关注
Yanli Ren
Yanli Ren
在 shu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Efficient reversible data hiding in encrypted images
X Zhang, Z Qian, G Feng, Y Ren
Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014
1802014
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
X Zhang, Z Qian, Y Ren, G Feng
IEEE Transactions on Information Forensics and Security 6 (4), 1223-1232, 2011
1792011
Scalable coding of encrypted images
X Zhang, G Feng, Y Ren, Z Qian
IEEE transactions on image processing 21 (6), 3108-3114, 2012
1232012
Compressing encrypted images with auxiliary information
X Zhang, Y Ren, L Shen, Z Qian, G Feng
IEEE transactions on multimedia 16 (5), 1327-1336, 2014
742014
Compressing encrypted image using compressive sensing
X Zhang, Y Ren, G Feng, Z Qian
2011 seventh international conference on intelligent information hiding and …, 2011
732011
Security of quantum digital signatures for classical messages
TY Wang, XQ Cai, YL Ren, RL Zhang
Scientific reports 5 (1), 9231, 2015
702015
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
Internet and Distributed Computing Systems: 5th International Conference …, 2012
682012
Fully CCA2 secure identity based broadcast encryption without random oracles
Y Ren, D Gu
Information Processing Letters 109 (11), 527-533, 2009
612009
On cloud storage optimization of blockchain with a clustering-based genetic algorithm
M Xu, G Feng, Y Ren, X Zhang
IEEE Internet of Things Journal 7 (9), 8547-8558, 2020
552020
Diversity-based cascade filters for JPEG steganalysis
G Feng, X Zhang, Y Ren, Z Qian, S Li
IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019
472019
Block cipher based separable reversible data hiding in encrypted images
Z Qian, X Zhang, Y Ren, G Feng
Multimedia Tools and Applications 75, 13749-13763, 2016
462016
Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks
Y Ren, X Li, SF Sun, X Yuan, X Zhang
Journal of Information Security and Applications 58, 102698, 2021
422021
Fully anonymous identity-based broadcast encryption without random oracles.
Y Ren, Z Niu, X Zhang
Int. J. Netw. Secur. 16 (4), 256-264, 2014
322014
Verifiable outsourcing algorithms for modular exponentiations with improved checkability
Y Ren, N Ding, X Zhang, H Lu, D Gu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
272016
Privacy-protected deletable blockchain
X Cai, Y Ren, X Zhang
IEEE Access 8, 6060-6070, 2019
262019
Feature extraction optimization of JPEG steganalysis based on residual images
Z Jin, G Feng, Y Ren, X Zhang
Signal Processing 170, 107455, 2020
252020
New fuzzy identity-based encryption in the standard model
Y Ren, D Gu, S Wang, X Zhang
Informatica 21 (3), 393-407, 2010
252010
Efficient anonymous identity-based broadcast encryption without random oracles
X Li, R Yanli
International Journal of Digital Crime and Forensics (IJDCF) 6 (2), 40-51, 2014
222014
Efficient identity based signature/signcryption scheme in the standard model
R Yanli, G Dawu
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE …, 2007
222007
Efficient algorithm for secure outsourcing of modular exponentiation with single server
Y Ren, M Dong, Z Qian, X Zhang, G Feng
IEEE Transactions on Cloud Computing 9 (1), 145-154, 2018
212018
系统目前无法执行此操作,请稍后再试。
文章 1–20