDM) setting is developed in this paper. The decision information is characterized by picture fuzzy number. A new ...
- An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
- SECURITY AND COMMUNICATION NETWORKSYe, Guodong Jiao, Kaixin Pan, Chen Huang, Xiaoling 出版年:2018
- In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysi...
- An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
- SECURITY AND COMMUNICATION NETWORKSLin, Riguang Li, Sheng 出版年:2021
- This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algor...
- Detecting abnormal crowd behaviors based on the div-curl characteristics of flow fields
- PATTERN RECOGNITIONChen, Xiao-Han Lai, Jian-Huang 出版年:2019
- This study proposes a divergence-curl-driven framework for the perception of crowd motion states. In this framework, the characteristics of a flow field, divergence and curl, are used to analyze crowd states. As a collec...
- Adhesive-free bonding homogenous fused-silica Fabry-Perot optical fiber low pressure sensor in harsh environments by CO<sub>2</sub> laser welding
- OPTICS COMMUNICATIONSWang Wenhua Wu Weina Wu Shengxu Li Yongqiang Huang Cunyou Tian Xiuyun Fei Xianxiang Huang Jiang 出版年:2019
- In this paper, we present a high-sensitivity homogenous fused-silica low pressure sensor. It was constructed from the commercially available standard silica fiber, fused-silica diaphragm and ferrule through CO2 laser all...
- Novel Meaningful Image Encryption Based on Block Compressive Sensing
- SECURITY AND COMMUNICATION NETWORKSPan, Chen Ye, Guodong Huang, Xiaoling Zhou, Junwei 出版年:2019
- This paper proposes a new image compression-encryption algorithm based on a meaningful image encryption framework. In block compressed sensing, the plain image is divided into blocks, and subsequently, each block is rend...
- Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm
- SECURITY AND COMMUNICATION NETWORKSJiao, Kaixin Ye, Guodong Dong, Youxia Huang, Xiaoling He, Jianqing 出版年:2020
- This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest-Shamir-Adleman (RSA) algorithm. First, the parameters of the generalized Arnold map are generated by an asymmetric encryption...
- A stable least residue method in reproducing kernel space for solving a nonlinear fractional integro-differential equation with a weakly singular kernel
- APPLIED NUMERICAL MATHEMATICSDu, Hong Chen, Zhong Yang, Tiejun 出版年:2020
- A stable least residue method for solving a nonlinear fractional integro-differential equation with a weakly singular kernel in the reproducing kernel space is proposed. To solve the equation, the multiwavelets bases in ...
- An image encryption scheme based on public key cryptosystem and quantum logistic map
- SCIENTIFIC REPORTSYe, Guodong Jiao, Kaixin Huang, Xiaoling Goi, Bok-Min Yap, Wun-She 出版年:2020
- Most of existing image encryption schemes are proposed in the spatial domain which easily destroys the correlation between pixels. This paper proposes an image encryption scheme by employing discrete cosine transform (DC...
- A self-cited pixel summation based image encryption algorithm
- CHINESE PHYSICS BYe, Guo-Dong Huang, Xiao-Ling Zhang, Leo Yu Wang, Zheng-Xia 出版年:2017
- In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a g...
- 关键词:pixel summation image encryption algorithm intertwining logistic map gravity security 被引量:25
- An image encryption algorithm based on irregular wave representation
- MULTIMEDIA TOOLS AND APPLICATIONSHuang, Xiaoling Ye, Guodong 出版年:2018
- For a gray image, every row (column) can be seen as an irregular wave. Activated by the architecture of permutation-diffusion based image encryption scheme, a chaotic image encryption algorithm is proposed to change the ...
- An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing
- OPTIKChen, Zhuozhao Ye, Guodong 出版年:2022
- Objective: In order to avoid the unauthorized access to private images and make a secure communication, an asymmetric image encryption algorithm based on SHA-3 and compressive sensing is proposed.Methods: Firstly, a rand...
- Spatial image encryption algorithm based on chaotic map and pixel frequency
- SCIENCE CHINA-INFORMATION SCIENCESYe, Guodong Huang, Xiaoling 出版年:2018
- [No abstract available]
- Smart Contract Classification With a Bi-LSTM Based Approach
- IEEE ACCESSTian, Gang Wang, Qibo Zhao, Yi Guo, Lantian Sun, Zhonglin Lv, Liangyu 出版年:2020
- With the number of smart contracts growing rapidly, retrieving the relevant smart contracts quickly and accurately has become an important issue. A key step for recognizing the related smart contracts is able to classify...
- Normalized projection approach to group decision-making with hybrid decision information
- INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICSYue, Chuan 出版年:2018
- Projection is an important measure in decision SCIence, and it is also often used as a tool for various administrators. However, there are some defects in the existing projection models. To solve this significant SCIenti...
- An interval-valued intuitionistic fuzzy projection-based approach and application to evaluating knowledge transfer effectiveness
- NEURAL COMPUTING & APPLICATIONSYue, Chuan 出版年:2019
- Projection measure is one of the most important tools for group decision-making (GDM) problems. However, this research finds that the existing projection measure is not always reasonable in interval-valued intuitionistic...
- Projection-based approach to group decision-making with hybrid information representations and application to software quality evaluation
- COMPUTERS & INDUSTRIAL ENGINEERINGYue, Chuan 出版年:2019
- Group decision-making (GDM) is regarded as a main part of modem decision SCIence. The weights of decision makers (DMs) are very important in the actual GDM process. How to determine the weights of DMs and to identify the...