CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis T Fu, L Chen, Z Fu, K Yu, Y Wang Journal of Visual Communication and Image Representation 88, 103633, 2022 | 23 | 2022 |
The design of keyed hash function based on CNN-MD structure Y Wang, L Chen, X Wang, G Wu, K Yu, T Lu Chaos, Solitons & Fractals 152, 111443, 2021 | 13 | 2021 |
An image encryption scheme based on logistic quantum chaos Y Wang, L Chen, K Yu, Y Gao, Y Ma Entropy 24 (2), 251, 2022 | 12 | 2022 |
ADA-QKDN: A new quantum key distribution network routing scheme based on application demand adaptation LQ Chen, MN Zhao, KL Yu, TY Tu, YL Zhao, YC Wang Quantum Information Processing 20, 1-22, 2021 | 12 | 2021 |
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing Y Wang, L Chen, G Wu, K Yu, T Lu Computers & Security 128, 103163, 2023 | 11 | 2023 |
Reversible data hiding in encrypted images for coding channel based on adaptive steganography K Yu, L Chen, Y Wang, J Han, L Zhang IET Image Processing 14 (16), 4229-4239, 2020 | 11 | 2020 |
Image encryption algorithm based on lattice hash function and privacy protection Y Wang, L Chen, K Yu, T Lu Multimedia Tools and Applications 81 (13), 18251-18277, 2022 | 10 | 2022 |
V‐LDAA: A New Lattice‐Based Direct Anonymous Attestation Scheme for VANETs System L Chen, T Tu, K Yu, M Zhao, Y Wang Security and Communication Networks 2021 (1), 4660875, 2021 | 10 | 2021 |
A coding layer robust reversible watermarking algorithm for digital image in multi-antenna system K Yu, L Chen, Z Fu, Y Wang, T Lu Signal Processing 199, 108630, 2022 | 8 | 2022 |
APR-QKDN: A Quantum Key Distribution Network Routing Scheme Based on Application Priority Ranking L Chen, Z Zhang, M Zhao, K Yu, S Liu Entropy 24 (11), 1519, 2022 | 7 | 2022 |
A channel coding information hiding algorithm for images based on uniform cyclic shift K Yu, L Chen, Y Wang, T Lu Multimedia Tools and Applications 81 (8), 11279-11300, 2022 | 5 | 2022 |
RIS-assisted physical layer key generation by exploiting randomness from channel coefficients of reflecting elements and OFDM subcarriers T Lu, L Chen, J Han, Y Wang, K Yu Ad Hoc Networks 138, 103002, 2023 | 2 | 2023 |
Multi-key spatio-temporal chaotic image encryption and retrieval scheme Y Wang, L Chen, K Yu, H Fang Nonlinear Dynamics 112 (4), 3003-3025, 2024 | 1 | 2024 |
Radio Tomographic Imaging Based on Improved Ellipse Weight Model H Xu, W Ke, K Yu Hans J. Wirel. Commun 8, 97-105, 2018 | 1 | 2018 |
Online-calibrated CS-based indoor localization over IEEE 802.11 wireless infrastructure W Ke, J Jin, H Xu, K Yu, J Shao Progress In Electromagnetics Research C 70, 73-81, 2016 | 1 | 2016 |
A Secure Spatio-temporal Chaotic Pseudorandom Generator for Image Encryption Y Wang, L Chen, K Yu, T Fu IEEE Transactions on Circuits and Systems for Video Technology, 2024 | | 2024 |
Steganalysis by Codeword Error Bits Run-length against Coding Channel Steganography Y Guo, L Chen, K Yu, Y Wang 2023 8th International Conference on Signal and Image Processing (ICSIP …, 2023 | | 2023 |
基于改进椭圆权重模型的无线层析定位方法 许桁宽, 柯炜, 于坤良 Hans Journal of Wireless Communications 8, 97, 2018 | | 2018 |
基于改进椭圆权重模型的射频层析成像定位方法 李莉, 柯炜, 许桁宽, 于坤良, 王彦力 通信学报 39 (12), 167-174, 2018 | | 2018 |