关注
Yanli Ren
Yanli Ren
在 shu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Efficient reversible data hiding in encrypted images
X Zhang, Z Qian, G Feng, Y Ren
Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014
1842014
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
X Zhang, Z Qian, Y Ren, G Feng
IEEE Transactions on Information Forensics and Security 6 (4), 1223-1232, 2011
1812011
Scalable coding of encrypted images
X Zhang, G Feng, Y Ren, Z Qian
IEEE transactions on image processing 21 (6), 3108-3114, 2012
1232012
Compressing encrypted images with auxiliary information
X Zhang, Y Ren, L Shen, Z Qian, G Feng
IEEE transactions on multimedia 16 (5), 1327-1336, 2014
742014
Compressing encrypted image using compressive sensing
X Zhang, Y Ren, G Feng, Z Qian
2011 seventh international conference on intelligent information hiding and …, 2011
742011
Security of quantum digital signatures for classical messages
TY Wang, XQ Cai, YL Ren, RL Zhang
Scientific reports 5 (1), 9231, 2015
722015
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
Internet and Distributed Computing Systems: 5th International Conference …, 2012
682012
On cloud storage optimization of blockchain with a clustering-based genetic algorithm
M Xu, G Feng, Y Ren, X Zhang
IEEE Internet of Things Journal 7 (9), 8547-8558, 2020
632020
Fully CCA2 secure identity based broadcast encryption without random oracles
Y Ren, D Gu
Information Processing Letters 109 (11), 527-533, 2009
622009
Diversity-based cascade filters for JPEG steganalysis
G Feng, X Zhang, Y Ren, Z Qian, S Li
IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019
542019
Block cipher based separable reversible data hiding in encrypted images
Z Qian, X Zhang, Y Ren, G Feng
Multimedia Tools and Applications 75, 13749-13763, 2016
472016
Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks
Y Ren, X Li, SF Sun, X Yuan, X Zhang
Journal of Information Security and Applications 58, 102698, 2021
432021
Consistency-induced multiview subspace clustering
Y Qin, G Feng, Y Ren, X Zhang
IEEE Transactions on Cybernetics 53 (2), 832-844, 2022
322022
Fully anonymous identity-based broadcast encryption without random oracles.
Y Ren, Z Niu, X Zhang
Int. J. Netw. Secur. 16 (4), 256-264, 2014
322014
Privacy-protected deletable blockchain
X Cai, Y Ren, X Zhang
IEEE Access 8, 6060-6070, 2019
282019
Privacy-enhanced and verification-traceable aggregation for federated learning
Y Ren, Y Li, G Feng, X Zhang
IEEE Internet of Things Journal 9 (24), 24933-24948, 2022
272022
Verifiable outsourcing algorithms for modular exponentiations with improved checkability
Y Ren, N Ding, X Zhang, H Lu, D Gu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
272016
Feature extraction optimization of JPEG steganalysis based on residual images
Z Jin, G Feng, Y Ren, X Zhang
Signal Processing 170, 107455, 2020
252020
New fuzzy identity-based encryption in the standard model
Y Ren, D Gu, S Wang, X Zhang
Informatica 21 (3), 393-407, 2010
252010
Embedding probability guided network for image steganalysis
Q Li, G Feng, Y Ren, X Zhang
IEEE Signal Processing Letters 28, 1095-1099, 2021
222021
系统目前无法执行此操作,请稍后再试。
文章 1–20