Leo Yu Zhang

Orcid: 0000-0001-9330-2662

According to our database1, Leo Yu Zhang authored at least 188 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ConSeg: Contextual Backdoor Attack Against Semantic Segmentation.
CoRR, July, 2025

BiMark: Unbiased Multilayer Watermarking for Large Language Models.
CoRR, June, 2025

Towards Reliable Forgetting: A Survey on Machine Unlearning Verification, Challenges, and Future Directions.
CoRR, June, 2025

TED-LaST: Towards Robust Backdoor Defense Against Adaptive Attacks.
CoRR, June, 2025

When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning.
CoRR, June, 2025

Uncertainty-Aware Metabolic Stability Prediction with Dual-View Contrastive Learning.
CoRR, June, 2025

Performance Guaranteed Poisoning Attacks in Federated Learning: A Sliding Mode Approach.
CoRR, May, 2025

Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets.
CoRR, April, 2025

Exploring Gradient-Guided Masked Language Model to Detect Textual Adversarial Attacks.
CoRR, April, 2025

Adversarial Example Based Fingerprinting for Robust Copyright Protection in Split Learning.
CoRR, March, 2025

Multimodal Chaotification Model With Hardware Implementation.
IEEE Trans. Ind. Electron., February, 2025

Distributed Differentially Private Matrix Factorization for Implicit Data via Secure Aggregation.
IEEE Trans. Computers, February, 2025

Boosting Deepfake Detection Generalizability via Expansive Learning and Confidence Judgement.
IEEE Trans. Circuits Syst. Video Technol., January, 2025

Data-Free Model-Related Attacks: Unleashing the Potential of Generative AI.
CoRR, January, 2025

Data Duplication: A Novel Multi-Purpose Attack Paradigm in Machine Unlearning.
CoRR, January, 2025

MedShield: A Fast Cryptographic Framework for Private Multi-Service Medical Diagnosis.
IEEE Trans. Serv. Comput., 2025

DarkHash: A Data-Free Backdoor Attack Against Deep Hashing.
IEEE Trans. Inf. Forensics Secur., 2025

An Active Authorization Control Method for Deep Reinforcement Learning Model Based on GANs and Adaptive Trigger.
IEEE Trans. Inf. Forensics Secur., 2025

Extracting Private Training Data in Federated Learning From Clients.
IEEE Trans. Inf. Forensics Secur., 2025

FLARE: Toward Universal Dataset Purification Against Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur., 2025

FixGuard: Repairing Backdoored Models via Class-Wise Trigger Recovery and Unlearning.
IEEE Signal Process. Lett., 2025

Differentially private recommendation algorithm based on diffusion model and Rényi similarity.
Inf. Sci., 2025

Secure Transfer Learning: Training Clean Model Against Backdoor in Pre-Trained Encoder and Downstream Dataset.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Not All Edges are Equally Robust: Evaluating the Robustness of Ranking-Based Federated Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Arms Race in Deep Learning: A Survey of Backdoor Defenses and Adaptive Attacks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2025

MarkErase: Defeating Entangled Watermarks in Model Extraction Attacks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2025

BadRobot: Jailbreaking Embodied LLM Agents in the Physical World.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Test-Time Backdoor Detection for Object Detection Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

sf SEBioID: Secure and Efficient Biometric Identification with Two-Party Computation.
Proceedings of the Applied Cryptography and Network Security, 2025

Improving Generalization of Universal Adversarial Perturbation via Dynamic Maximin Optimization.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

Detecting and Corrupting Convolution-based Unlearnable Examples.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Towards Threshold Anonymous Announcement With Batch Verification for Cooperative Intelligent Transport Systems.
IEEE Trans. Veh. Technol., December, 2024

A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method.
IEEE J. Emerg. Sel. Topics Circuits Syst., December, 2024

M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models.
IEEE Trans. Circuits Syst. Video Technol., November, 2024

SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection.
ACM Trans. Multim. Comput. Commun. Appl., October, 2024

FairCMS: Cloud Media Sharing With Fair Copyright Protection.
IEEE Trans. Comput. Soc. Syst., October, 2024

An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features.
IEEE Trans. Artif. Intell., September, 2024

Guest Editorial AI-Empowered Internet of Things for Data-Driven Psychophysiological Computing and Patient Monitoring.
IEEE J. Biomed. Health Informatics, May, 2024

Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger.
IEEE Trans. Ind. Informatics, March, 2024

Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update Amplification.
IEEE Trans. Inf. Forensics Secur., 2024

Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models.
IEEE Trans. Dependable Secur. Comput., 2024

PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data.
IEEE Trans. Dependable Secur. Comput., 2024

Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback.
Inf. Process. Manag., 2024

Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing.
IEEE Internet Things J., 2024

A consistency-aware deep capsule network for hierarchical multi-label image classification.
Neurocomputing, 2024

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud.
Comput. Stand. Interfaces, 2024

PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation.
CoRR, 2024

FLARE: Towards Universal Dataset Purification against Backdoor Attacks.
CoRR, 2024

TrojanRobot: Backdoor Attacks Against Robotic Manipulation in the Physical World.
CoRR, 2024

Deferred Poisoning: Making the Model More Vulnerable via Hessian Singularization.
CoRR, 2024

BadRobot: Jailbreaking LLM-based Embodied AI in the Physical World.
CoRR, 2024

Memorization in deep learning: A survey.
CoRR, 2024

Large Language Model Watermark Stealing With Mixed Integer Programming.
CoRR, 2024

Algorithmic Fairness: A Tolerance Perspective.
CoRR, 2024

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness.
CoRR, 2024

Fluent: Round-efficient Secure Aggregation for Private Federated Learning.
CoRR, 2024

Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024

Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DarkSAM: Fooling Segment Anything Model to Segment Nothing.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

DarkFed: A Data-Free Backdoor Attack in Federated Learning.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

MISA: Unveiling the Vulnerabilities in Split Federated Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024

PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds.
Proceedings of the Computer Security - ESORICS 2024, 2024

ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification.
Proceedings of the Computer Security - ESORICS 2024, 2024

TrustMIS: Trust-Enhanced Inference Framework for Medical Image Segmentation.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Stealing Watermarks of Large Language Models via Mixed Integer Programming.
Proceedings of the Annual Computer Security Applications Conference, 2024

An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Conditional Backdoor Attack via JPEG Compression.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
A Survey of PPG's Application in Authentication.
Comput. Secur., December, 2023

Providing prediction reliability through deep neural networks for recommender systems.
Comput. Ind. Eng., November, 2023

Probabilistic Matrix Factorization Recommendation Approach for Integrating Multiple Information Sources.
IEEE Trans. Syst. Man Cybern. Syst., October, 2023

An improved matrix factorization with local differential privacy based on piecewise mechanism for recommendation systems.
Expert Syst. Appl., April, 2023

Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation.
IEEE Trans. Ind. Electron., 2023

Cyber Information Retrieval Through Pragmatics Understanding and Visualization.
IEEE Trans. Dependable Secur. Comput., 2023

From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice.
IEEE Trans. Cybern., 2023

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data.
IEEE Trans. Cloud Comput., 2023

Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations.
CoRR, 2023

Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023

Client-side Gradient Inversion Against Federated Learning from Poisoning.
CoRR, 2023

Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training.
CoRR, 2023

An Efficient Approach to Manage Natural Noises in Recommender Systems.
Algorithms, 2023

SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Towards Self-Interpretable Graph-Level Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A Four-Pronged Defense Against Byzantine Attacks in Federated Learning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Backdoor Attack on Deep Neural Networks in Perception Domain.
Proceedings of the International Joint Conference on Neural Networks, 2023

Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Downstream-agnostic Adversarial Examples.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

A Bottom-Up Capsule Network for Hierarchical Image Classification.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2023

Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Preserving Privacy of Input Features Across All Stages of Collaborative Learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Masked Language Model Based Textual Adversarial Example Detection.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Predicate Private Set Intersection with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 2023

WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Low-Cost and Confidential ECG Acquisition Framework Using Compressed Sensing and Chaotic Systems for Wireless Body Area Network.
IEEE J. Biomed. Health Informatics, 2022

Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2022

A collaborative filtering algorithm based on item labels and Hellinger distance for sparse data.
J. Inf. Sci., 2022

A differentially private nonnegative matrix factorization for recommender system.
Inf. Sci., 2022

A differentially private matrix factorization based on vector perturbation for recommender system.
Neurocomputing, 2022

M-to-N Backdoor Paradigm: A Stealthy and Fuzzy Attack to Deep Learning Models.
CoRR, 2022

Performance of the 2D Coupled Map Lattice Model and Its Application in Image Encryption.
Complex., 2022

Evaluating Membership Inference Through Adversarial Robustness.
Comput. J., 2022

Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges.
IEEE Access, 2022

Self-Supervised Adversarial Example Detection by Disentangled Representation.
Proceedings of the IEEE International Conference on Trust, 2022

Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning.
Proceedings of the IEEE International Conference on Trust, 2022

A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022

Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Towards Privacy-Preserving Neural Architecture Search.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

A Generic Enhancer for Backdoor Attacks on Deep Neural Networks.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Working Mechanism of Eternalblue and Its Application in Ransomworm.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Towards Private and Scalable Cross-Media Retrieval.
IEEE Trans. Dependable Secur. Comput., 2021

Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms.
IEEE Trans. Circuits Syst. Video Technol., 2021

Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds.
IEEE Trans. Big Data, 2021

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model.
Secur. Commun. Networks, 2021

Deep neural-based vulnerability discovery demystified: data, model and performance.
Neural Comput. Appl., 2021

An effective and efficient fuzzy approach for managing natural noise in recommender systems.
Inf. Sci., 2021

A new item similarity based on α-divergence for collaborative filtering in sparse data.
Expert Syst. Appl., 2021

Challenges and approaches for mitigating byzantine attacks in federated learning.
CoRR, 2021

From Chaos to Pseudo-Randomness: A Case Study on the 2D Coupled Map Lattice.
CoRR, 2021

CREAMS: Copyrighted Cloud Media Sharing.
CoRR, 2021

Self-Supervised Adversarial Example Detection by Disentangled Representation.
CoRR, 2021

Shielding Federated Learning: A New Attack Approach and Its Defense.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

My Security: An interactive search engine for cybersecurity.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

Informed Histogram-Based Watermarking.
IEEE Signal Process. Lett., 2020

A genetic algorithm for constructing bijective substitution boxes with high nonlinearity.
Inf. Sci., 2020

A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle.
IEEE Internet Things J., 2020

Design and Analysis on a Parallel Chaos-Based Hash Function.
Int. J. Bifurc. Chaos, 2020

VoterChoice: A ransomware detection honeypot with multiple voting framework.
Concurr. Comput. Pract. Exp., 2020

Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence.
Proceedings of the Network and System Security - 14th International Conference, 2020

A New Interval Preference Model and Corresponding Fuzzy Similarity Measure for Collaborative Filtering.
Proceedings of the 6th IEEE International Conference on Big Data Computing Service and Applications, 2020

A New Rabin-Type Cryptosystem with Modulus p<sup>2</sup>q.
Proceedings of the Applications and Techniques in Information Security, 2020

2019
Compressed Sensing Based Selective Encryption With Data Hiding Capability.
IEEE Trans. Ind. Informatics, 2019

Efficiently and securely outsourcing compressed sensing reconstruction to a cloud.
Inf. Sci., 2019

Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.
IEEE Internet Things J., 2019

Compressed sensing for electrocardiogram acquisition in wireless body sensor network: A comparative analysis.
Int. J. Distributed Sens. Networks, 2019

Static malware clustering using enhanced deep embedding method.
Concurr. Comput. Pract. Exp., 2019

Secure Wireless Communications Based on Compressive Sensing: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Data-Driven Cybersecurity Incident Prediction: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Fast detection of maximal exact matches via fixed sampling of query K-mers and Bloom filtering of index K-mers.
Bioinform., 2019

2018
On the Security of a Class of Diffusion Mechanisms for Image Encryption.
IEEE Trans. Cybern., 2018

Exploiting the Security Aspects of Compressive Sampling.
Secur. Commun. Networks, 2018

Improved known-plaintext attack to permutation-only multimedia ciphers.
Inf. Sci., 2018

Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things.
IEEE Internet Things J., 2018

2017
Harnessing the Hybrid Cloud for Secure Big Image Data Service.
IEEE Internet Things J., 2017

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
Int. J. Bifurc. Chaos, 2017

A local search enhanced differential evolutionary algorithm for sparse recovery.
Appl. Soft Comput., 2017

Cryptanalysis of Optical Ciphers Integrating Double Random Phase Encoding With Permutation.
IEEE Access, 2017

2016
Bi-level Protected Compressive Sampling.
IEEE Trans. Multim., 2016

Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher.
Multim. Tools Appl., 2016

Embedding cryptographic features in compressive sensing.
Neurocomputing, 2016

A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
Int. J. Bifurc. Chaos, 2016

A Review of Compressive Sensing in Information Security Field.
IEEE Access, 2016

2015
Robust coding of encrypted images via structural matrix.
Signal Process. Image Commun., 2015

Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015

Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Joint quantization and diffusion for compressed sensing measurements of natural images.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

2014
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem.
Signal Process. Image Commun., 2014

Robust Coding of Encrypted Images via Structural Matrix.
CoRR, 2014

Embedding Cryptographic Features in Compressive Sensing.
CoRR, 2014

Towards Secure Compressive Sampling Scheme.
CoRR, 2014

A chaotic image encryption scheme owning temp-value feedback.
Commun. Nonlinear Sci. Numer. Simul., 2014

2013
Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation.
Int. J. Bifurc. Chaos, 2013

Breaking an image compression and encryption scheme based on Chinese Remainder Theorem.
CoRR, 2013

2012
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure.
J. Syst. Softw., 2012

Breaking a novel colour image encryption algorithm based on chaos
CoRR, 2012


  Loading...