Zhu Wang

Affiliations:
  • Harbin Institute of Technology, School of Computer Science and Technology, Weihai, China


According to our database1, Zhu Wang authored at least 30 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing.
Vis. Comput., December, 2023

S-box generation algorithm based on hyperchaotic system and its application in image encryption.
Multim. Tools Appl., July, 2023

Real-time image encryption algorithm based on combined chaotic map and optimized lifting wavelet transform.
J. Real Time Image Process., April, 2023

2022
An improved McEliece cryptosystem based on QC-MDPC code with compact key size.
Telecommun. Syst., 2022

A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation.
Multim. Tools Appl., 2022

Image lossless encoding and encryption method of EBCOT Tier1 based on 4D hyperchaos.
Multim. Syst., 2022

Image compression and encryption algorithm based on 2D compressive sensing and hyperchaotic system.
Multim. Syst., 2022

A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic System.
J. Inf. Secur. Appl., 2022

2021
Image compression and encryption algorithm based on compressive sensing and nonlinear diffusion.
Multim. Tools Appl., 2021

Cluster space key management scheme based on threshold secret sharing and bilinear pairing.
Int. J. Satell. Commun. Netw., 2021

Threshold-based key management scheme for space network.
Int. J. Commun. Syst., 2021

A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box.
Int. J. Bifurc. Chaos, 2021

Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System.
Entropy, 2021

2020
A centralized key management scheme for space network with resistance of nonlinear channel noise.
Wirel. Networks, 2020

A New S-Box Generation Method and Advanced Design Based on Combined Chaotic System.
Symmetry, 2020

A novel method of dynamic S-box design based on combined chaotic map and fitness function.
Multim. Tools Appl., 2020

Robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipher.
Multim. Syst., 2020

Image Compression and Encryption Scheme Based on Compressive Sensing and Fourier Transform.
IEEE Access, 2020

A Centralized Key Management Scheme Based on McEliece PKC for Space Network.
IEEE Access, 2020

2019
Dynamically Reconfigurable Encryption and Decryption System Design for the Internet of Things Information Security.
Sensors, 2019

An Improved Rao-Nam Cryptosystem Based on Fractional Order Hyperchaotic System and EDF-QC-LDPC.
Int. J. Bifurc. Chaos, 2019

A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network.
IEEE Access, 2019

2018
Dynamical Analysis and Homogenization Process of Unimodal Chaotic Mapping Utilized for Pseudo-Random Sequences.
Int. J. Bifurc. Chaos, 2018

A Dynamic Reconfigurable Design of Multiple Cryptographic Algorithms Based on FPGA.
Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018

2015
A fast encryption algorithm of color image based on four-dimensional chaotic system.
J. Vis. Commun. Image Represent., 2015

WSN中考虑负载均衡的贪婪寻优中继节点布局算法的研究 (Research on Relay Node Placement Considering Load Balancing Based on Greedy Optimization Algorithm in Wireless Sensor Networks).
计算机科学, 2015

An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps.
Entropy, 2015

A novel compound chaotic block cipher for wireless sensor networks.
Commun. Nonlinear Sci. Numer. Simul., 2015

2010
The research of worm distributed detection technology based on network security.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model.
Comput. Phys. Commun., 2009


  Loading...