


default search action
Hongjun Liu 0002
Person information
- affiliation: University of Jinan, Mathematical Sciences School, China
- affiliation (PhD 2014): Dalian University of Technology, School of Computer Science, China
- affiliation (1995 - 2015): Weifang Vocational College, China
Other persons with the same name
- Hongjun Liu — disambiguation page
- Hongjun Liu 0001 — New York University, Center for Data Science, New York, NY, USA
- Hongjun Liu 0003
— Chongqing University of Posts and Telecommunications, School of Communications and Information Engineering, China - Hongjun Liu 0004 — Ocean University of China, College of Environmental Science and Engineering, Shandong, China
- Hongjun Liu 0005 — Tsinghua University, Department of Computer Science, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j38]Xuerong Li
, Hongjun Liu
:
Constructing Keyed Strong S-Boxes with High Nonlinearity Based on a 2D-Hyperchaotic Map and Elliptic Curve. Int. J. Bifurc. Chaos 35(8): 2550096:1-2550096:17 (2025)
[j37]Yafei Cao
, Hongjun Liu
:
An enhanced key expansion module based on 2D hyper chaotic map and Galois field. Integr. 100: 102302 (2025)
[j36]Shuang Zhou
, Hongjun Liu, Herbert Ho-Ching Iu
, Ugur Erkan
, Abdurrahim Toktas
:
Novel n-Dimensional Nondegenerate Discrete Hyperchaotic Map With Any Desired Lyapunov Exponents. IEEE Internet Things J. 12(7): 9082-9090 (2025)- 2024
[j35]Hongjun Liu
, Yujun Niu, Mengdi Zhao:
Constructing a non-degeneracy nD chaotic map model and counteracting dynamic degradation through adaptive impulsive perturbation. Expert Syst. Appl. 251: 123933 (2024)
[j34]Ruoran Liu
, Hongjun Liu
, Mengdi Zhao:
Cryptanalysis and construction of keyed strong S-Box based on random affine transformation matrix and 2D hyper chaotic map. Expert Syst. Appl. 252: 124238 (2024)
[j33]Yafei Cao
, Hongjun Liu
:
Revealing the Correlation Between Lyapunov Exponent and Modulus of an n-Dimensional Nondegenerate Hyperchaotic Map. Int. J. Bifurc. Chaos 34(7): 2450087:1-2450087:14 (2024)
[j32]Dongya Xu
, Hongjun Liu
:
Constructing a Nondegenerate m-Dimensional Integer-Domain Chaotic Map Model over GF(2n) with Application in PRNG. Int. J. Bifurc. Chaos 34(13): 2450160:1-2450160:16 (2024)
[j31]Mengdi Zhao, Hongjun Liu
:
A non-degenerate n-dimensional integer domain chaotic map model with application to PRNG. Integr. 97: 102200 (2024)- 2023
[j30]Dongya Xu
, Hongjun Liu
:
A Strong Key Expansion Algorithm Based on Nondegenerate 2D Chaotic Map Over GF(2n). Int. J. Bifurc. Chaos 33(15): 2350177:1-2350177:11 (2023)
[j29]Yafei Cao, Hongjun Liu
, Dongya Xu:
Constructing a Nondegenerate 2D Integer-Domain Hyperchaotic Map Over GF(2n) with Application in Parallel Hashing. Int. J. Bifurc. Chaos 33(15): 2350181:1-2350181:14 (2023)
[j28]Yuanyuan Si
, Hongjun Liu
, Mengdi Zhao:
Constructing keyed strong S-Box with higher nonlinearity based on 2D hyper chaotic map and algebraic operation. Integr. 88: 269-277 (2023)
[j27]Mengdi Zhao
, Hongjun Liu
, Yujun Niu:
Batch generating keyed strong S-Boxes with high nonlinearity using 2D hyper chaotic map. Integr. 92: 91-98 (2023)
[j26]Ruoran Liu, Hongjun Liu
, Mengdi Zhao:
Reveal the correlation between randomness and Lyapunov exponent of n-dimensional non-degenerate hyper chaotic map. Integr. 93: 102071 (2023)
[j25]Hongjun Liu
, Jian Liu, Chao Ma:
Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multim. Tools Appl. 82(16): 23899-23914 (2023)
[j24]Hongjun Liu
, Jian Liu, Chao Ma:
Correction to: Constructing dynamic strong S-Box using 3D chaotic map and application to image encryption. Multim. Tools Appl. 82(16): 23915 (2023)- 2022
[j23]Mengdi Zhao, Hongjun Liu
:
Construction of a Nondegenerate 2D Chaotic Map with Application to Irreversible Parallel Key Expansion Algorithm. Int. J. Bifurc. Chaos 32(6): 2250081:1-2250081:11 (2022)
[j22]Yuanyuan Si
, Hongjun Liu
, Yuehui Chen:
Constructing a 3D Exponential Hyperchaotic Map with Application to PRNG. Int. J. Bifurc. Chaos 32(7): 2250095:1-2250095:13 (2022)
[j21]Hongjun Liu
, Xingyuan Wang, Mengdi Zhao, Yujun Niu:
Constructing Strong S-Box by 2D Chaotic Map with Application to Irreversible Parallel Key Expansion. Int. J. Bifurc. Chaos 32(11): 2250163:1-2250163:12 (2022)- 2021
[j20]Yuanyuan Si
, Hongjun Liu
, Yuehui Chen:
Constructing Keyed Strong S-Box Using an Enhanced Quadratic Map. Int. J. Bifurc. Chaos 31(10): 2150146:1-2150146:12 (2021)
[j19]Hongjun Liu
, Xingyuan Wang, Abdurahman Kadir:
Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput. 25(16): 11077-11086 (2021)- 2020
[j18]Xiu Zhao
, Jian Liu
, Hongjun Liu
, Fangfang Zhang
:
Dynamic Analysis of a One-Parameter Chaotic System in Complex Field. IEEE Access 8: 28774-28781 (2020)
[j17]Yujun Niu
, Hongjun Liu
, Qiang Wei:
Synchronization of Coupled Boolean Networks With Different Update Scheme. IEEE Access 8: 79319-79324 (2020)
[j16]Hongjun Liu
, Abdurahman Kadir, Chengbo Xu
:
Cryptanalysis and constructing S-Box based on chaotic map and backtracking. Appl. Math. Comput. 376: 125153 (2020)
[j15]Hongjun Liu
, Abdurahman Kadir, Chengbo Xu:
Color Image Encryption with Cipher Feedback and Coupling Chaotic Map. Int. J. Bifurc. Chaos 30(12): 2050173:1-2050173:14 (2020)
2010 – 2019
- 2019
[j14]Hongjun Liu
, Abdurahman Kadir, Jian Liu:
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation. IEEE Access 7: 37211-37219 (2019)
[j13]Hongjun Liu
, Yingqian Zhang
, Abdurahman Kadir, Yanqiu Xu:
Image encryption using complex hyper chaotic system by injecting impulse into parameters. Appl. Math. Comput. 360: 83-93 (2019)
[j12]Hongjun Liu
, Fengtong Wen, Abdurahman Kadir:
Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multim. Tools Appl. 78(12): 15997-16010 (2019)- 2018
[j11]Hongjun Liu
, Abdurahman Kadir, Xiaobo Sun, Yanling Li:
Chaos based adaptive double-image encryption scheme using hash function and S-boxes. Multim. Tools Appl. 77(1): 1391-1407 (2018)- 2017
[j10]Hongjun Liu
, Abdurahman Kadir, Xiaobo Sun:
Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 11(5): 324-332 (2017)- 2016
[j9]Guoyan Liu
, Abdurahman Kadir, Hongjun Liu
:
Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise. Neural Comput. Appl. 27(3): 687-697 (2016)- 2015
[j8]Hongjun Liu
, Abdurahman Kadir:
Asymmetric color image encryption scheme using 2D discrete-time map. Signal Process. 113: 104-112 (2015)- 2014
[j7]Guoyan Liu
, Jie Li, Hongjun Liu
:
Chaos-based color pathological image encryption scheme using one-time keys. Comput. Biol. Medicine 45: 111-117 (2014)
[j6]Guoyan Liu
, Hongjun Liu
, Abdurahman Kadir:
Hiding message into DNA sequence through DNA coding and chaotic maps. Medical Biol. Eng. Comput. 52(9): 741-747 (2014)- 2013
[j5]Hongjun Liu
, Da Lin, Abdurahman Kadir:
A novel data hiding method based on deoxyribonucleic acid coding. Comput. Electr. Eng. 39(4): 1164-1173 (2013)
[j4]Hongjun Liu
, Xingyuan Wang:
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J. Syst. Softw. 86(3): 826-834 (2013)- 2012
[j3]Hongjun Liu
, Xingyuan Wang, Abdurahman Kadir:
Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12(5): 1457-1466 (2012)
[j2]Guoyan Liu
, Hongjun Liu
, Abdurahman Kadir:
Wavelet-Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity. Comput. Math. Methods Medicine 2012: 406349:1-406349:10 (2012)- 2010
[j1]Hongjun Liu
, Xingyuan Wang:
Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10): 3320-3327 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-23 20:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







