SIGNAL PROCESSINGYe, Guodong Pan, Chen Dong, Youxia Shi, Yang Huang, Xiaoling 出版年:2020
Most current image encryption algorithms encrypt plain images directly into meaningless cipher images. Visually, a few of them are vulnerable to illegal attacks on a few sharing platforms or open channels when being tran...
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position shuf...
Differing from the traditional permutation-diffusion architecture, an efficient symmetric image encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a plain-image, which is measured ...
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Pan, Chen Huang, Xiaoling Zhao, Zhenyu He, Jianqing 出版年:2018
This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich's structure, the proposed method contains permutation, modulation, and diffusion (PMD) operations. This me...
The weights of decision makers play an important role in group decision-making problems. Entropy is a very important measure in information science. This work models an approach to determine the weights of decision maker...
ALEXANDRIA ENGINEERING JOURNALYe, Guodong Liu, Min Wu, Mingfa 出版年:2022
A new improved three-dimensional continuous chaotic system (ImproBsys) is designed in this paper. It can achieve from an ordinary chaotic state to a hyperchaotic state, that is, chaotic behavior tends to become more comp...
FRONTIERS OF COMPUTER SCIENCEHuang, Xiaoling Dong, Youxia Ye, Guodong Shi, Yang 出版年:2023
A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA al...
BACKGROUND: Large-scale group decision-making (LSGDM) in big data environments faces challenges in robust data center construction, objective expert weighting, and efficient information fusion. OBJECTIVE: This study aims...
This study proposes a quantum logistic image encryption algorithm based on the Rivest-Shamir-Adleman (RSA) and secure hash (SHA-3) algorithms. First, the asymmetric encryption algorithm RSA is used to randomly generate k...
Software trustworthiness evaluation is a multi-dimensional evaluation problem, which can be accurately evaluated according to decision science. Group decision-making method is a comprehensive method for handing the multi...
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOSYe, Guodong Jiao, Kaixin Wu, Huishan Pan, Chen Huang, Xiaoling 出版年:2020
Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated b...
This paper presents a new asymmetric image encryption and hiding algorithm based on SHA-3 and compressive sensing. First, to resist the chosen-plaintext attack (CPA) and the knownplaintext attack (KPA), SHA-3 is employed...
Deep neural networks have achieved significant success in the super-resolution of remote sensing images. However, existing deep learning models still suffer from the issue of blurry pseudo-artifacts when restoring high-f...
Journal of Intelligent and Fuzzy SystemsYue, Chuan 出版年:2017
Projection can measure not only the distance but also the angle between two decision objects. It has become one of important tools for complex decisions. This research finds that the existing projection formulae are unre...
To protect the privacy of multiple images simultaneously in the digital information era, this paper proposes a novel multi-image encryption and hiding algorithm (MiEHA) with the help of a new three-dimensional coupled ch...
SECURITY AND COMMUNICATION NETWORKSLin, Riguang Li, Sheng 出版年:2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest-Shamir-Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algor...
An authenticated reversible image hiding algorithm based on blockchain framework is presented in this paper. First, global eigenvalues of the plain image are extracted as plaintext keys. Meanwhile, a novel key transforma...
Image encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi-image visual encryption algorithm based on compressive sensing (CS) and ...
Open Cybernetics and Systemics JournalFan, Rui 出版年:2014
Independent innovation is the core of the national development strategy. After twenty years, Extenics made great progress in innovation theory, formal method and real application. Developing and manufacturing innovation ...
The ranking of interval-valued intuitionistic fuzzy numbers (IVIFNs) is very important for fuzzy decision making problems. This paper presents a geometric approach for ranking IVIFNs. Based on the technique for order per...
An extended Vlsekriterijumska optimizacija i KOmpromisno Resenje (VIKOR) method in group decision-making (GDM) setting is developed in this paper. The decision information is characterized by picture fuzzy number. A new ...
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKINGLiu, Liqun Xu, Bing Zhang, Xiaoping Wu, Xianjun 出版年:2018
In order to improve the effectiveness of intrusion detection, an intrusion detection method of the Internet of Things (IoT) is proposed by suppressed fuzzy clustering (SFC) algorithm and principal component analysis (PCA...
Background Functional peptides have the potential to treat a variety of diseases. Their good therapeutic efficacy and low toxicity make them ideal therapeutic agents. Artificial intelligence-based computational strategie...
In order to address the security risks associated with the theft of private images over open Internet of Things (IoT), this paper introduces a new Logistic-Sine-Coupling Map (LoSCM) in three dimensions with a better chao...
SECURITY AND COMMUNICATION NETWORKSYe, Guodong Jiao, Kaixin Pan, Chen Huang, Xiaoling 出版年:2018
In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysi...
Numerous studies attempt to mitigate classification bias caused by class imbalance. However, existing studies have yet to explore the collaborative optimization of imbalanced learning and model training. This constraint ...
ACM International Conference Proceeding SeriesZhou, Junwei Shang, Delong Lang, Huile Ye, Guodong Xia, Zhe 出版年:2021
The leakage of the face template leads to severe security problems since the facial image is unique and irreplaceable to each individual. Many researchers have been devoted to protecting the face template. Nevertheless, ...
In this paper, a novel asymmetric image encryption-hiding scheme (AiEhS) using reversible neural network (RNN) is presented, which mainly use the strong learning ability of deep learning for compression and hiding of the...
In global aquaculture, Penaeus vannamei stands out due to its immense economic importance. Water quality, being pivotal for its successful cultivation, demands precise evaluation techniques. This research undertook a met...
DIGITAL COMMUNICATIONS AND NETWORKSHuang, Xiaoling Dong, Youxia Ye, Guodong Yap, Wun-She Goi, Bok-Min 出版年:2023
Traditional image encryption algorithms transform a plain image into a noise-like image. To lower the chances for the encrypted image being detected by the attacker during the image transmission, a visually meaningful im...