Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 501 matches
- 2024
- Shimin Li, Ruoyu Zhao, Qingxiao Guan, Junxin Chen, Yushu Zhang:
A 3D model encryption method supporting adaptive visual effects after decryption. Adv. Eng. Informatics 59: 102319 (2024) - Xiuli Chai, Guoqiang Long, Zhihua Gan, Yushu Zhang:
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images. Appl. Intell. 54(4): 3429-3447 (2024) - Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Weiqiang Liu:
Imperceptible and multi-channel backdoor attack. Appl. Intell. 54(1): 1099-1116 (2024) - Rui Zhang, Yao Wang, Zhi Li, Yushu Shi, Danping Yu, Qiang Huang, Feng Chen, Wenbo Xiao, Yuan Hong, Zhan Feng:
Dynamic radiomics based on contrast-enhanced MRI for predicting microvascular invasion in hepatocellular carcinoma. BMC Medical Imaging 24(1): 80 (2024) - Ruoyu Zhao, Yushu Zhang, Shimin Li, Wenying Wen, Shuang Yi, Rushi Lan:
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system. Expert Syst. Appl. 238(Part E): 122140 (2024) - Xingxin Li, Youwen Zhu, Rui Xu, Jian Wang, Yushu Zhang:
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query. Frontiers Comput. Sci. 18(1): 181803 (2024) - Yushu Zhang, Gang Li, Xiao-Ping Zhang, You He:
A deep learning model based on transformer structure for radar tracking of maneuvering targets. Inf. Fusion 103: 102120 (2024) - Guiqiang Hu, Hongwei Li, Wenshu Fan, Yushu Zhang:
Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain. IEEE Internet Things J. 11(4): 7116-7127 (2024) - Donghe Li, Qingyu Yang, Dou An, Yushuo Zhang:
A Location-Privacy-Aware Taxi-Hailing System: Adaptive Differential Privacy-Based Dynamic Incentive Method. IEEE Internet Things J. 11(1): 914-930 (2024) - Yakun Ma, Xiuli Chai, Zhihua Gan, Yushu Zhang:
Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 11(3): 4842-4856 (2024) - Rufei Ren, Yushuai Li, Qiuye Sun, Shiliang Zhang, David Wenzhong Gao, Sabita Maharjan:
Switched Surplus-Based Distributed Security Dispatch for Smart Grid With Persistent Packet Loss. IEEE Internet Things J. 11(4): 6185-6198 (2024) - Jiaqing Zhang, Tao Sun, Feng Liu, Yushun Liu, Liangpeng Ye:
Dynamic output feedback control for UAVs with limited network bandwidth: A GA-assisted design approach. J. Frankl. Inst. 361(2): 598-611 (2024) - Jiahao Zhao, Yushu Zhang, Jiajia Jiang, Zhongyun Hua, Yong Xiang:
A secure dynamic cross-chain decentralized data consistency verification model. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101897 (2024) - Wenying Wen, Qiyu Jiang, Haigang Huang, Yushu Zhang, Yuming Fang:
TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion. IEEE Signal Process. Lett. 31: 1039-1043 (2024) - Rui Yang, Zhenrong Deng, Yushu Zhang, Xiaonan Luo, Rushi Lan:
4DPM: Deepfake Detection With a Denoising Diffusion Probabilistic Mask. IEEE Signal Process. Lett. 31: 914-918 (2024) - Zhongyang Ming, Huaguang Zhang, Yushuai Li, Yuling Liang:
Mixed H2/H∞ Control for Nonlinear Closed-Loop Stackelberg Games With Application to Power Systems. IEEE Trans Autom. Sci. Eng. 21(1): 69-77 (2024) - Jun Mou, Tao Ma, Santo Banerjee, Yushu Zhang:
A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 71(4): 1771-1780 (2024) - Zhongyun Hua, Xingyu Liu, Yifeng Zheng, Shuang Yi, Yushu Zhang:
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1799-1814 (2024) - Xingce Liu, Jun Mou, Yushu Zhang, Yinghong Cao:
A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation. IEEE Trans. Ind. Electron. 71(5): 5094-5104 (2024) - Youwen Zhu, Yiran Cao, Qiao Xue, Qihui Wu, Yushu Zhang:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 19: 414-426 (2024) - Yuwen Sha, Jun Mou, Santo Banerjee, Yushu Zhang:
Exploiting Flexible and Secure Cryptographic Technique for Multidimensional Image Based on Graph Data Structure and Three-Input Majority Gate. IEEE Trans. Ind. Informatics 20(3): 3835-3846 (2024) - Mingfu Xue, Yinghao Wu, Shifeng Ni, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. IEEE Trans. Ind. Informatics 20(3): 5004-5013 (2024) - Xiuli Chai, Yakun Ma, Yinjing Wang, Zhihua Gan, Yushu Zhang:
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images. IEEE Trans. Multim. 26: 6102-6116 (2024) - Wenying Wen, Ziye Yuan, Shuren Qi, Yushu Zhang, Yuming Fang:
PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine. IEEE Trans. Multim. 26: 5795-5806 (2024) - Chengrui Zhang, Junxin Chen, Dongming Chen, Wei Wang, Yushu Zhang, Yicong Zhou:
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics. IEEE Trans. Multim. 26: 1114-1128 (2024) - Fei Teng, Yuxin Zhang, Tiankai Yang, Tieshan Li, Yang Xiao, Yushuai Li:
Distributed Optimal Energy Management for We-Energy Considering Operation Security. IEEE Trans. Netw. Sci. Eng. 11(1): 225-235 (2024) - Chunyu Wei, Yushun Fan, Jia Zhang, Zhixuan Jia, Ruyu Yan:
Dynamic Relation Graph Learning for Time-Aware Service Recommendation. IEEE Trans. Netw. Serv. Manag. 21(2): 1503-1517 (2024) - Xingyu Liu, Zhongyun Hua, Shuang Yi, Yushu Zhang, Yicong Zhou:
Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images. ACM Trans. Multim. Comput. Commun. Appl. 20(5): 149:1-149:23 (2024) - Wenying Wen, Minghui Huang, Yushu Zhang, Yuming Fang, Yifan Zuo:
Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 25:1-25:15 (2024) - Qiuyu Duan, Zhongyun Hua, Qing Liao, Yushu Zhang, Leo Yu Zhang:
Conditional Backdoor Attack via JPEG Compression. AAAI 2024: 19823-19831
skipping 471 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 13:33 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint