关注
Peiya Li
Peiya Li
College of Cyber Security, Jinan University
在 jnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A content-adaptive joint image compression and encryption scheme
P Li, KT Lo
IEEE Transactions on Multimedia 20 (8), 1960-1972, 2017
862017
Joint image encryption and compression schemes based on 16× 16 DCT
P Li, KT Lo
Journal of Visual Communication and Image Representation 58, 12-24, 2019
392019
Survey on JPEG compatible joint image compression and encryption algorithms
P Li, KT Lo
IET Signal Processing 14 (8), 475-488, 2020
342020
Joint image compression and encryption based on order-8 alternating transforms
P Li, KT Lo
Journal of Visual Communication and Image Representation 44, 61-71, 2017
262017
Joint image compression and encryption based on alternating transforms with quality control
P Li, KT Lo
2015 Visual Communications and Image Processing (VCIP), 1-4, 2015
202015
A new jpeg encryption scheme using adaptive block size
P Li, J Meng, Z Sun
Advances in Intelligent Information Hiding and Multimedia Signal Processing …, 2021
162021
Joint jpeg compression and encryption scheme based on order-8-16 block transform
P Li, Z Sun, Z Situ, M He, T Song
IEEE Transactions on Intelligent Transportation Systems 24 (7), 7687-7696, 2022
112022
Evit: Privacy-preserving image retrieval via encrypted vision transformer in cloud computing
Q Feng, P Li, Z Lu, C Li, Z Wang, Z Liu, C Duan, F Huang, J Weng
IEEE Transactions on Circuits and Systems for Video Technology, 2024
92024
DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks
Q Feng, P Li, Z Lu, Z Zhou, Y Wu, J Weng, F Huang
Applied Soft Computing 133, 109935, 2023
92023
Encrypted jpeg image retrieval using histograms of transformed coefficients
P Li, Z Situ
2019 Asia-Pacific Signal and Information Processing Association Annual …, 2019
92019
GooseBt: A programmable malware detection framework based on process, file, registry, and COM monitoring
Y Yang, Y Lin, Z Li, L Zhao, M Yao, Y Lai, P Li
Computer Communications 204, 24-32, 2023
72023
End-to-end learning for encrypted image retrieval
Q Feng, P Li, ZX Lu, G Liu, F Huang
2021 Asia-Pacific Signal and Information Processing Association Annual …, 2021
72021
The feasibility of NOMA in C-V2X
Z Situ, IWH Ho, Y Hou, P Li
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
72020
A privacy-preserving and end-to-end-based encrypted image retrieval scheme
Z Lu, Q Feng, P Li
2022 IEEE International Conference on Visual Communications and Image …, 2022
52022
The impact of cfo on ofdm based physical-layer network coding with qpsk modulation
LF Xie, IWH Ho, Z Situ, P Li
2020 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2020
42020
Concise security bounds for sending-or-not-sending twin-field quantum key distribution with finite pulses
T Song, P Li, J Weng
Physical Review A 103 (4), 042408, 2021
32021
A privacy-preserving image retrieval scheme based on 16× 16 DCT and deep learning
Z Lu, Q Feng, P Li, KT Lo, F Huang
IEEE Transactions on Cloud Computing 11 (3), 3314-3325, 2023
22023
Encrypted JPEG Image Retrieval via Huffman-code Based Self-Attention Networks
Z Lu, Q Feng, P Li
2022 Asia-Pacific Signal and Information Processing Association Annual …, 2022
12022
Secure reversible data hiding in encrypted images based on adaptive Huffman coding and pixel rearrangement
Y Wang, P Li
Journal of Electronic Imaging 31 (6), 063052-063052, 2022
12022
A Color Image Encryption Algorithm Based on Compressive Sensing and Block-based DNA Coding
Q He, P Li, Y Wang
IEEE Access, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20