![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Yongjin Xian
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Bin Ma
, Hongtao Duan
, Ruihe Ma, Yongjin Xian
, Xiaolong Li
:
High-Performance Optimization Framework for Reversible Data Hiding Predictor. IEEE Signal Process. Lett. 32: 231-235 (2025) - 2024
- [j12]Xiaoyu Wang
, Xingyuan Wang, Bin Ma, Qi Li, Chunpeng Wang, Yongjin Xian, Bing Han:
Reversible data hiding algorithm based on adaptive prediction and code division multiplexing. Multim. Tools Appl. 83(2): 3725-3743 (2024) - [c8]Chunpeng Wang
, Chaoyi Shi
, Yunan Liu
, Zhiqiu Xia
, Jian Li
, Yongjin Xian
, Bin Ma
:
Dual-Task Cascaded for Proactive Deepfake Detection Using QPCET Watermarking. PRCV (2) 2024: 132-147 - [c7]Bin Ma
, Chunxin Zhao
, Ruihe Ma
, Yongjin Xian
, Chunpeng Wang
:
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm. PRICAI (3) 2024: 220-232 - 2023
- [j11]Yongjin Xian
, Xingyuan Wang, Yingqian Zhang, Xiaopeng Yan, Ziyu Leng:
A novel chaotic image encryption with FSV based global bit-level chaotic permutation. Multim. Tools Appl. 82(1): 407-426 (2023) - [c6]Yongjin Xian
, Ruihe Ma
, Pengyu Liu
, Linna Zhou
:
Image Encryption Scheme Based on New 1D Chaotic System and Blockchain. IWDW 2023: 3-17 - [c5]Meihong Yang
, Baolin Qi
, Yongjin Xian
, Jian Li
:
An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks. IWDW 2023: 95-108 - [c4]Bin Ma
, Haocheng Wang
, Yongjin Xian
, Chunpeng Wang
, Guanxu Zhao:
Cross-channel Image Steganography Based on Generative Adversarial Network. IWDW 2023: 194-206 - [c3]Chunxin Zhao
, Ruihe Ma
, Yongjin Xian
:
A Reversible Data Hiding Algorithm for JPEG Image Based on Paillier Homomorphic Encryption. IWDW 2023: 207-222 - [c2]Hongtao Duan
, Ruihe Ma
, Songkun Wang
, Yongjin Xian
, Chunpeng Wang, Guanxu Zhao:
Convolutional Neural Network Prediction Error Algorithm Based on Block Classification Enhanced. IWDW 2023: 223-232 - 2022
- [j10]Yongjin Xian
, Xingyuan Wang, Lin Teng
, Xiaopeng Yan, Qi Li, Xiaoyu Wang:
Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system. Inf. Sci. 596: 304-320 (2022) - [j9]Lin Teng
, Xingyuan Wang, Yongjin Xian:
Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf. Sci. 605: 71-85 (2022) - [j8]Yongjin Xian
, Xingyuan Wang
, Xiaoyu Wang
, Qi Li
, Xiaopeng Yan
:
Spiral-Transform-Based Fractal Sorting Matrix for Chaotic Image Encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 69(8): 3320-3327 (2022) - [j7]Yongjin Xian
, Xingyuan Wang
, Lin Teng
:
Double Parameters Fractal Sorting Matrix and Its Application in Image Encryption. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4028-4037 (2022) - [c1]Yongjin Xian, Xingyuan Wang, Xiaoyu Wang, Qi Li, Bin Ma:
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication. ICAIS (3) 2022: 309-322 - 2021
- [j6]Yongjin Xian
, Xingyuan Wang:
Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547: 1154-1169 (2021) - [j5]Xiaopeng Yan, Xingyuan Wang, Yongjin Xian
:
Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multim. Tools Appl. 80(7): 10949-10983 (2021) - 2020
- [j4]Qi Li
, Xingyuan Wang
, Xiaoyu Wang, Bin Ma
, Chunpeng Wang
, Yongjin Xian
, Yun-Qing Shi:
A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks. IEEE Access 8: 168166-168176 (2020) - [j3]Xiaopeng Yan
, Xingyuan Wang, Yongjin Xian
:
Chaotic Image Encryption Algorithm Based on Fractional Order Scrambling Wavelet Transform and 3D Cyclic Displacement Operation. IEEE Access 8: 208718-208736 (2020)
2010 – 2019
- 2017
- [j2]Chengde Zheng, Yongjin Xian
, Zhanshan Wang:
Third-order reciprocally convex approach to stability of fuzzy cellular neural networks under impulsive perturbations. Soft Comput. 21(3): 699-720 (2017) - 2016
- [j1]Chengde Zheng, Yongjin Xian
:
On synchronization for chaotic memristor-based neural networks with time-varying delays. Neurocomputing 216: 570-586 (2016)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint