Shanyu Tang

According to our database1, Shanyu Tang authored at least 37 papers between 2008 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement.
IEEE Trans. Industrial Electronics, 2018

Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates.
Multimedia Tools Appl., 2018

An efficient and secure VoIP communication system with chaotic mapping and message digest.
Multimedia Syst., 2018

Secure and robust digital image watermarking scheme using logistic and RSA encryption.
Expert Syst. Appl., 2018

2017
Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol.
Wireless Networks, 2017

Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme.
IEEE J. Biomedical and Health Informatics, 2017

Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking.
Multimedia Tools Appl., 2017

Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions.
Eng. Appl. of AI, 2017

Steganalysis of LSB Speech with Low Embedding Rates based on Joint Probability.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Covert Voice over Internet Protocol Communications with Packet Loss Based on Fractal Interpolation.
TOMCCAP, 2016

Universal steganography model for low bit-rate speech codec.
Security and Communication Networks, 2016

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP.
Peer-to-Peer Networking and Applications, 2016

An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks.
J. Network and Computer Applications, 2016

2015
Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography.
Wireless Personal Communications, 2015

Negative Survey-Based Privacy Protection of Cloud Data.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

2014
Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards.
Security and Communication Networks, 2014

A motion planning method for simulating a virtual crowd.
J. Simulation, 2014

Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card.
Int. J. Communication Systems, 2014

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications.
IET Communications, 2014

Audio steganography with AES for real-time covert voice over internet protocol communications.
SCIENCE CHINA Information Sciences, 2014

2013
A Hybrid Model for Simulating Crowd Evacuation.
New Generation Comput., 2013

An Information- Theoretical Model for Streaming Media Based Stegosystems.
Computing and Informatics, 2013

ECC-Based Authenticated Key Agreement Protocol with Privacy Protection for VoIP Communications.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Improving Performance of E-Government System from the User Perspective.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Dynamic Knowledge Repository-Based Security Auxiliary System of User Behavior.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Establishment of Security Levels in Trusted Cloud Computing Platforms.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Research on a New Mathematic Description for Fingerprint Identification.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

De Bruijn Graph-Based Whole-Genomic Sequence Assembly Algorithms and Applications.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Steganography Integration Into a Low-Bit Rate Speech Codec.
IEEE Trans. Information Forensics and Security, 2012

Network service registration based on role-goal-process-service meta-model in a P2P network.
IET Communications, 2012

2011
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec.
IEEE Trans. Information Forensics and Security, 2011

Steganalysis of compressed speech to detect covert voice over Internet protocol channels.
IET Information Security, 2011

Simulation of Web Data Traffic Patterns Using Fractal Statistical Modelling.
Proceedings of the Engineering Applications of Neural Networks, 2011

2009
Performance of Database Driven Network Applications from the User Perspective.
TIIS, 2009

2008
An Approach to Information Hiding in Low Bit-Rate Speech Stream.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008


  Loading...