Lin Teng

Orcid: 0000-0002-3437-2123

According to our database1, Lin Teng authored at least 50 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An image encryption algorithm based on circular rotation and generalized Feistel structure.
Soft Comput., March, 2024

Multiple face images encryption based on a new non-adjacent dynamic coupled mapping lattice.
Expert Syst. Appl., March, 2024

Beam-wise dose composition learning for head and neck cancer dose prediction in radiotherapy.
Medical Image Anal., February, 2024

An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion.
Multim. Tools Appl., January, 2024

Mutil-medical image encryption by a new spatiotemporal chaos model and DNA new computing for information security.
Expert Syst. Appl., January, 2024

2023
Medical image characteristic region recognition encryption algorithm based on intra and inter blocks scrambling and LSCC chaotic map.
Multim. Tools Appl., December, 2023

Visualized Multiple Image Selection Encryption Based on Log Chaos System and Multilayer Cellular Automata Saliency Detection.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction.
IEEE Trans. Netw. Serv. Manag., June, 2023

G2Grad-CAMRL: An Object Detection and Interpretation Model Based on Gradient-Weighted Class Activation Mapping and Reinforcement Learning in Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

An Intelligent System to Sense Textual Cues for Location Assistance in Autonomous Vehicles.
Sensors, 2023

CLIP in Medical Imaging: A Comprehensive Survey.
CoRR, 2023

2022
Double Parameters Fractal Sorting Matrix and Its Application in Image Encryption.
IEEE Trans. Circuits Syst. Video Technol., 2022

Residual network based on convolution attention model and feature fusion for dance motion recognition.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate.
Multim. Tools Appl., 2022

Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system.
Inf. Sci., 2022

Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion.
Inf. Sci., 2022

Multichannel convolutional neural network-based fuzzy active contour model for medical image segmentation.
Evol. Syst., 2022

BiSeNet-oriented context attention model for image semantic segmentation.
Comput. Sci. Inf. Syst., 2022

Deep Learning-Based Head and Neck Radiotherapy Planning Dose Prediction via Beam-Wise Dose Decomposition.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022

2021
Color image encryption scheme based on the combination of the fisher-yates scrambling algorithm and chaos theory.
Multim. Tools Appl., 2021

Application on Vehicle Detector using Laser Ranging Image Sensor.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

2020
A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network.
Int. J. Wirel. Inf. Networks, 2020

A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence.
Int. J. Netw. Secur., 2020

Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption.
Int. J. Netw. Secur., 2020

A Modified Advanced Encryption Standard for Data Security.
Int. J. Netw. Secur., 2020

Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems.
Int. J. Netw. Secur., 2020

Hyperchaotic Behavior in the Novel Memristor-Based Symmetric Circuit System.
IEEE Access, 2020

2019
A New Chi-square Distribution De-noising Method for Image Encryption.
Int. J. Netw. Secur., 2019

A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment.
Int. J. Netw. Secur., 2019

A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree.
Int. J. Netw. Secur., 2019

CSDK: A Chi-square distribution-Kernel method for image de-noising under the Internet of things big data environment.
Int. J. Distributed Sens. Networks, 2019

A new wolf colony search algorithm based on search strategy for solving travelling salesman problem.
Int. J. Comput. Sci. Eng., 2019

GPOGC: Gaussian Pigeon-Oriented Graph Clustering Algorithm for Social Networks Cluster.
IEEE Access, 2019

A Proposal of Dynamic Route Search Method to Consider the Individual Driver Preferences.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

2018
A chaotic color image encryption using integrated bit-level permutation.
Multim. Tools Appl., 2018

A New Krill Herd Algorithm Based on SVM Method for Road Feature Extraction.
J. Inf. Hiding Multim. Signal Process., 2018

A New Frog Leaping Algorithm Based on Simulated Annealing and Immunization Algorithm for Low-power Mapping in Network-on-chip.
J. Inf. Hiding Multim. Signal Process., 2018

Study on Wavelet Transform Adjustment Method with Enhancement of Color Image.
J. Inf. Hiding Multim. Signal Process., 2018

Karhunen Loeve Transform-based Online Handwritten Signature Scheme via Dynamic Bit Allocation Method and Naive Bayes for Biometric Key Generation.
J. Inf. Hiding Multim. Signal Process., 2018

An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method.
Int. J. Netw. Secur., 2018

A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping.
Int. J. Netw. Secur., 2018

Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter.
Int. J. Commun. Syst., 2018

2017
A Density-based Clustering Method for K-anonymity Privacy Protection.
J. Inf. Hiding Multim. Signal Process., 2017

A Proxy Re-Encryption Scheme Based on Elliptic Curve Group.
J. Inf. Hiding Multim. Signal Process., 2017

A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption.
Int. J. Netw. Secur., 2017

An Improved Discrete Firefly Algorithm Used for Traveling Salesman Problem.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Study a Join Query Strategy Over Data Stream Based on Sliding Windows.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017

2015
A Study of Flexible Energy-Saving Joint for Biped Robots Considering Sagittal Plane Motion.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

An examination of Route Search considering the individual driver preferences.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015

2012
A novel colour image encryption algorithm based on chaos.
Signal Process., 2012


  Loading...