Yong Zhang

Orcid: 0000-0003-4290-9098

Affiliations:
  • Shenzhen University, ATR Key Laboratory of National Defense Technology, Shenzhen, China
  • Shenzhen University, College of Information Engineering, Shenzhen, China (since 2008)
  • Harbin Institute of Technology Shenzhen Graduate School, Guangdong, China (2004 - 2008)
  • PLA University of Science and Technology, Nanjing, China (PhD 2004)


According to our database1, Yong Zhang authored at least 25 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A scene text detector based on deep feature merging.
Multim. Tools Appl., 2021

2020
EDGAN: motion deblurring algorithm based on enhanced generative adversarial networks.
J. Supercomput., 2020

Bus passenger flow statistics algorithm based on deep learning.
Multim. Tools Appl., 2020

A map traceability management scheme for security control.
Enterp. Inf. Syst., 2020

2019
Kernel nearest-farthest subspace classifier for face recognition.
Multim. Tools Appl., 2019

A secure hash function based on feedback iterative structure.
Enterp. Inf. Syst., 2019

2018
eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology.
Sensors, 2018

A New Hybrid Task Scheduling Algorithm Designed Based on ACO and GA.
J. Inf. Hiding Multim. Signal Process., 2018

A Dynamic Integrity Transitivity Model for the Cloud.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

2014
A Skin Color Model Based on Modified GLHS Space for Face Detection.
J. Inf. Hiding Multim. Signal Process., 2014

A sparse representation based super-resolution image reconstruction scheme utilizing dual dictionaries.
J. Inf. Hiding Multim. Signal Process., 2014

An Improved Video Identification Scheme Based on Video Tomography.
IEICE Trans. Inf. Syst., 2014

2013
Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables.
IEICE Trans. Commun., 2013

2012
An oblivious fragile watermarking scheme for images utilizing edge transitions in BTC bitmaps.
Sci. China Inf. Sci., 2012

2009
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS).
Proceedings of the Advances in Information Security and Assurance, 2009

2008
On the security properties and attacks against Mobile agent watermark encapsulation(MAWE).
Proceedings of the IEEE International Conference on Systems, 2008

Traffic Identification of Tor and Web-Mix.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
The Key Management of the Encrypted Database Based on XML.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Method of Bucket Index over Encrypted Character Data in Database.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Anonymity in PKI Environment.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Relational Databases Watermark Technique Based on Content Characteristic.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Fingerprint Identification Based on Frequency Texture Analysis.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Research on a Novel Hashing Stream Cipher.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

A Novel Method of Watermarking Relational Databases using Character String.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2006


  Loading...