Yuan Yuan

Orcid: 0000-0002-6621-9983

Affiliations:
  • Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China


According to our database1, Yuan Yuan authored at least 19 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
TMABKS: a traceable multi authority attribute-based Boolean keywords search authorization for e-health records in cloud.
Clust. Comput., August, 2025

JPEG Image Encryption With DC Rotation and Undivided RSV-Based AC Group Permutation.
IEEE Trans. Multim., 2025

Cloud-Based Privacy-Preserving Medical Images Storage Scheme With Low Consumption.
IEEE Trans. Multim., 2025

Reversible data hiding in Redundancy-Free cipher images through pixel rotation and multi-MSB replacement.
J. Inf. Secur. Appl., 2025

Reversible data hiding based on pixel value similarity ordering and ordered collection.
Digit. Signal Process., 2025

2024
IoT Privacy Protection: JPEG-TPE With Lower File Size Expansion and Lossless Decryption.
IEEE Internet Things J., July, 2024

JPEG Bitstreams encryption with CPA-secure and file size reduction.
Multim. Tools Appl., May, 2024

On the security of JPEG image encryption with RS pairs permutation.
J. Inf. Secur. Appl., 2024

Secure Reversible Data Hiding in Encrypted Image Based on 2D Labeling and Block Classification Coding.
J. Inf. Secur. Appl., 2024

2023
Reversible Data Hiding of JPEG Image Based on Adaptive Frequency Band Length.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

JPEG image encryption with grouping coefficients based on entropy coding.
J. Vis. Commun. Image Represent., December, 2023

Reversible data hiding in encrypted JPEG image with changing the number of AC codes.
Multim. Tools Appl., November, 2023

Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing.
J. Inf. Secur. Appl., June, 2023

Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency.
J. Vis. Commun. Image Represent., February, 2023

Reversible Data Hiding in Encrypted Images Based on Time-Varying Huffman Coding Table.
IEEE Trans. Multim., 2023

Adaptive Coding and Ordered-Index Extended Scrambling Based RDH in Encrypted Images.
IEEE Trans. Multim., 2023

2021
Multi-MSB Compression Based Reversible Data Hiding Scheme in Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., 2021

On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

2018
Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018


  Loading...