default search action
Lvchen Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Yinggang Gao, Wanjun Zhang, Huifang He, Lvchen Cao, Yonghua Zhang, Ziqing Huang, Xiuming Zhao:
TSSFN: Transformer-based self-supervised fusion network for low-quality fundus image enhancement. Biomed. Signal Process. Control. 89: 105768 (2024) - [j23]Bingyu Yang, Lvchen Cao, He Zhao, Huiqi Li, Hanruo Liu, Ningli Wang:
Adaptive enhancement of cataractous retinal images for contrast standardization. Medical Biol. Eng. Comput. 62(2): 357-369 (2024) - [j22]Wanjun Zhang, Yujie Ding, Miaohui Zhang, Yonghua Zhang, Lvchen Cao, Ziqing Huang, Jun Wang:
TCPCNet: a transformer-CNN parallel cooperative network for low-light image enhancement. Multim. Tools Appl. 83(17): 52957-52972 (2024) - 2023
- [j21]Zilong Pang, Mingxu Wang, Lvchen Cao, Xiuli Chai, Zhihua Gan:
Pairwise open-sourced dataSet protection based on adaptive blind watermarking. Appl. Intell. 53(14): 17391-17410 (2023) - [j20]Yuxuan Sun, Lvchen Cao, Wanjun Zhang:
Double Color Image Visual Encryption Based on Digital Chaos and Compressed Sensing. Int. J. Bifurc. Chaos 33(4): 2350044:1-2350044:20 (2023) - [j19]Yang Lu, Mengxin Gong, Lvchen Cao, Zhihua Gan, Xiuli Chai, Ang Li:
Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption. J. King Saud Univ. Comput. Inf. Sci. 35(3): 37-58 (2023) - [j18]Bingyu Yang, He Zhao, Lvchen Cao, Hanruo Liu, Ningli Wang, Huiqi Li:
Retinal image enhancement with artifact reduction and structure retention. Pattern Recognit. 133: 108968 (2023) - 2022
- [j17]Dezheng Zhang, Shunsheng Zhang, Yuling Luo, Lvchen Cao:
Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis. Int. J. Bifurc. Chaos 32(9): 2250127:1-2250127:14 (2022) - [j16]Lanhang Li, Yuling Luo, Senhui Qiu, Xue Ouyang, Lvchen Cao, Shunbin Tang:
Image encryption using chaotic map and cellular automata. Multim. Tools Appl. 81(28): 40755-40773 (2022) - [j15]Yuling Luo, Xue Ouyang, Junxiu Liu, Lvchen Cao, Yanli Zou:
An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Comput. 26(11): 5409-5435 (2022) - [j14]Junxiu Liu, Shunsheng Zhang, Yuling Luo, Lvchen Cao:
Machine Learning-Based Similarity Attacks for Chaos-Based Cryptosystems. IEEE Trans. Emerg. Top. Comput. 10(2): 824-837 (2022) - 2021
- [j13]Lvchen Cao, Huiqi Li:
Detail-richest-channel based enhancement for retinal image and beyond. Biomed. Signal Process. Control. 69: 102933 (2021) - [j12]Yuling Luo, Liangjia Li, Junxiu Liu, Shunbin Tang, Lvchen Cao, Shunsheng Zhang, Senhui Qiu, Yi Cao:
A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Syst. Appl. 168: 114272 (2021) - 2020
- [j11]Yuling Luo, Shunsheng Zhang, Junxiu Liu, Lvchen Cao:
Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks. Int. J. Bifurc. Chaos 30(15): 2050223:1-2050223:15 (2020) - [j10]Lvchen Cao, Huiqi Li, Yanjun Zhang, Li Zhang, Liang Xu:
Hierarchical method for cataract grading based on retinal images using improved Haar wavelet. Inf. Fusion 53: 196-208 (2020) - [j9]Lvchen Cao, Huiqi Li:
Enhancement of blurry retinal image based on non-uniform contrast stretching and intensity transfer. Medical Biol. Eng. Comput. 58(3): 483-496 (2020) - [j8]Lanhang Li, Yuling Luo, Shubin Tang, Lvchen Cao, Xue Ouyang:
Image encryption algorithm using chaotic maps and cellular automata. EAI Endorsed Trans. Security Safety 7(26): e3 (2020) - [j7]Lvchen Cao, Huiqi Li, Yanjun Zhang:
Retinal image enhancement using low-pass filtering and α-rooting. Signal Process. 170: 107445 (2020) - [c6]Shunsheng Zhang, Yuling Luo, Lvchen Cao, Junxiu Liu:
Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis. TrustCom 2020: 892-898
2010 – 2019
- 2019
- [j6]Yuling Luo, Xue Ouyang, Junxiu Liu, Lvchen Cao:
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems. IEEE Access 7: 38507-38522 (2019) - [j5]Junxiu Liu, Jiadong Huang, Yuling Luo, Lvchen Cao, Su Yang, Duqu Wei, Ronglong Zhou:
An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain. IEEE Access 7: 80849-80860 (2019) - [j4]Yuling Luo, Jia Lin, Junxiu Liu, Duqu Wei, Lvchen Cao, Ronglong Zhou, Yi Cao, Xuemei Ding:
A robust image encryption algorithm based on Chua's circuit and compressive sensing. Signal Process. 161: 227-247 (2019) - [c5]Yuling Luo, Xue Ouyang, Junxiu Liu, Lvchen Cao:
A Colour Image Encryption Using Genetic Operators and Generalized Henon Chaotic Mapping. HPCC/SmartCity/DSS 2019: 1720-1725 - [c4]Yuling Luo, Lieyang Yao, Junxiu Liu, Dezheng Zhang, Lvchen Cao:
A Block Cryptographic Algorithm for Wireless Sensor Networks Based on Hybrid Chaotic Map. HPCC/SmartCity/DSS 2019: 2790-2797 - [c3]He Zhao, Bingyu Yang, Lvchen Cao, Huiqi Li:
Data-Driven Enhancement of Blurry Retinal Images via Generative Adversarial Networks. MICCAI (1) 2019: 75-83 - [i1]Lvchen Cao, Huiqi Li, Yanjun Zhang, Liang Xu, Li Zhang:
Hierarchical method for cataract grading based on retinal images using improved Haar wavelet. CoRR abs/1904.01261 (2019) - 2018
- [j3]Yuling Luo, Shunbin Tang, Xingsheng Qin, Lvchen Cao, Frank Jiang, Junxiu Liu:
A Double-Image Encryption Scheme Based on Amplitude-Phase Encoding and Discrete Complex Random Transformation. IEEE Access 6: 77740-77753 (2018) - 2017
- [j2]Yunqi Liu, Yuling Luo, Shuxiang Song, Lvchen Cao, Junxiu Liu, Jim Harkin:
Counteracting Dynamical Degradation of Digital Chaotic Chebyshev Map via Perturbation. Int. J. Bifurc. Chaos 27(3): 1750033:1-1750033:14 (2017) - [c2]Yuling Luo, Ronglong Zhou, Lvchen Cao, Junxiu Liu, Jinjie Bi, Yi Cao, Senhui Qiu:
A chaos-based self-adapting RGB image permutation scheme. ICNC-FSKD 2017: 336-341 - 2015
- [j1]Lvchen Cao, Yuling Luo, Jinjie Bi, Senhui Qiu, Zhenkun Lu, Jim Harkin, Liam McDaid:
An authentication strategy based on spatiotemporal chaos for software copyright protection. Secur. Commun. Networks 8(18): 4073-4086 (2015) - 2014
- [c1]Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi, Senhui Qiu:
Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos. SecureComm (1) 2014: 395-404
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint