Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Yushu
    Last name: Zhang
    DBLP: 78/8511
    Rating: (not rated yet)

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 48  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Junxin Chen, Zhiliang Zhu, Libo Zhang, Yushu Zhang, Benqiang Yang.
    Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption.
    Signal Processing 2018, Volume 142 (0) 2018
    Journal article
    Leo Yu Zhang, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen.
    Improved known-plaintext attack to permutation-only multimedia ciphers.
    Inf. Sci. 2018, Volume 430 (0) 2018
    Journal article
    Di Zhang, Xiaofeng Liao, Bo Yang, Yushu Zhang.
    A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform.
    Multimedia Tools Appl. 2018, Volume 77 (0) 2018
    Journal article
    Yushu Zhang, Wenying Wen, Yongfei Wu, Rui Zhang, Jun-xin Chen, Xing He.
    Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral.
    Neural Computing and Applications 2017, Volume 28 (0) 2017
    Conference paper
    Guiqiang Hu, Di Xiao, Tao Xiang, Sen Bai, Yushu Zhang.
    A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.
    Inf. Sci. 2017, Volume 387 (0) 2017
    Conference paper
    Xiu-Li Chai, Zhihua Gan, Yiran Chen, Yushu Zhang.
    A visually secure image encryption scheme based on compressive sensing.
    Signal Processing 2017, Volume 134 (0) 2017
    Conference paper
    WeiQiang Xu, Weiwei Chen, Yushu Zhang, Qingjiang Shi, Xiaodong Wang.
    On the Optimization Model for Multi-Hop Information Transmission and Energy Transfer in TDMA-Based Wireless Sensor Networks.
    IEEE Communications Letters 2017, Volume 21 (0) 2017
    Conference paper
    Fang Han, Xiaofeng Liao, Huiwei Wang, Bo Yang, Yushu Zhang.
    A self-adaptive scheme for double color-image encryption.
    Ninth International Conference on Advanced Computational Intelligence, ICACI 2017, Doha, Qatar, February 4-6, 2017 2017 (0) 2017
    Conference paper
    Yushu Zhang, Kewu Peng, Jian Song, Yaqi Sun.
    Channel coding for NOMA schemes with a JD or SIC receiver.
    13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain, June 26-30, 2017 2017 (0) 2017
    Conference paper
    Yushu Zhang, Kewu Peng, Jian Song.
    Spatially coupled QC-LDPC for the tradeoff between MIMO BICM and BICM-ID schemes.
    2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, BMSB 2017, Cagliari, Italy, June 7-9, 2017 2017 (0) 2017
    Conference paper
    Yushu Zhang, Kewu Peng, Zhangmei Chen, Jian Song.
    SIC vs. JD: Uplink NOMA techniques for M2M random access.
    IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017 2017 (0) 2017
    Conference paper
    Yushu Zhang, Hui Huang 0008, Yong Xiang, Leo Yu Zhang, Xing He.
    Harnessing the Hybrid Cloud for Secure Big Image Data Service.
    IEEE Internet of Things Journal 2017, Volume 4 (0) 2017
    Conference paper
    Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen.
    Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
    I. J. Bifurcation and Chaos 2017, Volume 27 (0) 2017
    Conference paper
    Yushu Zhang, Yuan Zhu, Gang Xiong.
    On Beam Aggregation in Millimeter-Wave System.
    85th IEEE Vehicular Technology Conference, VTC Spring 2017, Sydney, Australia, June 4-7, 2017 2017 (0) 2017
    Journal article
    Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su.
    Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization.
    Security and Communication Networks 2016, Volume 9 (0) 2016
    Journal article
    Hong Liu, Di Xiao, Rui Zhang, Yushu Zhang, Sen Bai.
    Robust and hierarchical watermarking of encrypted images based on Compressive Sensing.
    Sig. Proc.: Image Comm. 2016, Volume 45 (0) 2016
    Journal article
    Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao.
    Embedding cryptographic features in compressive sensing.
    Neurocomputing 2016, Volume 205 (0) 2016
    Conference paper
    Hong Liu, Di Xiao, Yunpeng Xiao, Yushu Zhang.
    Robust image hashing with tampering recovery capability via low-rank and sparse representation.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Jiantao Zhou.
    Bi-level Protected Compressive Sampling.
    IEEE Transactions on Multimedia 2016, Volume 18 (0) 2016
    Conference paper
    Yushu Zhang, Kewu Peng, Jian Song, Shuang Chen.
    Multiuser Diversity Gain from Superposition of Infinite Users over Block-Fading MAC.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Di Xiao, Qingqing Fu, Tao Xiang, Yushu Zhang.
    Chaotic Image Encryption of Regions of Interest.
    I. J. Bifurcation and Chaos 2016, Volume 26 (0) 2016
    Conference paper
    Wenying Wen, Yushu Zhang, Yuming Fang, Zhijun Fang.
    A novel selective image encryption method based on saliency detection.
    2016 Visual Communications and Image Processing, VCIP 2016, Chengdu, China, November 27-30, 2016 2016 (0) 2016
    Conference paper
    Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen, Xing He.
    A Review of Compressive Sensing in Information Security Field.
    IEEE Access 2016, Volume 4 (0) 2016
    Conference paper
    Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Di Xiao, Bin Chen, Xiaofeng Liao.
    A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions.
    I. J. Bifurcation and Chaos 2016, Volume 26 (0) 2016
    Journal article
    Jun-xin Chen, Zhiliang Zhu, Chong Fu, Hai Yu, Yushu Zhang.
    Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.
    Signal Processing 2015, Volume 111 (0) 2015
    Show item 1 to 25 of 48  

    Your query returned 48 matches in the database.