Yuansheng Liu
Yuansheng Liu
在 uts.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Inferring MicroRNA-Disease Associations by Random Walk on a Heterogeneous Network with Multiple Data Sources
Y Liu, X Zeng, Z He, Q Zou
IEEE/ACM Transactions on Computational Biology and Bioinformatics 14 (4 …, 2017
2112017
Prediction and Validation of Disease Genes Using HeteSim Scores
X Zeng, Y Liao, Y Liu, Q Zou
IEEE/ACM Transactions on Computational Biology and Bioinformatics 14 (3 …, 2017
1482017
Breaking a novel image encryption scheme based on improved hyperchaotic sequences
C Li, Y Liu, T Xie, MZQ Chen
Nonlinear Dynamics 73 (3), 2083–2089, 2013
1322013
Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map
Y Liu, J Tang, T Xie
Optics & Laser Technology 60, 111-115, 2014
1022014
A chaotic image encryption scheme owning temp-value feedback
LY Zhang, X Hu, Y Liu, KW Wong, J Gan
Communications in Nonlinear Science and Numerical Simulation 19 (10), 3653-3659, 2014
892014
On the Security of a Class of Diffusion Mechanisms for Image Encryption
LY Zhang, Y Liu, F Pareschi, Y Zhang, KW Wong, R Rovatti, G Setti
IEEE transactions on cybernetics 48 (4), 1163-1175, 2018
672018
Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation
C Li, Y Liu, LY Zhang, MZQ Chen
International Journal of Bifurcation and Chaos 23 (04), 1350075, 2013
452013
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Y Liu, LY Zhang, J Wang, Y Zhang, K Wong
Nonlinear Dynamics 84 (4), 2241-2250, 2015
392015
Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
T Xie, Y Liu, J Tang
Optik 125 (24), 7166-7169, 2014
362014
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
C Li, Y Liu, LY Zhang, KW Wong
Signal Processing: Image Communication 29 (8), 914-920, 2014
352014
Improved known-plaintext attack to permutation-only multimedia ciphers
LY Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen
Information Sciences 430, 228-239, 2018
312018
Deciphering an image cipher based on mixed transformed logistic maps
Y Liu, H Fan, EY Xie, G Cheng, C Li
International Journal of Bifurcation and Chaos 25 (13), 1550188, 2015
232015
High-speed and high-ratio referential genome compression
Y Liu, H Peng, L Wong, J Li
Bioinformatics 33 (21), 3364–3372, 2017
162017
Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers
LY Zhang, Y Zhang, Y Liu, A Yang, G Chen
International Journal of Bifurcation and Chaos 27 (10), 1750155, 2017
152017
Index suffix-prefix overlaps by (w, k)-minimizer to generate long contigs for reads compression
Y Liu, Z Yu, ME Dinger, J Li
Bioinformatics 35 (12), 2066-2074, 2019
122019
Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher
L Zeng, R Liu, LY Zhang, Y Liu, KW Wong
Multimedia Tools and Applications 75 (10), 5439-5453, 2016
102016
Fast detection of maximal exact matches via fixed sampling of query k-mers and Bloom filtering of index k-mers
Y Liu, LY Zhang, J Li
Bioinformatics 35 (22), 4560-4567, 2019
42019
Detection of Anomalous Traffic Patterns and Insight Analysis from Bus Trajectory Data
X Zhang, X Zhang, S Verma, Y Liu, M Blumenstein, J Li
Pacific Rim International Conference on Artificial Intelligence, 307-321, 2019
12019
Chromosome preference of disease genes and vectorization for the prediction of non-coding disease genes
H Peng, C Lan, Y Liu, T Liu, M Blumenstein, J Li
Oncotarget 8 (45), 78901, 2017
12017
Allowing mutations in maximal matches boosts genome compression performance
Y Liu, L Wong, J Li
Bioinformatics, 10.1093/bioinformatics/btaa572, 2020
2020
系统目前无法执行此操作,请稍后再试。
文章 1–20