登录    注册    忘记密码    使用帮助

数学与计算机学院(软件学院) 收藏

导出分析报告

被引量:5,678H指数:32SCI-EXPANDED: 303EI: 315北大核心: 83CSCD: 63

-

检索结果分析

结果分析中...
排序方式:

837 条 记 录,以下是 1-30

Image encryption and hiding algorithm based on compressive sensing and random numbers insertion
SIGNAL PROCESSINGYe, Guodong Pan, Chen Dong, Youxia Shi, Yang Huang, Xiaoling  出版年:2020
Most current image encryption algorithms encrypt plain images directly into meaningless cipher images. Visually, a few of them are vulnerable to illegal attacks on a few sharing platforms or open channels when being tran...
An efficient pixel-level chaotic image encryption algorithm
NONLINEAR DYNAMICSYe, Guodong Pan, Chen Huang, Xiaoling Mei, Qixiang  出版年:2018
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position shuf...
An efficient symmetric image encryption algorithm based on an intertwining logistic map
NEUROCOMPUTINGYe, Guodong Huang, Xiaoling  出版年:2017
Differing from the traditional permutation-diffusion architecture, an efficient symmetric image encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a plain-image, which is measured ...
A Chaotic Image Encryption Algorithm Based on Information Entropy
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Pan, Chen Huang, Xiaoling Zhao, Zhenyu He, Jianqing  出版年:2018
This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich's structure, the proposed method contains permutation, modulation, and diffusion (PMD) operations. This me...
Entropy-based weights on decision makers in group decision-making setting with hybrid preference representations
APPLIED SOFT COMPUTINGYue, Chuan  出版年:2017
The weights of decision makers play an important role in group decision-making problems. Entropy is a very important measure in information science. This work models an approach to determine the weights of decision maker...
Double image encryption algorithm based on compressive sensing and elliptic curve
ALEXANDRIA ENGINEERING JOURNALYe, Guodong Liu, Min Wu, Mingfa  出版年:2022
A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary chaotic state to a hyperchaotic state, that is, chaotic behavior tends to become more comp...
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform
FRONTIERS OF COMPUTER SCIENCEHuang, Xiaoling Dong, Youxia Ye, Guodong Shi, Yang  出版年:2023
A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA al...
A novel method for large-scale group decision-making with application to e-commerce software system evaluation
Applied Soft ComputingYue, Chuan  出版年:2026
BACKGROUND: Large-scale group decision-making (LSGDM) in big data environments faces challenges in robust data center construction, objective expert weighting, and efficient information fusion. OBJECTIVE: This study aims...
Quantum logistic image encryption algorithm based on SHA-3 and RSA
NONLINEAR DYNAMICSYe, Guodong Jiao, Kaixin Huang, Xiaoling  出版年:2021
This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate k...
A golden section-based group decision-making approach to software trustworthiness evaluation
Soft ComputingYue, Chuan  出版年:2025
Software trustworthiness evaluation is a multi-dimensional evaluation problem, which can be accurately evaluated according to decision science. Group decision-making method is a comprehensive method for handing the multi...
An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Jiao, Kaixin Wu, Huishan Pan, Chen Huang, Xiaoling  出版年:2020
Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated b...
Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image
ALEXANDRIA ENGINEERING JOURNALHuang, Xiaoling Dong, Youxia Zhu, Hongyong Ye, Guodong  出版年:2022
This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed...
A dual-path feature reuse multi-scale network for remote sensing image super-resolution
Journal of SupercomputingXiao, Huanling Chen, Xintong Luo, Liuhui Lin, Cong  出版年:2025
Deep neural networks have achieved significant success in the super-resolution of remote sensing images. However, existing deep learning models still suffer from the issue of blurry pseudo-artifacts when restoring high-f...
Two normalized projection models and application to group decision-making
Journal of Intelligent and Fuzzy SystemsYue, Chuan  出版年:2017
Projection can measure not only the distance but also the angle between two decision objects. It has become one of important tools for complex decisions. This research finds that the existing projection formulae are unre...
A visual meaningful encryption and hiding algorithm for multiple images
NONLINEAR DYNAMICSYe, Guodong Guo, Liming  出版年:2024
To protect the privacy of multiple images simultaneously in the digital information era, this paper proposes a novel multi-image encryption and hiding algorithm (MiEHA) with the help of a new three-dimensional coupled ch...
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
SECURITY AND COMMUNICATION NETWORKSLin, Riguang Li, Sheng  出版年:2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algor...
Authenticated reversible image hiding algorithm based on blockchain technology
Cluster ComputingYe, Guodong Chen, Zhuozhao  出版年:2025
An authenticated reversible image hiding algorithm based on blockchain framework is presented in this paper. First, global eigenvalues of the plain image are extracted as plaintext keys. Meanwhile, a novel key transforma...
A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIESYe, Guodong Pan, Chen Dong, Youxia Jiao, Kaixin Huang, Xiaoling  出版年:2021
Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi-image visual encryption algorithm based on compressive sensing (CS) and ...
Modeling extenics innovation software by intelligent service components
Open Cybernetics and Systemics JournalFan, Rui  出版年:2014
Independent innovation is the core of the national development strategy. After twenty years, Extenics made great progress in innovation theory, formal method and real application. Developing and manufacturing innovation ...
A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making
COMPUTERS & INDUSTRIAL ENGINEERINGYue, Chuan  出版年:2016
The ranking of interval-valued intuitionistic fuzzy numbers (IVIFNs) is very important for fuzzy decision making problems. This paper presents a geometric approach for ranking IVIFNs. Based on the technique for order per...
Picture fuzzy normalized projection and extended VIKOR approach to software reliability assessment
APPLIED SOFT COMPUTINGYue, Chuan  出版年:2020
An extended Vlsekriterijumska optimizacija i KOmpromisno Resenje (VIKOR) method in group decision-making (GDM) setting is developed in this paper. The decision information is characterized by picture fuzzy number. A new ...
An intrusion detection method for internet of things based on suppressed fuzzy clustering
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKINGLiu, Liqun Xu, Bing Zhang, Xiaoping Wu, Xianjun  出版年:2018
In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA...
pLMFPPred: a novel approach for accurate prediction of functional peptides integrating embedding from pre-trained protein language model and imbalanced learning
arXivMa, Zebin Zou, Yonglin Huang, Xiaobin Yan, Wenjin Xu, Hao Yang, Jiexin Zhang, Ying Huang, Jinqi  出版年:2023
Background Functional peptides have the potential to treat a variety of diseases. Their good therapeutic efficacy and low toxicity make them ideal therapeutic agents. Artificial intelligence-based computational strategie...
Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion
OptikLiu, Shoukang Ye, Guodong  出版年:2023
In order to address the security risks associated with the theft of private images over open Internet of Things (IoT), this paper introduces a new Logistic-Sine-Coupling Map (LoSCM) in three dimensions with a better chao...
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
SECURITY AND COMMUNICATION NETWORKSYe, Guodong Jiao, Kaixin Pan, Chen Huang, Xiaoling  出版年:2018
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysi...
COLLABORATIVE OPTIMIZATION OF MULTICLASS IMBALANCED LEARNING: DENSITY-AWARE AND REGION-GUIDED BOOSTING
arXivLi, Chuantao Li, Zhi Xu, Jiahao Li, Jie Li, Sheng  出版年:2025
Numerous studies attempt to mitigate classification bias caused by class imbalance. However, existing studies have yet to explore the collaborative optimization of imbalanced learning and model training. This constraint ...
Face Template Protection through Residual Learning Based Error-Correcting Codes
ACM International Conference Proceeding SeriesZhou, Junwei Shang, Delong Lang, Huile Ye, Guodong Xia, Zhe  出版年:2021
The leakage of the face template leads to severe security problems since the facial image is unique and irreplaceable to each individual. Many researchers have been devoted to protecting the face template. Nevertheless, ...
Asymmetric Image Encryption-Hiding Scheme Based on Reversible Neural Network
SSRNLiu, Min Ye, Guodong  出版年:2024
In this paper, a novel asymmetric image encryption-hiding scheme (AiEhS) using reversible neural network (RNN) is presented, which mainly use the strong learning ability of deep learning for compression and hiding of the...
Analysis of Machine Learning Methods for Water Quality Evaluation of Penaeus Vannamei
ACM International Conference Proceeding SeriesPeng, Xiaohong Li, Zixin Ma, Zebin Zhang, Ying  出版年:2023
In global aquaculture, Penaeus vannamei stands out due to its immense economic importance. Water quality, being pivotal for its successful cultivation, demands precise evaluation techniques. This research undertook a met...
Visually meaningful image encryption algorithm based on digital signature
DIGITAL COMMUNICATIONS AND NETWORKSHuang, Xiaoling Dong, Youxia Ye, Guodong Yap, Wun-She Goi, Bok-Min  出版年:2023
Traditional image encryption algorithms transform a plain image into a noise-like image. To lower the chances for the encrypted image being detected by the attacker during the image transmission, a visually meaningful im...
题名 作者 出处 被引量 操作
已选条目 检索报告 聚类工具

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心