Bin Yu

Orcid: 0000-0002-1195-8164

Affiliations:
  • Zhengzhou Information Science and Technology Institute, Department of Computer Science, China
  • University of Waterloo, ON, Canada (2003 - 2004)
  • South China University of Technology, Department of Automatic Engineering, Guangzhou, China (PhD 1999)


According to our database1, Bin Yu authored at least 45 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Synchronous Decryption Scheme for Real-time Voice Encrypted Communication Based on Frame ID.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
Distributed three-level QR codes based on visual cryptography scheme.
J. Vis. Commun. Image Represent., 2022

2021
A universal data transfer technique over voice channels of cellular mobile communication networks.
IET Commun., 2021

Computing tight upper bounds for Bhattacharyya parameters of binary polar code kernels with arbitrary dimension.
EURASIP J. Wirel. Commun. Netw., 2021

Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

Seeking Log-Likelihood Ratio Expressions for Polar Code Kernels with Arbitrary Dimension.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

A Novel Secure Communication Scheme for ZigBee Mesh Network Based on Physical Unclonable Function.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Distributed color QR code with high-capability and fast decoding.
Multim. Tools Appl., 2020

Size-Invariant Visual Cryptography With Improved Perceptual Quality for Grayscale Image.
IEEE Access, 2020

A Novel Color Multi-Secret Visual Cryptography Scheme.
Proceedings of the AIPR 2020: 3rd International Conference on Artificial Intelligence and Pattern Recognition, 2020

2019
Modeling and Optimization of RFID Networks Planning Problem.
Wirel. Commun. Mob. Comput., 2019

A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code.
Secur. Commun. Networks, 2019

A two-level QR code scheme based on polynomial secret sharing.
Multim. Tools Appl., 2019

Rich QR code with three-layer information using visual secret sharing scheme.
Multim. Tools Appl., 2019

Perfect recovery of XOR-based visual cryptography scheme.
Multim. Tools Appl., 2019

Improved schemes for visual secret sharing based on random grids.
Multim. Tools Appl., 2019

一种从设备零秘密存储的蓝牙密钥协商方案 (Bluetooth Key Agreement Scheme with Zero Secret Storage in Slave Device).
计算机科学, 2019

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks.
KSII Trans. Internet Inf. Syst., 2019

A PUF-based Group Key Transfer Protocol for Bluetooth.
Int. J. Netw. Secur., 2019

General Construction for Extended Visual Cryptography Scheme Using QR Codes.
Int. J. Digit. Crime Forensics, 2019

LCD: Light-weight control model for data plane in software-defined wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2019

Rich QR Codes With Three-Layer Information Using Hamming Code.
IEEE Access, 2019

Demo Abstract: RPTB: Range-based Positioning TestBed for WSN.
Proceedings of the IEEE INFOCOM 2019, 2019

2018
Improved Visual Secret Sharing Scheme for QR Code Applications.
IEEE Trans. Inf. Forensics Secur., 2018

Visual cryptograms of random grids via linear algebra.
Multim. Tools Appl., 2018

A new two-level QR code with visual cryptography scheme.
Multim. Tools Appl., 2018

Improved Contrast for Threshold Random-grid-based Visual Cryptography.
KSII Trans. Internet Inf. Syst., 2018

PUF-Assisted Group Key Distribution Scheme for Software-Defined Wireless Sensor Networks.
IEEE Commun. Lett., 2018

Visual Cryptography Scheme With Meaningful Shares Based on QR Codes.
IEEE Access, 2018

Towards Rule Consistent Updates in Software-Defined Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Improved Extended Polynomial-Based Secret Image Sharing Scheme Using QR Code.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Cryptanalysis and improvement of Panda - public auditing for shared data in cloud and internet of things.
Multim. Tools Appl., 2017

New insight into linear algebraic technique to construct visual cryptography scheme for general access structure.
Multim. Tools Appl., 2017

Perfect contrast XOR-based visual cryptography schemes via linear algebra.
Des. Codes Cryptogr., 2017

SDN-Based Secure Localization in Heterogeneous WSN.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
General construction for XOR-based visual cryptography and its extended capability.
Multim. Tools Appl., 2016

Halftone Visual Cryptography with Complementary Cover Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
像素不扩展视觉密码的边缘增强研究 (Edge Enhancement on Size Invariant Visual Cryptography).
计算机科学, 2015

2014
Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares.
Trans. Data Hiding Multim. Secur., 2014

Multi-secret visual cryptography with deterministic contrast.
Multim. Tools Appl., 2014

Optimal pixel expansion of deterministic visual cryptography scheme.
Multim. Tools Appl., 2014

2013
Visual Cryptography and Random Grids Schemes.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2012
On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2008
A Verifiable Visual Cryptography Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

A Modified Multi-Secret Sharing Visual Cryptography Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...