Kwok-Wo Wong

According to our database1, Kwok-Wo Wong authored at least 81 papers between 1998 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
On the Security of a Class of Diffusion Mechanisms for Image Encryption.
IEEE Trans. Cybern., 2018

2016
Bi-level Protected Compressive Sampling.
IEEE Trans. Multim., 2016

Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
Secur. Commun. Networks, 2016

Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.
Multim. Tools Appl., 2016

Embedding cryptographic features in compressive sensing.
Neurocomputing, 2016

2015
Robust coding of encrypted images via structural matrix.
Signal Process. Image Commun., 2015

Distributed arithmetic coding with interval swapping.
Signal Process., 2015

A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization.
Int. J. Bifurc. Chaos, 2015

Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015

Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
Period distribution of generalized discrete Arnold cat map.
Theor. Comput. Sci., 2014

Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem.
Signal Process. Image Commun., 2014

On the security of symmetric ciphers based on DNA coding.
Inf. Sci., 2014

Robust Coding of Encrypted Images via Structural Matrix.
CoRR, 2014

Embedding Cryptographic Features in Compressive Sensing.
CoRR, 2014

Towards Secure Compressive Sampling Scheme.
CoRR, 2014

A chaotic image encryption scheme owning temp-value feedback.
Commun. Nonlinear Sci. Numer. Simul., 2014

An improved iterative decoding scheme based on error-resistant arithmetic code.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

2013
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$.
IEEE Trans. Inf. Theory, 2013

Hybrid fractal image coding with quadtree-based progressive structure.
J. Vis. Commun. Image Represent., 2013

Chaos-based selective encryption for H.264/AVC.
J. Syst. Softw., 2013

An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps.
J. Syst. Softw., 2013

Breaking an image compression and encryption scheme based on Chinese Remainder Theorem.
CoRR, 2013

An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2013

A symmetric color image encryption algorithm using the intrinsic features of bit distributions.
Commun. Nonlinear Sci. Numer. Simul., 2013

Improving the error correction capability of arithmetic coding by forecasting forbidden symbols.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

A two-class information concealing system based on compressed sensing.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

2012
Period Distribution of Generalized Discrete Arnold Cat Map for N=p<sup>e</sup>.
IEEE Trans. Inf. Theory, 2012

Decouple implementation of weight decay for recursive least square.
Neural Comput. Appl., 2012

Cryptanalyzing a chaos-based image encryption algorithm using alternate structure.
J. Syst. Softw., 2012

Generalized Arithmetic Coding using discrete Chaotic Maps.
Int. J. Bifurc. Chaos, 2012

Breaking a novel colour image encryption algorithm based on chaos
CoRR, 2012

Chaos-based joint compression and encryption algorithm for generating variable length ciphertext.
Appl. Soft Comput., 2012

Chaos-Based Selective Encryption for AVS Video Coding Standard.
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012

Application of chaotic maps for simultaneous lossy image compression and encryption.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

2011
A Modified Chaos-Based Joint Compression and Encryption Scheme.
IEEE Trans. Circuits Syst. II Express Briefs, 2011

On the security of multiple Huffman table based encryption.
J. Vis. Commun. Image Represent., 2011

Key exchange based on Dickson polynomials over finite field with 2m.
J. Comput., 2011

A chaos-based symmetric image encryption scheme using a bit-level permutation.
Inf. Sci., 2011

Error detection in arithmetic coding with artificial markers.
Comput. Math. Appl., 2011

A chaos-based joint image compression and encryption scheme using DCT and SHA-1.
Appl. Soft Comput., 2011

A new chaos-based fast image encryption algorithm.
Appl. Soft Comput., 2011

2010
Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps.
IEEE Trans. Circuits Syst. II Express Briefs, 2010

On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$.
IEEE Trans. Computers, 2010

2009
Image Encryption Using Chaotic Maps.
Proceedings of the Intelligent Computing Based on Chaos, 2009

True random number generator based on mouse movement and chaotic hash function.
Inf. Sci., 2009

2008
Embedding Compression in Chaos-Based Cryptography.
IEEE Trans. Circuits Syst. II Express Briefs, 2008

Cryptanalysis of a password authentication scheme over insecure networks.
J. Comput. Syst. Sci., 2008

One-way hash function construction based on 2D coupled map lattices.
Inf. Sci., 2008

2007
A novel particle swarm optimizer with time-delay.
Appl. Math. Comput., 2007

An improved particle swarm optimization algorithm combined with piecewise linear chaotic map.
Appl. Math. Comput., 2007

The Local True Weight Decay Recursive Least Square Algorithm.
Proceedings of the Neural Information Processing, 14th International Conference, 2007

2006
Generalized RLS approach to the training of neural networks.
IEEE Trans. Neural Networks, 2006

Improving the security of a dynamic look-up table based chaotic cryptosystem.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

New Asymptotic Stability Criteria for a Two-Neuron Network With Different Time Delays.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

Chosen plaintext attack on a cryptosystem with discretized skew tent map.
IEEE Trans. Circuits Syst. II Express Briefs, 2006

Joint Sparse Form of Window Three for Koblitz Curve.
Int. J. Netw. Secur., 2006

Delay-Dependent and Delay-Independent Stability Criteria for Cellular Neural Networks with Delays.
Int. J. Bifurc. Chaos, 2006

A Fast Image Encryption Scheme based on Chaotic Standard Map
CoRR, 2006

Fast elliptic scalar multiplication using new double-base chain and point halving.
Appl. Math. Comput., 2006

2005
Hopf bifurcation of a Two-Neuron Network with Different Discrete Time Delays.
Int. J. Bifurc. Chaos, 2005

A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography.
Appl. Math. Comput., 2005

2004
Robust stability of interval bidirectional associative memory neural network with time delays.
IEEE Trans. Syst. Man Cybern. Part B, 2004

Criteria for exponential stability of Cohen-Grossberg neural networks.
Neural Networks, 2004

Stability Analysis for Delayed Cellular Neural Networks Based on Linear Matrix inequality Approach.
Int. J. Bifurc. Chaos, 2004

Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances
CoRR, 2004

2003
Asymptotic stability criteria for a two-neuron network with different time delays.
IEEE Trans. Neural Networks, 2003

Stability of bifurcating periodic solutions for van der Pol equation with continuous distributed delay.
Appl. Math. Comput., 2003

2002
Handwritten Digit Recognition Using Multi-Layer Feedforward Neural Networks with Periodic and Monotonic Activation Functions.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

2001
A pruning method for the recursive least squared algorithm.
Neural Networks, 2001

Novel stability conditions for Cellular Neural Networks with Time Delay.
Int. J. Bifurc. Chaos, 2001

A Modified Chaotic Cryptographic Method.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

An Elliptic Curve Random Number Generator.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Combining DEKF algorithm and trace rule for fast on-line invariance extraction and recognition.
Pattern Recognit. Lett., 2000

A Practical Sequential Method for Principal Component Analysis.
Neural Process. Lett., 2000

A Local Training and Pruning Approach for Neural Networks.
Int. J. Neural Syst., 2000

1999
A unified sequential method for PCA.
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999

Handwritten digit recognition using trace neural network with EKF training algorithm.
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999

1998
On-line Successive Synthesis of Wavelet Networks.
Neural Process. Lett., 1998

Combining PCA and MCA by using recursive least square learning method.
Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, 1998

Using recursive least square learning method for principal and minor components analysis.
Proceedings of the 1998 IEEE International Conference on Acoustics, 1998


  Loading...