Jun Ao

According to our database1, Jun Ao authored at least 29 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Internal Defect Detection Algorithm for Concrete Blocks Based on Local Mean Decomposition-Singular Value Decomposition and Weighted Spatial-Spectral Entropy.
Entropy, July, 2023

2022
Water-Air Interface Imaging: Recovering the Images Distorted by Surface Waves via an Efficient Registration Algorithm.
Entropy, December, 2022

Concrete Multi-Type Defect Classification Algorithm Based on MSSMA-SVM.
Sensors, 2022

Seeing through Wavy Water-Air Interface: A Restoration Model for Instantaneous Images Distorted by Surface Waves.
Future Internet, 2022

2020
Fast Monte Carlo method to simulate atmospheric backscattering of wireless laser sensor network.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
Difference based median filter for removal of random value impulse noise in images.
Multim. Tools Appl., 2019

Normalized Moment of Inertia-Based Detection Algorithm for Copy-Paste Image Tampering.
Int. J. Pattern Recognit. Artif. Intell., 2019

2018
Adaptive Stretching Method for Underwater Image Color Correction.
Int. J. Pattern Recognit. Artif. Intell., 2018

2016
Red Preserving Algorithm for Underwater Imaging.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

2011
Certificateless Group Oriented Signature Secure Against Key Replacement Attack.
Int. J. Netw. Secur., 2011

Group-oriented ring signature.
IACR Cryptol. ePrint Arch., 2011

Super-orthogonal space-time code design based on the trellis diagram integrated operation.
Sci. China Inf. Sci., 2011

2009
Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack.
Int. J. Netw. Secur., 2009

NTRU based group oriented signature.
IACR Cryptol. ePrint Arch., 2009

Anonymous signature scheme.
IACR Cryptol. ePrint Arch., 2009

Group-Based Proxy Re-encryption Scheme.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Improved Group-Oriented Encryption for Group Communication.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
Group-oriented Encryption Secure against Collude Attack.
J. Convergence Inf. Technol., 2008

Revisit of Group-based Unidirectional Proxy Re-encryption Scheme.
IACR Cryptol. ePrint Arch., 2008

Proxy Key Re-encapsulation Mechanism for Group Communications.
IACR Cryptol. ePrint Arch., 2008

2007
Group-oriented encryption secure against collude attack.
IACR Cryptol. ePrint Arch., 2007

Group-based Proxy Re-encryption scheme.
IACR Cryptol. ePrint Arch., 2007

Scalable Storage Scheme from Forward Key Rotation.
IACR Cryptol. ePrint Arch., 2007

Provable password-based tripartite key agreement protocol.
IACR Cryptol. ePrint Arch., 2007

A Novel Verifier-Based Authenticated Key Agreement Protocol.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery.
Proceedings of the Online Communities and Social Computing, 2007

2006
Chameleon-Based Deniable Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2006

2005
Adaptable Group-Oriented Signature.
IACR Cryptol. ePrint Arch., 2005

2004
An ID-based group signature.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...