Yuan Yuan
Orcid: 0000-0002-6621-9983Affiliations:
- Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
According to our database1,
Yuan Yuan
authored at least 19 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
TMABKS: a traceable multi authority attribute-based Boolean keywords search authorization for e-health records in cloud.
Clust. Comput., August, 2025
IEEE Trans. Multim., 2025
IEEE Trans. Multim., 2025
Reversible data hiding in Redundancy-Free cipher images through pixel rotation and multi-MSB replacement.
J. Inf. Secur. Appl., 2025
Reversible data hiding based on pixel value similarity ordering and ordered collection.
Digit. Signal Process., 2025
2024
IoT Privacy Protection: JPEG-TPE With Lower File Size Expansion and Lossless Decryption.
IEEE Internet Things J., July, 2024
Multim. Tools Appl., May, 2024
J. Inf. Secur. Appl., 2024
Secure Reversible Data Hiding in Encrypted Image Based on 2D Labeling and Block Classification Coding.
J. Inf. Secur. Appl., 2024
2023
IEEE Trans. Circuits Syst. Video Technol., December, 2023
J. Vis. Commun. Image Represent., December, 2023
Multim. Tools Appl., November, 2023
Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing.
J. Inf. Secur. Appl., June, 2023
Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency.
J. Vis. Commun. Image Represent., February, 2023
Reversible Data Hiding in Encrypted Images Based on Time-Varying Huffman Coding Table.
IEEE Trans. Multim., 2023
IEEE Trans. Multim., 2023
2021
IEEE Trans. Circuits Syst. Video Technol., 2021
On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
2018
Reversible Data Hiding Scheme in Encrypted-Image Based on Prediction and Compression Coding.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018