Yanli Ren
Yanli Ren
在 shu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
X Zhang, Z Qian, Y Ren, G Feng
IEEE Transactions on Information Forensics and Security 6 (4), 1223-1232, 2011
1552011
Efficient reversible data hiding in encrypted images
X Zhang, Z Qian, G Feng, Y Ren
Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014
1322014
Scalable coding of encrypted images
X Zhang, G Feng, Y Ren, Z Qian
IEEE transactions on image processing 21 (6), 3108-3114, 2012
1022012
Security of quantum digital signatures for classical messages
TY Wang, XQ Cai, YL Ren, RL Zhang
Scientific reports 5 (1), 1-4, 2015
582015
Compressing encrypted image using compressive sensing
X Zhang, Y Ren, G Feng, Z Qian
2011 Seventh International Conference on Intelligent Information Hiding and …, 2011
562011
Fully CCA2 secure identity based broadcast encryption without random oracles
Y Ren, D Gu
Information Processing Letters 109 (11), 527-533, 2009
562009
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
International Conference on Internet and Distributed Computing Systems, 146-159, 2012
502012
Compressing encrypted images with auxiliary information
X Zhang, Y Ren, L Shen, Z Qian, G Feng
IEEE transactions on multimedia 16 (5), 1327-1336, 2014
482014
Block cipher based separable reversible data hiding in encrypted images
Z Qian, X Zhang, Y Ren, G Feng
Multimedia Tools and Applications 75 (21), 13749-13763, 2016
322016
Fully Anonymous Identity-based Broadcast Encryption without Random Oracles.
Y Ren, Z Niu, X Zhang
IJ Network Security 16 (4), 256-264, 2014
272014
Verifiable outsourcing algorithms for modular exponentiations with improved checkability
Y Ren, N Ding, X Zhang, H Lu, D Gu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
242016
Efficient identity based signature/signcryption scheme in the standard model
R Yanli, G Dawu
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE …, 2007
212007
Diversity-based cascade filters for JPEG steganalysis
G Feng, X Zhang, Y Ren, Z Qian, S Li
IEEE Transactions on Circuits and Systems for Video Technology 30 (2), 376-386, 2019
192019
New fuzzy identity-based encryption in the standard model
Y Ren, D Gu, S Wang, X Zhang
Informatica 21 (3), 393-407, 2010
182010
Efficient anonymous identity-based broadcast encryption without random oracles
X Li, R Yanli
International Journal of Digital Crime and Forensics (IJDCF) 6 (2), 40-51, 2014
162014
Unbalanced JPEG image steganalysis via multiview data match
A Wu, G Feng, X Zhang, Y Ren
Journal of visual communication and image representation 34, 103-107, 2016
152016
Verifiable Outsourcing Computation of Modular Exponentiations with Single Server.
J Cai, Y Ren, T Jiang
IJ Network Security 19 (3), 449-457, 2017
142017
New algorithms for verifiable outsourcing of bilinear pairings
Y Ren, N Ding, T Wang, H Lu, D Gu
Science China Information Sciences 59 (9), 1-3, 2016
132016
JPEG encryption for image rescaling in the encrypted domain
Z Qian, X Zhang, Y Ren
Journal of Visual Communication and Image Representation 26, 9-13, 2015
122015
Fully secure ciphertext-policy attribute-based encryption with constant size ciphertext
Y Ren, S Wang, X Zhang, Z Qian
2011 Third International Conference on Multimedia Information Networking and …, 2011
122011
系统目前无法执行此操作,请稍后再试。
文章 1–20