default search action
Kwok-Wo Wong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j58]Leo Yu Zhang, Yuansheng Liu, Fabio Pareschi, Yushu Zhang, Kwok-Wo Wong, Riccardo Rovatti, Gianluca Setti:
On the Security of a Class of Diffusion Mechanisms for Image Encryption. IEEE Trans. Cybern. 48(4): 1163-1175 (2018) - 2016
- [j57]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao:
Embedding cryptographic features in compressive sensing. Neurocomputing 205: 472-480 (2016) - [j56]Li Zeng, Renren Liu, Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong:
Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher. Multim. Tools Appl. 75(10): 5439-5453 (2016) - [j55]Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su:
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization. Secur. Commun. Networks 9(1): 43-53 (2016) - [j54]Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Jiantao Zhou:
Bi-level Protected Compressive Sampling. IEEE Trans. Multim. 18(9): 1720-1732 (2016) - 2015
- [j53]Yong Wang, Peng Lei, Kwok-Wo Wong:
A Method for Constructing Bijective S-Box with High Nonlinearity Based on Chaos and Optimization. Int. J. Bifurc. Chaos 25(10): 1550127:1-1550127:15 (2015) - [j52]Junwei Zhou, Kwok-Wo Wong, Yanchao Yang:
Distributed arithmetic coding with interval swapping. Signal Process. 116: 29-37 (2015) - [j51]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Wenying Wen, Jiantao Zhou, Xing He:
Robust coding of encrypted images via structural matrix. Signal Process. Image Commun. 39: 202-211 (2015) - [c14]Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin:
Joint quantization and diffusion for compressed sensing measurements of natural images. ISCAS 2015: 2744-2747 - [i14]Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-Wo Wong:
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure. CoRR abs/1503.06638 (2015) - [i13]Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong, Fabio Pareschi, Yushu Zhang, Riccardo Rovatti, Gianluca Setti:
On the security of a class of diffusion mechanisms for image encryption. CoRR abs/1512.09263 (2015) - 2014
- [j50]Leo Yu Zhang, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong, Jie Gan:
A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19(10): 3653-3659 (2014) - [j49]Yushu Zhang, Di Xiao, Wenying Wen, Kwok-Wo Wong:
On the security of symmetric ciphers based on DNA coding. Inf. Sci. 289: 254-261 (2014) - [j48]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-Wo Wong:
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29(8): 914-920 (2014) - [j47]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang:
Period distribution of generalized discrete Arnold cat map. Theor. Comput. Sci. 552: 13-25 (2014) - [c13]Qiuzhen Lin, Kwok-Wo Wong:
An improved iterative decoding scheme based on error-resistant arithmetic code. ISCAS 2014: 1704-1707 - [i12]Yushu Zhang, Kwok-Wo Wong, Di Xiao, Leo Yu Zhang, Ming Li:
Embedding Cryptographic Features in Compressive Sensing. CoRR abs/1403.6213 (2014) - [i11]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Di Xiao:
Robust Coding of Encrypted Images via Structural Matrix. CoRR abs/1405.6843 (2014) - [i10]Leo Yu Zhang, Kwok-Wo Wong, Chengqing Li, Yushu Zhang:
Towards Secure Compressive Sampling Scheme. CoRR abs/1406.1725 (2014) - [i9]Li Zeng, Renren Liu, Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong:
Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher. CoRR abs/1409.4845 (2014) - [i8]Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin:
Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images. CoRR abs/1411.6079 (2014) - 2013
- [j46]Wei Zhang, Kwok-Wo Wong, Hai Yu, Zhiliang Zhu:
A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3): 584-600 (2013) - [j45]Wei Zhang, Kwok-Wo Wong, Hai Yu, Zhiliang Zhu:
An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8): 2066-2080 (2013) - [j44]Qiuzhen Lin, Kwok-Wo Wong, Jianyong Chen:
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps. J. Syst. Softw. 86(5): 1384-1389 (2013) - [j43]Oi-Yan Lui, Kwok-Wo Wong:
Chaos-based selective encryption for H.264/AVC. J. Syst. Softw. 86(12): 3183-3192 (2013) - [j42]Ching-Hung Yuen, Oi-Yan Lui, Kwok-Wo Wong:
Hybrid fractal image coding with quadtree-based progressive structure. J. Vis. Commun. Image Represent. 24(8): 1328-1341 (2013) - [j41]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang:
Period Distribution of the Generalized Discrete Arnold Cat Map for $N = 2^{e}$. IEEE Trans. Inf. Theory 59(5): 3249-3255 (2013) - [c12]Qiuzhen Lin, Kwok-Wo Wong:
Improving the error correction capability of arithmetic coding by forecasting forbidden symbols. ISCAS 2013: 1139-1142 - [c11]Valerio Cambareri, Salvador Javier Haboba, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti, Kwok-Wo Wong:
A two-class information concealing system based on compressed sensing. ISCAS 2013: 1356-1359 - [i7]Leo Yu Zhang, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong, Jie Gan:
A chaotic image encryption scheme owning temp-value feedback. CoRR abs/1304.2612 (2013) - [i6]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-Wo Wong:
Breaking an image compression and encryption scheme based on Chinese Remainder Theorem. CoRR abs/1306.5615 (2013) - 2012
- [j40]Oi-Yan Lui, Kwok-Wo Wong, Jianyong Chen, Junwei Zhou:
Chaos-based joint compression and encryption algorithm for generating variable length ciphertext. Appl. Soft Comput. 12(1): 125-132 (2012) - [j39]Qiuzhen Lin, Kwok-Wo Wong, Jianyong Chen:
Generalized Arithmetic Coding using discrete Chaotic Maps. Int. J. Bifurc. Chaos 22(10) (2012) - [j38]Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J. Syst. Softw. 85(9): 2077-2085 (2012) - [j37]Andrew Chi-Sing Leung, Yi Xiao, Yong Xu, Kwok-Wo Wong:
Decouple implementation of weight decay for recursive least square. Neural Comput. Appl. 21(7): 1709-1716 (2012) - [j36]Fei Chen, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang:
Period Distribution of Generalized Discrete Arnold Cat Map for N=pe. IEEE Trans. Inf. Theory 58(1): 445-452 (2012) - [c10]Ching-Hung Yuen, Oi-Yan Lui, Kwok-Wo Wong:
Application of chaotic maps for simultaneous lossy image compression and encryption. ISCAS 2012: 393-396 - [c9]Oi-Yan Lui, Ching-Hung Yuen, Kwok-Wo Wong:
Chaos-Based Selective Encryption for AVS Video Coding Standard. PCM 2012: 501-512 - [i5]Chengqing Li, Leo Yu Zhang, Rong Ou, Kwok-Wo Wong:
Breaking a novel colour image encryption algorithm based on chaos. CoRR abs/1203.5467 (2012) - 2011
- [j35]Yong Wang, Kwok-Wo Wong, Xiaofeng Liao, Guanrong Chen:
A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1): 514-522 (2011) - [j34]Ching-Hung Yuen, Kwok-Wo Wong:
A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl. Soft Comput. 11(8): 5092-5098 (2011) - [j33]Kwok-Wo Wong, Qiuzhen Lin, Jianyong Chen:
Error detection in arithmetic coding with artificial markers. Comput. Math. Appl. 62(1): 359-366 (2011) - [j32]Zhiliang Zhu, Wei Zhang, Kwok-Wo Wong, Hai Yu:
A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6): 1171-1186 (2011) - [j31]Pengcheng Wei, Xiaofeng Liao, Kwok-Wo Wong:
Key exchange based on Dickson polynomials over finite field with 2m. J. Comput. 6(12): 2546-2551 (2011) - [j30]Qing Zhou, Kwok-Wo Wong, Xiaofeng Liao, Yue Hu:
On the security of multiple Huffman table based encryption. J. Vis. Commun. Image Represent. 22(1): 85-92 (2011) - [j29]Jianyong Chen, Junwei Zhou, Kwok-Wo Wong:
A Modified Chaos-Based Joint Compression and Encryption Scheme. IEEE Trans. Circuits Syst. II Express Briefs 58-II(2): 110-114 (2011) - [i4]Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. CoRR abs/1112.4941 (2011) - 2010
- [j28]Xiaofeng Liao, Fei Chen, Kwok-Wo Wong:
On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$. IEEE Trans. Computers 59(10): 1392-1401 (2010) - [j27]Kwok-Wo Wong, Qiuzhen Lin, Jianyong Chen:
Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps. IEEE Trans. Circuits Syst. II Express Briefs 57-II(2): 146-150 (2010)
2000 – 2009
- 2009
- [j26]Qing Zhou, Xiaofeng Liao, Kwok-Wo Wong, Yue Hu, Di Xiao:
True random number generator based on mouse movement and chaotic hash function. Inf. Sci. 179(19): 3442-3450 (2009) - [p1]Kwok-Wo Wong:
Image Encryption Using Chaotic Maps. Intelligent Computing Based on Chaos 2009: 333-354 - 2008
- [j25]Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong:
One-way hash function construction based on 2D coupled map lattices. Inf. Sci. 178(5): 1391-1406 (2008) - [j24]Tao Xiang, Kwok-Wo Wong, Xiaofeng Liao:
Cryptanalysis of a password authentication scheme over insecure networks. J. Comput. Syst. Sci. 74(5): 657-661 (2008) - [j23]Kwok-Wo Wong, Ching-Hung Yuen:
Embedding Compression in Chaos-Based Cryptography. IEEE Trans. Circuits Syst. II Express Briefs 55-II(11): 1193-1197 (2008) - 2007
- [j22]Tao Xiang, Kwok-Wo Wong, Xiaofeng Liao:
A novel particle swarm optimizer with time-delay. Appl. Math. Comput. 186(1): 789-793 (2007) - [j21]Tao Xiang, Xiaofeng Liao, Kwok-Wo Wong:
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map. Appl. Math. Comput. 190(2): 1637-1645 (2007) - [c8]Chi-Sing Leung, Kwok-Wo Wong, Yong Xu:
The Local True Weight Decay Recursive Least Square Algorithm. ICONIP (1) 2007: 456-465 - 2006
- [j20]Kwok-Wo Wong, Edward C. W. Lee, Lee-Ming Cheng, Xiaofeng Liao:
Fast elliptic scalar multiplication using new double-base chain and point halving. Appl. Math. Comput. 183(2): 1000-1007 (2006) - [j19]Chuandong Li, Xiaofeng Liao, Kwok-Wo Wong:
Delay-Dependent and Delay-Independent Stability Criteria for Cellular Neural Networks with Delays. Int. J. Bifurc. Chaos 16(11): 3323-3340 (2006) - [j18]Yong Ding, Kwok-Wo Wong, Yu-Min Wang:
Joint Sparse Form of Window Three for Koblitz Curve. Int. J. Netw. Secur. 2(2): 126-130 (2006) - [j17]Di Xiao, Xiaofeng Liao, Kwok-Wo Wong:
Improving the security of a dynamic look-up table based chaotic cryptosystem. IEEE Trans. Circuits Syst. II Express Briefs 53-II(6): 502-506 (2006) - [j16]Yong Chen, Xiaofeng Liao, Kwok-Wo Wong:
Chosen plaintext attack on a cryptosystem with discretized skew tent map. IEEE Trans. Circuits Syst. II Express Briefs 53-II(7): 527-529 (2006) - [j15]Shaowen Li, Xiaofeng Liao, Chunguang Li, Kwok-Wo Wong:
New Asymptotic Stability Criteria for a Two-Neuron Network With Different Time Delays. IEEE Trans. Circuits Syst. II Express Briefs 53-II(8): 682-686 (2006) - [j14]Yong Xu, Kwok-Wo Wong, Chi-Sing Leung:
Generalized RLS approach to the training of neural networks. IEEE Trans. Neural Networks 17(1): 19-34 (2006) - [i3]Kwok-Wo Wong, Bernie Sin-Hung Kwok, Wing-Shing Law:
A Fast Image Encryption Scheme based on Chaotic Standard Map. CoRR abs/cs/0609158 (2006) - [i2]Kwok-Wo Wong, Edward C. W. Lee, Lee-Ming Cheng, Xiaofeng Liao:
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving. IACR Cryptol. ePrint Arch. 2006: 124 (2006) - 2005
- [j13]Yong Ding, Kwok-Wo Wong, Yu-Min Wang:
A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography. Appl. Math. Comput. 167(1): 81-93 (2005) - [j12]Shaowen Li, Xiaofeng Liao, Chunguang Li, Kwok-Wo Wong:
Hopf bifurcation of a Two-Neuron Network with Different Discrete Time Delays. Int. J. Bifurc. Chaos 15(5): 1589-1601 (2005) - 2004
- [j11]Xiaofeng Liao, Kwok-Wo Wong, Shizhong Yang:
Stability Analysis for Delayed Cellular Neural Networks Based on Linear Matrix inequality Approach. Int. J. Bifurc. Chaos 14(9): 3377-3384 (2004) - [j10]Xiaofeng Liao, Chunguang Li, Kwok-Wo Wong:
Criteria for exponential stability of Cohen-Grossberg neural networks. Neural Networks 17(10): 1401-1414 (2004) - [j9]Xiaofeng Liao, Kwok-Wo Wong:
Robust stability of interval bidirectional associative memory neural network with time delays. IEEE Trans. Syst. Man Cybern. Part B 34(2): 1142-1154 (2004) - [i1]Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou, Yuanlong Cai:
Problems of Baptista's chaotic cryptosystems and countermeasures for enhancement of their overall performances. CoRR cs.CR/0402004 (2004) - 2003
- [j8]Xiaofeng Liao, Kwok-Wo Wong, Zhongfu Wu:
Stability of bifurcating periodic solutions for van der Pol equation with continuous distributed delay. Appl. Math. Comput. 146(2-3): 313-334 (2003) - [j7]Xiaofeng Liao, Kwok-Wo Wong, Zhongfu Wu:
Asymptotic stability criteria for a two-neuron network with different time delays. IEEE Trans. Neural Networks 14(1): 222-227 (2003) - 2002
- [c7]Kwok-Wo Wong, Chi-Sing Leung, Sheng-Jiang Chang:
Handwritten Digit Recognition Using Multi-Layer Feedforward Neural Networks with Periodic and Monotonic Activation Functions. ICPR (3) 2002: 106-109 - 2001
- [j6]Xiaofeng Liao, Kwok-Wo Wong, Juebang Yu:
Novel stability conditions for Cellular Neural Networks with Time Delay. Int. J. Bifurc. Chaos 11(7): 1853-1864 (2001) - [j5]Chi-Sing Leung, Kwok-Wo Wong, Pui-Fai Sum, Lai-Wan Chan:
A pruning method for the recursive least squared algorithm. Neural Networks 14(2): 147-174 (2001) - [c6]Lap-piu Lee, Kwok-Wo Wong:
An Elliptic Curve Random Number Generator. Communications and Multimedia Security 2001 - [c5]Wai-kit Wong, Lap-piu Lee, Kwok-Wo Wong:
A Modified Chaotic Cryptographic Method. Communications and Multimedia Security 2001 - 2000
- [j4]Sheng-Jiang Chang, Andrew Chi-Sing Leung, Kwok-Wo Wong, John Sum:
A Local Training and Pruning Approach for Neural Networks. Int. J. Neural Syst. 10(6): 425-438 (2000) - [j3]Arnold Shu-Yan Wong, Kwok-Wo Wong, Chi-Sing Wong:
A Practical Sequential Method for Principal Component Analysis. Neural Process. Lett. 11(2): 107-112 (2000) - [j2]Sheng-Jiang Chang, Kwok-Wo Wong, Andrew Chi-Sing Leung:
Combining DEKF algorithm and trace rule for fast on-line invariance extraction and recognition. Pattern Recognit. Lett. 21(6-7): 493-501 (2000)
1990 – 1999
- 1999
- [c4]Kwok-Wo Wong, Sheng-Jiang Chang, Chi-Sing Leung:
Handwritten digit recognition using trace neural network with EKF training algorithm. ICECS 1999: 295-298 - [c3]Arnold Shu-Yan Wong, Kwok-Wo Wong, Chi Sing Leung:
A unified sequential method for PCA. ICECS 1999: 583-586 - 1998
- [j1]Kwok-Wo Wong, Andrew Chi-Sing Leung:
On-line Successive Synthesis of Wavelet Networks. Neural Process. Lett. 7(2): 91-100 (1998) - [c2]Arnold Shu-Yan Wong, Kwok-Wo Wong, Chi-Sing Leung:
Using recursive least square learning method for principal and minor components analysis. ICASSP 1998: 1089-1092 - [c1]Arnold Shu-Yan Wong, Kwok-Wo Wong, Chi Sing Leung:
Combining PCA and MCA by using recursive least square learning method. ICECS 1998: 121-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint