UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Adaptive LSB quantum watermarking method using tri-way pixel value differencing Journal article
QUANTUM INFORMATION PROCESSING, 2019,Volume: 18,Issue: 2
Authors:  Luo, Gaofeng;  Zhou, Ri-Gui;  Luo, Jia;  Hu, WenWen;  Zhou, Yang;  Ian, Hou
Favorite  |  View/Download:0/0  |  Submit date:2019/01/17
Quantum image watermarking  Pixel value difference  Least significant bit  Visual quality  
Quantum Watermarking Scheme Based on INEQR Journal article
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018,Volume: 57,Issue: 4,Page: 1120-1131
Authors:  Zhou, Ri-Gui;  Zhou, Yang;  Zhu, Changming;  Wei, Lai;  Zhang, Xiafen;  Ian, Hou
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30
Quantum watermarking  XOR operation  Swap operation  LSB algorithm  
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats Journal article
IEEE Access, 2017,Volume: 5,Page: 20111-20123
Authors:  Yang, Lu-Xing;  Li, Pengdeng;  Yang, Xiaofan;  Tang, Yuan Yan
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30
Cyberspace  Security  Measurement  Nonlinear Dynamical Systems  Stability  
Resonant Dipolar Coupling of Microwaves with Confined Acoustic Vibrations in a Rod-shaped Virus Journal article
SCIENTIFIC REPORTS, 2017,Volume: 7
Authors:  Sun, Chi-Kuang;  Tsai, Yi-Chun;  Chen, Yi-Jan E.;  Liu, Tzu-Ming;  Chen, Hui-Yuan;  Wang, Han-Ching;  Lo, Chu-Fang
View  |  Adobe PDF(781Kb)  |  Favorite  |  View/Download:122/3  |  Submit date:2018/10/30
Data integrity attacks against the distributed real-time pricing in the smart grid Conference paper
2016 IEEE 35th International Performance Computing and Communications Conference, IPCCC 2016, Las Vegas, NV, United states, 129, 2016 - 1211, 2016
Authors:  Yang, Xinyu;  Zhang, Xialei;  Lin, Jie;  Yu, Wei;  Fu, Xinwen;  Zhao, Wei
Favorite  |  View/Download:0/0  |  Submit date:2018/11/06
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Favorite  |  View/Download:0/0  |  Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics  
Secure and verifiable outsourcing of nonnegative matrix factorization (NMF) Conference paper
IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop, Vigo, Galicia, Spain, 6 20, 2016 - 6 22, 2016
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman
Favorite  |  View/Download:7/0  |  Submit date:2018/11/06
A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems Journal article
IEEE Transactions on Computers, 2015,Volume: 64,Issue: 1,Page: 4
Authors:  Yang X.;  Lin J.;  Yu W.;  Moulema P.-M.;  Fu X.;  Zhao W.
Favorite  |  View/Download:3/0  |  Submit date:2018/10/30
and polynomial-based en-route filtering  Cyber-physical networked system  data injection attack  sensor networks  
Delay analysis of IEEE 802.15.6 use of emergency medical services on human body communication Conference paper
IFMBE Proceedings
Authors:  Wang Z.T.;  Lam C.T.;  Wang M.;  Wu Z.M.;  Wan F.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/24
Emergency  HBC  IEEE 802.15.6  MAC  
A novel en-route filtering scheme against false data injection attacks in Cyber-Physical Networked Systems Conference paper
Proceedings - International Conference on Distributed Computing Systems, Macau, China, 6 18, 2012 - 6 21, 2012
Authors:  Yang, Xinyu;  Lin, Jie;  Moulema, Paul;  Yu, Wei;  Fu, Xinwen;  Zhao, Wei
Favorite  |  View/Download:2/0  |  Submit date:2018/11/06