


default search action
Yushu Zhang 0001
Person information
- affiliation: Nanjing University of Aeronautics and Astronautics, Nanjing, China
Other persons with the same name
- Yushu Zhang — disambiguation page
- Yushu Zhang 0002
— Chinese Academy of Sciences, Aerospace Information Research Institute and the Key Laboratory of Technology in Geo-Spatial Information Processing and Application System, Beijing, China
- Yushu Zhang 0003
— Tsinghua University, Department of Electronic Engineering, Beijing, China
- Yushu Zhang 0004
— Hangzhou Normal University, College of Hengyi Jing Education, Department of Psychology, Hangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j189]Ruoyu Zhao
, Moting Su
, Feng'en Li, Yongming Zhang
, Ye Zhu
, Yushu Zhang
:
Reversible image resolution degradation supporting privacy protection and usability management in the cloud for smart cities. Expert Syst. Appl. 265: 125851 (2025) - [j188]Xiaoting Zhang, Tao Wang, Junhao Ji, Yushu Zhang, Rushi Lan:
Privacy-preserving face attribute classification via differential privacy. Neurocomputing 626: 129556 (2025) - [j187]Yiyi Xie, Yuqian Zhou, Tao Wang, Zhongyun Hua, Wenying Wen, Shuang Yi, Yushu Zhang:
Controllable facial protection against malicious translation-based attribute editing. Knowl. Based Syst. 309: 112873 (2025) - [j186]Ruoyu Zhao
, Yushu Zhang
, Wenying Wen
, Xinpeng Zhang
, Xiaochun Cao
, Yong Xiang
:
PR3: Reversible and Usability-Enhanced Visual Privacy Protection via Thumbnail Preservation and Data Hiding. IEEE Trans. Big Data 11(1): 59-73 (2025) - [j185]Xiao Jiang
, Yiyuan Xie
, Yushu Zhang
, Yichen Ye, Fang Xu
, Lili Li, Ye Su, Zhuang Chen
:
Reversible Data Hiding in Encrypted Images Using Reservoir Computing-Based Data Fusion Strategy. IEEE Trans. Circuits Syst. Video Technol. 35(1): 684-697 (2025) - [j184]Kuiyuan Zhang
, Zhongyun Hua
, Yushu Zhang
, Yifang Guo, Tao Xiang
:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. IEEE Trans. Inf. Forensics Secur. 20: 871-885 (2025) - [i36]Lingxiao Yang, Xuewen Dong, Zhiguo Wan, Di Lu, Yushu Zhang, Yulong Shen:
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains. CoRR abs/2501.04265 (2025) - 2024
- [j183]Xiuli Chai
, Guoqiang Long
, Zhihua Gan, Yushu Zhang:
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images. Appl. Intell. 54(4): 3429-3447 (2024) - [j182]Mingfu Xue
, Shifeng Ni, Yinghao Wu, Yushu Zhang, Weiqiang Liu:
Imperceptible and multi-channel backdoor attack. Appl. Intell. 54(11-12): 1099-1116 (2024) - [j181]Xiuli Chai
, Zongwei Tang
, Zhihua Gan
, Yang Lu, Binjie Wang
, Yushu Zhang
:
SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things. Biomed. Signal Process. Control. 90: 105877 (2024) - [j180]Xiuli Chai, Gongyao Cao
, Zhifeng Fu, Zhihua Gan
, Binjie Wang
, Yushu Zhang:
High-capacity reversible data hiding in encrypted medical images using adaptive pixel-modulation and HBP-RMC. Biomed. Signal Process. Control. 95: 106424 (2024) - [j179]Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao, Wenying Wen:
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud. Cybersecur. 7(1): 22 (2024) - [j178]Mingfu Xue
, Jinlong Fu, Zhiyuan Li, Shifeng Ni
, Heyi Wu, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
A Reinforcement Learning-Based ELF Adversarial Malicious Sample Generation Method. IEEE J. Emerg. Sel. Topics Circuits Syst. 14(4): 743-757 (2024) - [j177]Ruoyu Zhao
, Yushu Zhang
, Shimin Li, Wenying Wen
, Shuang Yi, Rushi Lan
:
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system. Expert Syst. Appl. 238(Part E): 122140 (2024) - [j176]Wei Feng
, Jing Zhang
, Yao Chen
, Zhentao Qin
, Yushu Zhang
, Musheer Ahmad
, Marcin Wozniak
:
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 246: 123190 (2024) - [j175]Ming Li
, Qingchen Cui, Xi Wang, Yushu Zhang
, Yong Xiang:
FTPE-BC: Fast thumbnail-preserving image encryption using block-churning. Expert Syst. Appl. 255: 124574 (2024) - [j174]Xiao Jiang, Yiyuan Xie
, Yushu Zhang
, Thomas Aaron Gulliver, Yichen Ye, Fang Xu, Yandong Yang:
Reservoir computing based encryption-then-compression scheme of image achieving lossless compression. Expert Syst. Appl. 256: 124913 (2024) - [j173]Hong Liu
, Jian He, Zhu Xu, Yushu Zhang
, Zhiqiang Zhao:
Efficient and adaptive secure cross-domain recommendations. Expert Syst. Appl. 258: 125154 (2024) - [j172]Xingxin Li, Youwen Zhu, Rui Xu, Jian Wang, Yushu Zhang:
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query. Frontiers Comput. Sci. 18(1): 181803 (2024) - [j171]Yakun Ma
, Xiuli Chai
, Zhihua Gan
, Yushu Zhang
:
Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 11(3): 4842-4856 (2024) - [j170]Guiqiang Hu
, Hongwei Li
, Wenshu Fan
, Yushu Zhang
:
Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain. IEEE Internet Things J. 11(4): 7116-7127 (2024) - [j169]Dezhi An, Dawei Hao
, Jun Lu, Jun Mou, Ruoyu Zhao
, Yushu Zhang
:
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption. IEEE Internet Things J. 11(10): 17357-17371 (2024) - [j168]Zhen Chen
, Xiuli Chai
, Zhihua Gan
, Binjie Wang, Yushu Zhang
:
RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things. IEEE Internet Things J. 11(11): 20757-20768 (2024) - [j167]Jun Mou
, Zheyi Zhang, Santo Banerjee, Yushu Zhang
:
Combining Semi-Tensor Product Compressed Sensing and Session Keys for Low-Cost Encryption of Batch Information in WBANs. IEEE Internet Things J. 11(20): 33565-33576 (2024) - [j166]Xiuli Chai
, Gongyao Cao, Zhihua Gan
, Yushu Zhang
, Yakun Ma
, Xin He
:
TPE-AP: Thumbnail-Preserving Encryption Based on Adjustable Precision for JPEG Images. IEEE Internet Things J. 11(22): 37021-37031 (2024) - [j165]Jiahao Zhao, Yushu Zhang
, Jiajia Jiang
, Zhongyun Hua, Yong Xiang:
A secure dynamic cross-chain decentralized data consistency verification model. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101897 (2024) - [j164]Yiyi Xie, Yuqian Zhou, Tao Wang
, Wenying Wen, Shuang Yi, Yushu Zhang:
Reversible gender privacy enhancement via adversarial perturbations. Neural Networks 172: 106130 (2024) - [j163]Shuren Qi
, Yushu Zhang
, Chao Wang
, Tao Xiang
, Xiaochun Cao
, Yong Xiang
:
Representing Noisy Image Without Denoising. IEEE Trans. Pattern Anal. Mach. Intell. 46(10): 6713-6730 (2024) - [j162]Rui Yang
, Zhenrong Deng
, Yushu Zhang
, Xiaonan Luo
, Rushi Lan
:
4DPM: Deepfake Detection With a Denoising Diffusion Probabilistic Mask. IEEE Signal Process. Lett. 31: 914-918 (2024) - [j161]Wenying Wen
, Qiyu Jiang
, Haigang Huang
, Yushu Zhang
, Yuming Fang
:
TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion. IEEE Signal Process. Lett. 31: 1039-1043 (2024) - [j160]Xiangli Xiao
, Rushi Lan
, Shuang Yi
, Wenying Wen
, Yushu Zhang
:
Client-Side Watermarking for Images With Solid-Color Backgrounds. IEEE Signal Process. Lett. 31: 2045-2049 (2024) - [j159]Xu Xu
, Wenrui Lv
, Wei Wang
, Yushu Zhang
, Junxin Chen
:
Empowering Semantic Segmentation With Selective Frequency Enhancement and Attention Mechanism for Tampering Detection. IEEE Trans. Artif. Intell. 5(6): 3270-3283 (2024) - [j158]Mingfu Xue
, Xin Wang
, Yinghao Wu
, Shifeng Ni
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features. IEEE Trans. Artif. Intell. 5(9): 4649-4659 (2024) - [j157]Jun Mou
, Tao Ma, Santo Banerjee, Yushu Zhang
:
A Novel Memcapacitive-Synapse Neuron: Bionic Modeling, Complex Dynamics Analysis and Circuit Implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 71(4): 1771-1780 (2024) - [j156]Xiangli Xiao
, Yushu Zhang
, Leo Yu Zhang
, Zhongyun Hua
, Zhe Liu
, Jiwu Huang
:
FairCMS: Cloud Media Sharing With Fair Copyright Protection. IEEE Trans. Comput. Soc. Syst. 11(5): 6192-6209 (2024) - [j155]Zhongyun Hua
, Xingyu Liu
, Yifeng Zheng
, Shuang Yi
, Yushu Zhang
:
Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1799-1814 (2024) - [j154]Mengxin Gong
, Xiuli Chai
, Yang Lu, Yushu Zhang
:
Exploiting Four-Dimensional Chaotic Systems With Dissipation and Optimized Logical Operations for Secure Image Compression and Encryption. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7628-7642 (2024) - [j153]Chao Wang
, Shuren Qi
, Zhiqiu Huang
, Yushu Zhang
, Rushi Lan
, Xiaochun Cao
, Feng-Lei Fan:
Spatial-Frequency Discriminability for Revealing Adversarial Perturbations. IEEE Trans. Circuits Syst. Video Technol. 34(12): 12608-12623 (2024) - [j152]Ming Li
, Zhaohui Yang, Tao Wang
, Yushu Zhang
, Wenying Wen
:
Dual Protection for Image Privacy and Copyright via Traceable Adversarial Examples. IEEE Trans. Circuits Syst. Video Technol. 34(12): 13401-13412 (2024) - [j151]Xingce Liu, Jun Mou
, Yushu Zhang
, Yinghong Cao
:
A New Hyperchaotic Map Based on Discrete Memristor and Meminductor: Dynamics Analysis, Encryption Application, and DSP Implementation. IEEE Trans. Ind. Electron. 71(5): 5094-5104 (2024) - [j150]Youwen Zhu
, Yiran Cao, Qiao Xue
, Qihui Wu, Yushu Zhang
:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 19: 414-426 (2024) - [j149]Zhongyun Hua
, Yan Tong, Yifeng Zheng
, Yuhong Li
, Yushu Zhang
:
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark. IEEE Trans. Inf. Forensics Secur. 19: 3644-3658 (2024) - [j148]Lin Yuan
, Wu Chen
, Xiao Pu
, Yan Zhang
, Hongbo Li, Yushu Zhang
, Xinbo Gao
, Touradj Ebrahimi
:
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature Compensation. IEEE Trans. Inf. Forensics Secur. 19: 4930-4944 (2024) - [j147]Yushu Zhang
, Junhao Ji
, Wenying Wen
, Youwen Zhu
, Zhihua Xia
, Jian Weng
:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. IEEE Trans. Inf. Forensics Secur. 19: 5046-5059 (2024) - [j146]Xiangli Xiao
, Yushu Zhang
, Zhongyun Hua
, Zhihua Xia
, Jian Weng
:
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking. IEEE Trans. Inf. Forensics Secur. 19: 5357-5372 (2024) - [j145]Lvjun Chen
, Di Xiao
, Xiangli Xiao
, Yushu Zhang
:
Secure and Efficient Federated Learning via Novel Authenticable Multi-Party Computation and Compressed Sensing. IEEE Trans. Inf. Forensics Secur. 19: 10141-10156 (2024) - [j144]Yuwen Sha, Jun Mou
, Santo Banerjee, Yushu Zhang
:
Exploiting Flexible and Secure Cryptographic Technique for Multidimensional Image Based on Graph Data Structure and Three-Input Majority Gate. IEEE Trans. Ind. Informatics 20(3): 3835-3846 (2024) - [j143]Mingfu Xue
, Yinghao Wu
, Shifeng Ni
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger. IEEE Trans. Ind. Informatics 20(3): 5004-5013 (2024) - [j142]Yongming Zhang
, Ruoyu Zhao
, Yushu Zhang
, Shuang Yi
, Rushi Lan
:
Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and Permutation. IEEE Trans. Ind. Informatics 20(8): 10576-10586 (2024) - [j141]Chengrui Zhang, Junxin Chen
, Dongming Chen
, Wei Wang
, Yushu Zhang
, Yicong Zhou
:
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics. IEEE Trans. Multim. 26: 1114-1128 (2024) - [j140]Wenying Wen
, Ziye Yuan
, Shuren Qi
, Yushu Zhang
, Yuming Fang
:
PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine. IEEE Trans. Multim. 26: 5795-5806 (2024) - [j139]Xiuli Chai
, Yakun Ma
, Yinjing Wang
, Zhihua Gan
, Yushu Zhang
:
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images. IEEE Trans. Multim. 26: 6102-6116 (2024) - [j138]Yushu Zhang
, Zhibin Fu, Shuren Qi
, Mingfu Xue
, Xiaochun Cao
, Yong Xiang
:
PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13874-13886 (2024) - [j137]Wenying Wen
, Haigang Huang
, Shuren Qi
, Yushu Zhang
, Yuming Fang
:
Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages. IEEE Trans. Netw. Sci. Eng. 11(3): 2951-2962 (2024) - [j136]Wenying Wen
, Minghui Huang
, Yushu Zhang
, Yuming Fang
, Yifan Zuo
:
Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 25:1-25:15 (2024) - [j135]Xingyu Liu
, Zhongyun Hua
, Shuang Yi
, Yushu Zhang
, Yicong Zhou
:
Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images. ACM Trans. Multim. Comput. Commun. Appl. 20(5): 149:1-149:23 (2024) - [j134]Mingfu Xue
, Yinghao Wu
, Leo Yu Zhang
, Dujuan Gu
, Yushu Zhang
, Weiqiang Liu
:
SSAT: Active Authorization Control and User's Fingerprint Tracking Framework for DNN IP Protection. ACM Trans. Multim. Comput. Commun. Appl. 20(10): 324:1-324:24 (2024) - [j133]Ruoyu Zhao
, Yushu Zhang
, Wenying Wen
, Rushi Lan
, Yong Xiang
:
E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks. ACM Trans. Sens. Networks 20(4): 88:1-88:26 (2024) - [j132]Zhongyun Hua
, Yufei Yao
, Mingyang Song
, Yifeng Zheng
, Yushu Zhang
, Cong Wang
:
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service. IEEE Trans. Serv. Comput. 17(3): 821-835 (2024) - [j131]Md. Palash Uddin
, Yong Xiang
, Yao Zhao
, Mumtaz Ali
, Yushu Zhang
, Longxiang Gao
:
Adaptive Regularization and Resilient Estimation in Federated Learning. IEEE Trans. Serv. Comput. 17(4): 1369-1381 (2024) - [j130]Kuiyuan Zhang
, Zhongyun Hua
, Yuanman Li
, Yushu Zhang
, Yicong Zhou
:
Uformer-ICS: A U-Shaped Transformer for Image Compressive Sensing Service. IEEE Trans. Serv. Comput. 17(5): 2974-2988 (2024) - [j129]Yushu Zhang
, Jiahao Zhu
, Mingfu Xue
, Xinpeng Zhang
, Xiaochun Cao
:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. IEEE Trans. Vis. Comput. Graph. 30(8): 5299-5312 (2024) - [c15]Qiuyu Duan, Zhongyun Hua, Qing Liao, Yushu Zhang, Leo Yu Zhang:
Conditional Backdoor Attack via JPEG Compression. AAAI 2024: 19823-19831 - [c14]Yifan Shang
, Mingfu Xue
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection. ACM TUR-C 2024 - [c13]Linji Zhang
, Mingfu Xue
, Leo Yu Zhang
, Yushu Zhang
, Weiqiang Liu
:
An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks. ACM TUR-C 2024 - [c12]Zixuan Yang
, Yushu Zhang
, Tao Wang
, Zhongyun Hua
, Zhihua Xia
, Jian Weng
:
Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils. ACM Multimedia 2024: 7705-7713 - [c11]Yuhang Zhou
, Yushu Zhang
, Leo Yu Zhang
, Zhongyun Hua
:
DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group. ACM Multimedia 2024: 10055-10064 - [c10]Tao Wang
, Yushu Zhang
, Xiangli Xiao
, Lin Yuan
, Zhihua Xia
, Jian Weng
:
Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition. ACM Multimedia 2024: 10268-10276 - [i35]Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Jian Weng, Xiaochun Cao:
Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales. CoRR abs/2402.15430 (2024) - [i34]Jiajia Jiang, Moting Su, Xiangli Xiao, Yushu Zhang, Yuming Fang:
AIGC-Chain: A Blockchain-Enabled Full Lifecycle Recording System for AIGC Product Copyright Management. CoRR abs/2406.14966 (2024) - [i33]Kuiyuan Zhang, Zhongyun Hua, Yushu Zhang, Yifang Guo, Tao Xiang:
Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation. CoRR abs/2411.09167 (2024) - [i32]Kuiyuan Zhang, Zhongyun Hua, Rushi Lan, Yushu Zhang, Yifang Guo:
Phoneme-Level Feature Discrepancies: A Key to Detecting Sophisticated Speech Deepfakes. CoRR abs/2412.12619 (2024) - [i31]Wenying Wen, Ziye Yuan, Yushu Zhang, Tao Wang, Xiangli Xiao, Ruoyu Zhao, Yuming Fang:
Image Privacy Protection: A Survey. CoRR abs/2412.15228 (2024) - 2023
- [j128]Yinjing Wang, Xiuli Chai, Zhihua Gan
, Yushu Zhang, Xiuhui Chen, Xin He:
TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding. Appl. Intell. 53(4): 4027-4046 (2023) - [j127]Mingfu Xue
, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples. Appl. Intell. 53(6): 7298-7309 (2023) - [j126]Mingfu Xue
, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-resistant backdoor attack against deep neural networks. Appl. Intell. 53(17): 20402-20417 (2023) - [j125]Miao Tian
, Yushu Zhang, Youwen Zhu, Liangmin Wang, Yong Xiang:
DIVRS: Data integrity verification based on ring signature in cloud storage. Comput. Secur. 124: 103002 (2023) - [j124]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. ACM Comput. Surv. 55(2): 1:1-1:35 (2023) - [j123]Tao Wang
, Yushu Zhang, Ruoyu Zhao:
Face Database Protection via Beautification with Chaotic Systems. Entropy 25(4): 566 (2023) - [j122]Moting Su
, Wenjie Zhao
, Ye Zhu
, Donglan Zha
, Yushu Zhang
, Peng Xu
:
Anomaly detection of vectorized time series on aircraft battery data. Expert Syst. Appl. 227: 120219 (2023) - [j121]Xiangli Xiao
, Xiaotong He, Yushu Zhang
, Xuewen Dong, Lu-Xing Yang
, Yong Xiang:
Blockchain-based reliable image copyright protection. IET Blockchain 3(4): 222-237 (2023) - [j120]Mingfu Xue
, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - [j119]Ruoyu Zhao
, Yushu Zhang
, Rushi Lan
, Zhongyun Hua
, Yong Xiang
:
Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT. IEEE Internet Things J. 10(3): 2630-2645 (2023) - [j118]Xiuli Chai
, Jiangyu Fu
, Zhihua Gan
, Yang Lu, Yushu Zhang
, Daojun Han:
Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission. IEEE Internet Things J. 10(8, April 15): 7380-7392 (2023) - [j117]Wei Tong
, Xuewen Dong
, Yushu Zhang
, Zongyang Zhang
, Lingxiao Yang, Weidong Yang
, Yulong Shen
:
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive. IEEE Internet Things J. 10(24): 21528-21543 (2023) - [j116]Mingfu Xue
, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu
:
Detecting backdoor in deep neural networks via intentional adversarial perturbations. Inf. Sci. 634: 564-577 (2023) - [j115]Miao Tian, Yushu Zhang, Youwen Zhu, Wei Wang, Qihui Wu, Yong Xiang:
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds. J. King Saud Univ. Comput. Inf. Sci. 35(1): 324-334 (2023) - [j114]Xiuli Chai
, Xiuhui Chen, Yakun Ma, Fang Zuo
, Zhihua Gan
, Yushu Zhang:
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion. Frontiers Inf. Technol. Electron. Eng. 24(8): 1169-1180 (2023) - [j113]Wenying Wen, Yunpeng Jian, Yuming Fang, Yushu Zhang, Baolin Qiu:
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework. Multim. Syst. 29(2): 831-845 (2023) - [j112]Wenying Wen, Rongxin Tu, Yushu Zhang, Yuming Fang, Yong Yang:
A multi-level approach with visual information for encrypted H.265/HEVC videos. Multim. Syst. 29(3): 1073-1087 (2023) - [j111]Shuren Qi
, Yushu Zhang
, Chao Wang
, Jiantao Zhou
, Xiaochun Cao
:
A Principled Design of Image Representation: Towards Forensic Tasks. IEEE Trans. Pattern Anal. Mach. Intell. 45(5): 5337-5354 (2023) - [j110]Tao Wang
, Yushu Zhang
, Ruoyu Zhao
, Wenying Wen
, Rushi Lan
:
Identifiable Face Privacy Protection via Virtual Identity Transformation. IEEE Signal Process. Lett. 30: 773-777 (2023) - [j109]Xi Ye
, Yushu Zhang
, Xiangli Xiao
, Shuang Yi
, Rushi Lan
:
Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images. IEEE Signal Process. Lett. 30: 793-797 (2023) - [j108]Wentao Zhou
, Yushu Zhang
, Ruoyu Zhao
, Shuang Yi
, Rushi Lan
:
Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN. IEEE Signal Process. Lett. 30: 1147-1151 (2023) - [j107]Yushu Zhang
, Jiahao Zhao
, Jiajia Jiang
, Youwen Zhu
, Liangmin Wang
, Yong Xiang
:
Recording Behaviors of Artificial Intelligence in Blockchains. IEEE Trans. Artif. Intell. 4(6): 1437-1448 (2023) - [j106]Juan Zhao
, Tianrui Zong, Yong Xiang
, Longxiang Gao
, Guang Hua
, Keshav Sood
, Yushu Zhang
:
SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals. IEEE ACM Trans. Audio Speech Lang. Process. 31: 448-461 (2023) - [j105]Yushu Zhang
, Zhibin Fu, Shuren Qi
, Mingfu Xue
, Zhongyun Hua
, Yong Xiang
:
Localization of Inpainting Forgery With Feature Enhancement Network. IEEE Trans. Big Data 9(3): 936-948 (2023) - [j104]Hong Liu
, Xiaojing Lu, Shengchen Duan, Yushu Zhang
, Yong Xiang
:
An Efficient Oblivious Random Data Access Scheme in Cloud Computing. IEEE Trans. Cloud Comput. 11(2): 1940-1953 (2023) - [j103]Yushu Zhang
, Jiajia Jiang
, Xuewen Dong
, Liangmin Wang
, Yong Xiang
:
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation. IEEE Trans. Cloud Comput. 11(3): 2273-2284 (2023) - [j102]Xuewen Dong
, Lingtao Xue
, Zhiwei Zhang
, Yushu Zhang
, Teng Li
, Zhichao You
, Yulong Shen
:
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control. IEEE Trans. Cloud Comput. 11(3): 3139-3152 (2023) - [j101]Wenying Wen
, Jiacong Fan, Yushu Zhang
, Yuming Fang:
APCAS: Autonomous Privacy Control and Authentication Sharing in Social Networks. IEEE Trans. Comput. Soc. Syst. 10(6): 3169-3180 (2023) - [j100]Xinyu Gao, Jun Mou
, Santo Banerjee, Yushu Zhang
:
Color-Gray Multi-Image Hybrid Compression-Encryption Scheme Based on BP Neural Network and Knight Tour. IEEE Trans. Cybern. 53(8): 5037-5047 (2023) - [j99]Mingfu Xue
, Chengxiang Yuan, Can He
, Yinghao Wu, Zhiyu Wu, Yushu Zhang
, Zhe Liu
, Weiqiang Liu
:
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks. IEEE Trans. Emerg. Top. Comput. 11(1): 153-169 (2023) - [j98]Mingfu Xue
, Zhiyu Wu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - [j97]Chao Wang
, Zhiqiu Huang
, Shuren Qi
, Yaoshen Yu
, Guohua Shen
, Yushu Zhang
:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. IEEE Trans. Inf. Forensics Secur. 18: 1064-1079 (2023) - [j96]Yushu Zhang
, Tao Wang
, Ruoyu Zhao
, Wenying Wen
, Youwen Zhu
:
RAPP: Reversible Privacy Preservation for Various Face Attributes. IEEE Trans. Inf. Forensics Secur. 18: 3074-3087 (2023) - [j95]Yushu Zhang
, Xi Ye
, Xiangli Xiao
, Tao Xiang
, Hongwei Li
, Xiaochun Cao
:
A Reversible Framework for Efficient and Secure Visual Privacy Protection. IEEE Trans. Inf. Forensics Secur. 18: 3334-3349 (2023) - [j94]Yushu Zhang
, Wentao Zhou, Ruoyu Zhao
, Xinpeng Zhang
, Xiaochun Cao:
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption. IEEE Trans. Multim. 25: 5877-5891 (2023) - [j93]Xiangli Xiao
, Yushu Zhang
, Youwen Zhu
, Pengfei Hu
, Xiaochun Cao
:
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain. IEEE Trans. Netw. Serv. Manag. 20(3): 2869-2885 (2023) - [j92]Yushu Zhang
, Qing Tan
, Shuren Qi
, Mingfu Xue
:
PRNU-based Image Forgery Localization with Deep Multi-scale Fusion. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 67:1-67:20 (2023) - [j91]Yushu Zhang
, Nuo Chen
, Shuren Qi
, Mingfu Xue
, Zhongyun Hua
:
Detection of Recolored Image by Texture Features in Chrominance Components. ACM Trans. Multim. Comput. Commun. Appl. 19(3): 121:1-121:23 (2023) - [j90]Xiangli Xiao
, Yushu Zhang
, Xuewen Dong
, Liangmin Wang
, Yong Xiang
, Xiaochun Cao:
Fair Outsourcing Paid in Fiat Money Using Blockchain. IEEE Trans. Serv. Comput. 16(3): 1860-1873 (2023) - [j89]Yao Zhao
, Youyang Qu
, Yong Xiang
, Yushu Zhang
, Longxiang Gao
:
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT. IEEE Trans. Serv. Comput. 16(4): 2343-2358 (2023) - [c9]Zeming Hou, Zhongyun Hua, Kuiyuan Zhang
, Yushu Zhang:
CDNet: Cluster Decision for Deepfake Detection Generalization. ICIP 2023: 3010-3014 - [c8]Xiuli Chai, Zhen Chen, Zhihua Gan, Yushu Zhang, Yong Tan:
RAE-TPE: A Reversible Adversarial Example Generation Method Based on Thumbnail Preserving Encryption. ICSPCC 2023: 1-6 - [i30]Shuren Qi, Yushu Zhang, Chao Wang, Tao Xiang, Xiaochun Cao, Yong Xiang:
Representing Noisy Image Without Denoising. CoRR abs/2301.07409 (2023) - [i29]Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao:
Visual Content Privacy Protection: A Survey. CoRR abs/2303.16552 (2023) - [i28]Chao Wang, Shuren Qi, Zhiqiu Huang, Yushu Zhang, Xiaochun Cao:
Towards an Accurate and Secure Detector against Adversarial Perturbations. CoRR abs/2305.10856 (2023) - [i27]Tao Wang, Yushu Zhang, Zixuan Yang, Hua Zhang, Zhongyun Hua:
Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection. CoRR abs/2307.00481 (2023) - [i26]Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng
:
Security and Privacy on Generative Data in AIGC: A Survey. CoRR abs/2309.09435 (2023) - [i25]Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models. CoRR abs/2310.09822 (2023) - 2022
- [j88]Mingfu Xue
, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication. Appl. Intell. 52(14): 16497-16511 (2022) - [j87]Mingfu Xue
, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. Comput. Secur. 118: 102726 (2022) - [j86]Dan Wang, Ming Li, Yushu Zhang:
Adversarial Data Hiding in Digital Images. Entropy 24(6): 749 (2022) - [j85]Xiuli Chai
, Yinjing Wang, Zhihua Gan, Xiuhui Chen, Yushu Zhang:
Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud. Inf. Sci. 604: 115-141 (2022) - [j84]Hong Liu, Yushu Zhang, Yong Xiang, Bo Liu, ErChuan Guo:
Multi-user image retrieval with suppression of search pattern leakage. Inf. Sci. 607: 1041-1060 (2022) - [j83]Ruoyu Zhao, Yushu Zhang, Yu Nan, Wenying Wen, Xiuli Chai, Rushi Lan:
Primitively visually meaningful image encryption: A new paradigm. Inf. Sci. 613: 628-648 (2022) - [j82]Ye Zhu, Ruoyu Zhao, Yushu Zhang, Xiangli Xiao, Rushi Lan, Yong Xiang:
Noise-free thumbnail-preserving image encryption based on MSB prediction. Inf. Sci. 617: 395-415 (2022) - [j81]Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Rushi Lan, Xiuli Chai:
High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2993-3010 (2022) - [j80]Jiajia Jiang
, Yushu Zhang, Youwen Zhu, Xuewen Dong, Liangmin Wang, Yong Xiang:
DCIV: Decentralized cross-chain data integrity verification with blockchain. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 7988-7999 (2022) - [j79]Xi Ye
, Yushu Zhang, Ruoyu Zhao
, Rushi Lan, Yong Xiang
:
PRA-TPE: Perfectly Recoverable Approximate Thumbnail-Preserving Image Encryption. J. Vis. Commun. Image Represent. 87: 103589 (2022) - [j78]Xiuli Chai
, Yinjing Wang
, Xiuhui Chen, Zhihua Gan
, Yushu Zhang
:
TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key. IEEE Signal Process. Lett. 29: 972-976 (2022) - [j77]Mingfu Xue
, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations. IEEE Trans. Artif. Intell. 3(6): 908-923 (2022) - [j76]Yushu Zhang
, Ruoyu Zhao, Xiangli Xiao
, Rushi Lan
, Zhe Liu
, Xinpeng Zhang
:
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption. IEEE Trans. Circuits Syst. Video Technol. 32(3): 947-961 (2022) - [j75]Xuewen Dong
, Wen Zhang
, Yushu Zhang
, Zhichao You
, Sheng Gao
, Yulong Shen
, Chao Wang:
Optimizing Task Location Privacy in Mobile Crowdsensing Systems. IEEE Trans. Ind. Informatics 18(4): 2762-2772 (2022) - [j74]Mohammad Belayet Hossain
, Iynkaran Natgunanathan
, Yong Xiang
, Yushu Zhang
:
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices. IEEE Trans. Serv. Comput. 15(5): 2648-2657 (2022) - [c7]Yinghao Wu, Mingfu Xue, Dujuan Gu, Yushu Zhang, Weiqiang Liu:
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks. AICAS 2022: 316-319 - [c6]Qing Tan, Shuren Qi, Yushu Zhang, Mingfu Xue:
PRNU-based Image Forgery Localization With Convolutional Neural Network. MMSP 2022: 1-6 - [i24]Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-Resistant Backdoor Attack against Deep Neural Networks. CoRR abs/2201.00672 (2022) - [i23]Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks. CoRR abs/2201.13164 (2022) - [i22]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Principled Design of Image Representation: Towards Forensic Tasks. CoRR abs/2203.00913 (2022) - [i21]Ruoyu Zhao, Yushu Zhang, Youwen Zhu, Rushi Lan, Zhongyun Hua:
Metaverse: Security and Privacy Concerns. CoRR abs/2203.03854 (2022) - [i20]Yushu Zhang, Nuo Chen, Shuren Qi, Mingfu Xue, Xiaochun Cao:
Detecting Recolored Image by Spatial Correlation. CoRR abs/2204.10973 (2022) - [i19]Kuiyuan Zhang, Zhongyun Hua, Yuanman Li, Yushu Zhang, Yicong Zhou:
Uformer-ICS: A Specialized U-Shaped Transformer for Image Compressive Sensing. CoRR abs/2209.01763 (2022) - [i18]Yushu Zhang, Jiahao Zhu, Mingfu Xue, Xinpeng Zhang, Xiaochun Cao:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. CoRR abs/2209.08884 (2022) - [i17]Mingfu Xue, Xin Wang, Yinghao Wu, Shifeng Ni, Yushu Zhang, Weiqiang Liu:
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features. CoRR abs/2210.07481 (2022) - 2021
- [j73]Akanksha Saini
, Qingyi Zhu
, Navneet Singh
, Yong Xiang
, Longxiang Gao
, Yushu Zhang
:
A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System. IEEE Internet Things J. 8(7): 5914-5925 (2021) - [j72]Xiuli Chai, Haiyang Wu, Zhihua Gan, Daojun Han, Yushu Zhang, Yiran Chen:
An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf. Sci. 556: 305-340 (2021) - [j71]Ye Tian, Xiuli Chai, Zhihua Gan, Yang Lu, Yushu Zhang, Shiping Song:
SWDGAN: GAN-based sampling and whole image denoising network for compressed sensing image reconstruction. J. Electronic Imaging 30(6) (2021) - [j70]Ming Li
, Hua Ren, Yong Xiang
, Yushu Zhang:
Reversible data hiding in encrypted color images using cross-channel correlations. J. Vis. Commun. Image Represent. 78: 103166 (2021) - [j69]Wenjie Zhao
, Yushu Zhang
, Ye Zhu
, Peng Xu
:
Anomaly detection of aircraft lead-acid battery. Qual. Reliab. Eng. Int. 37(3): 1186-1197 (2021) - [j68]Ruoyu Zhao
, Yushu Zhang, Xiangli Xiao
, Xi Ye, Rushi Lan:
TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption. Signal Process. 183: 108019 (2021) - [j67]Xiuli Chai
, Xiangcheng Zhi, Zhihua Gan
, Yushu Zhang, Yiran Chen, Jiangyu Fu:
Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. 183: 108041 (2021) - [j66]Jiahao Zhu, Yushu Zhang
, Xinpeng Zhang
, Xiaochun Cao:
Gaussian Model for 3D Mesh Steganography. IEEE Signal Process. Lett. 28: 1729-1733 (2021) - [j65]Yushu Zhang
, Jiantao Zhou
, Yong Xiang
, Leo Yu Zhang
, Fei Chen
, Shaoning Pang
, Xiaofeng Liao
:
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds. IEEE Trans. Big Data 7(4): 717-728 (2021) - [j64]Wenying Wen
, Kangkang Wei, Yuming Fang, Yushu Zhang
:
Visual Quality Assessment for Perceptually Encrypted Light Field Images. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2522-2534 (2021) - [j63]Yushu Zhang
, Ping Wang
, Hui Huang
, Youwen Zhu
, Di Xiao
, Yong Xiang
:
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Trans. Ind. Informatics 17(5): 3401-3411 (2021) - [j62]Lu-Xing Yang
, Kaifan Huang
, Xiaofan Yang
, Yushu Zhang
, Yong Xiang
, Yuan Yan Tang:
Defense Against Advanced Persistent Threat Through Data Backup and Recovery. IEEE Trans. Netw. Sci. Eng. 8(3): 2001-2013 (2021) - [j61]Wei Wang
, Junyang Chen, Yushu Zhang, Zhiguo Gong, Neeraj Kumar
, Wei Wei:
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction. ACM Trans. Internet Techn. 21(4): 106:1-106:13 (2021) - [c5]Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. ISC 2021: 341-357 - [i16]Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples. CoRR abs/2103.01527 (2021) - [i15]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. CoRR abs/2103.14799 (2021) - [i14]Yushu Zhang, Xiangli Xiao
, Leo Yu Zhang
, Zhe Liu, Jiwu Huang:
CREAMS: Copyrighted Cloud Media Sharing. CoRR abs/2105.08899 (2021) - [i13]Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. CoRR abs/2105.13697 (2021) - [i12]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. CoRR abs/2105.14259 (2021) - [i11]Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and remove watermark in deep neural networks via generative adversarial networks. CoRR abs/2106.08104 (2021) - [i10]Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Protect the Intellectual Property of Dataset against Unauthorized Use. CoRR abs/2109.07921 (2021) - 2020
- [j60]Mingfu Xue
, Chengxiang Yuan, Heyi Wu, Yushu Zhang, Weiqiang Liu
:
Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access 8: 74720-74742 (2020) - [j59]Feiyi Xu, Chi-Man Pun
, Haolun Li, Yushu Zhang, Yurong Song, Hao Gao
:
Training Feed-Forward Artificial Neural Networks with a modified artificial bee colony algorithm. Neurocomputing 416: 69-84 (2020) - [j58]Yushu Zhang, Jin Jiang
, Yong Xiang
, Ye Zhu
, Liangtian Wan, Xiyuan Xie:
Cloud-assisted privacy-conscious large-scale Markowitz portfolio. Inf. Sci. 527: 548-559 (2020) - [j57]Xiuli Chai, Xianglong Fu, Zhihua Gan, Yushu Zhang, Yang Lu
, Yiran Chen:
An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput. Appl. 32(9): 4961-4988 (2020) - [j56]Zhihua Gan, Xiuli Chai
, Jitong Zhang, Yushu Zhang, Yiran Chen:
An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL). Neural Comput. Appl. 32(17): 14113-14141 (2020) - [j55]Xiuli Chai
, Haiyang Wu, Zhihua Gan
, Yushu Zhang, Yiran Chen:
Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process. 171: 107525 (2020) - [j54]Xiuli Chai, Jianqiang Bi, Zhihua Gan
, Xianxing Liu, Yushu Zhang, Yiran Chen:
Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 176: 107684 (2020) - [j53]Yushu Zhang
, Xiangli Xiao
, Lu-Xing Yang
, Yong Xiang
, Sheng Zhong:
Secure and Efficient Outsourcing of PCA-Based Face Recognition. IEEE Trans. Inf. Forensics Secur. 15: 1683-1695 (2020) - [j52]Yushu Zhang
, Ping Wang
, Liming Fang
, Xing He
, Hao Han, Bing Chen
:
Secure Transmission of Compressed Sampling Data Using Edge Clouds. IEEE Trans. Ind. Informatics 16(10): 6641-6651 (2020) - [j51]Yushu Zhang
, Qi He, Guo Chen
, Xinpeng Zhang
, Yong Xiang
:
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT. IEEE Trans. Ind. Informatics 16(12): 7566-7578 (2020) - [i9]Wenying Wen, Rongxin Tu, Yushu Zhang, Yuming Fang, Yong Yang:
A multi-level approach with visual information for encrypted H.265/HEVC videos. CoRR abs/2011.02620 (2020) - [i8]Mingfu Xue, Chengxiang Yuan, Can He, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. CoRR abs/2011.13696 (2020)
2010 – 2019
- 2019
- [j50]Xiangli Xiao
, Junjian Huang
, Yushu Zhang, Xing He:
Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution. IEEE Access 7: 60126-60133 (2019) - [j49]Ming Li
, Lanlan Wang, Jingjing Fan, Yushu Zhang
, Kanglei Zhou, Haiju Fan:
Fidelity Preserved Data Hiding in Encrypted Highly Autocorrelated Data Based on Homomorphism and Compressive Sensing. IEEE Access 7: 69808-69825 (2019) - [j48]Chiranjibi Sitaula
, Yong Xiang, Yushu Zhang, Xuequan Lu
, Sunil Aryal
:
Indoor Image Representation by High-Level Semantic Features. IEEE Access 7: 84967-84979 (2019) - [j47]Ping Wang
, Xing He, Yushu Zhang, Wenying Wen, Ming Li:
A robust and secure image sharing scheme with personal identity information embedded. Comput. Secur. 85: 107-121 (2019) - [j46]Yushu Zhang
, Yong Xiang
, Leo Yu Zhang
, Yue Rong
, Song Guo
:
Secure Wireless Communications Based on Compressive Sensing: A Survey. IEEE Commun. Surv. Tutorials 21(2): 1093-1111 (2019) - [j45]Yushu Zhang, Yong Xiang
, Leo Yu Zhang
, Lu-Xing Yang
, Jiantao Zhou:
Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496: 150-160 (2019) - [j44]Ming Li, Di Xiao, Ye Zhu
, Yushu Zhang, Lin Sun:
Commutative fragile zero-watermarking and encryption for image integrity protection. Multim. Tools Appl. 78(16): 22727-22742 (2019) - [j43]Xiuli Chai, Jitong Zhang, Zhihua Gan
, Yushu Zhang:
Medical image encryption algorithm based on Latin square and memristive chaotic system. Multim. Tools Appl. 78(24): 35419-35453 (2019) - [j42]Yushu Zhang, Hui Huang, Lu-Xing Yang
, Yong Xiang, Ming Li:
Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence. IEEE Netw. 33(5): 41-45 (2019) - [j41]Lu-Xing Yang
, Pengdeng Li, Yushu Zhang
, Xiaofan Yang
, Yong Xiang
, Wanlei Zhou
:
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach. IEEE Trans. Inf. Forensics Secur. 14(7): 1713-1728 (2019) - [j40]Jia Wang
, Leo Yu Zhang
, Junxin Chen
, Guang Hua
, Yushu Zhang
, Yong Xiang
:
Compressed Sensing Based Selective Encryption With Data Hiding Capability. IEEE Trans. Ind. Informatics 15(12): 6560-6571 (2019) - [j39]Xing He
, Tingwen Huang
, Junzhi Yu
, Chaojie Li
, Yushu Zhang
:
A Continuous-Time Algorithm for Distributed Optimization Based on Multiagent Networks. IEEE Trans. Syst. Man Cybern. Syst. 49(12): 2700-2709 (2019) - [i7]Chiranjibi Sitaula, Yong Xiang, Yushu Zhang, Xuequan Lu, Sunil Aryal:
Indoor image representation by high-level semantic features. CoRR abs/1906.04987 (2019) - 2018
- [j38]Abid Mehmood
, Iynkaran Natgunanathan, Yong Xiang
, Howard Poston, Yushu Zhang:
Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications. IEEE Access 6: 33552-33567 (2018) - [j37]Ming Li, Dandan Lu, Wenying Wen, Hua Ren, Yushu Zhang
:
Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata. IEEE Access 6: 47102-47111 (2018) - [j36]Ming Li, Haiju Fan, Yong Xiang, Yang Li, Yushu Zhang:
Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System. IEEE Multim. 25(3): 92-101 (2018) - [j35]Yushu Zhang
, Qi He, Yong Xiang
, Leo Yu Zhang
, Bo Liu
, Junxin Chen
, Yiyuan Xie
:
Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things. IEEE Internet Things J. 5(5): 3442-3451 (2018) - [j34]Leo Yu Zhang
, Yuansheng Liu, Cong Wang, Jiantao Zhou, Yushu Zhang, Guanrong Chen:
Improved known-plaintext attack to permutation-only multimedia ciphers. Inf. Sci. 430: 228-239 (2018) - [j33]Di Zhang, Xiaofeng Liao, Bo Yang, Yushu Zhang:
A fast and efficient approach to color-image encryption based on compressive sensing and fractional Fourier transform. Multim. Tools Appl. 77(2): 2191-2208 (2018) - [j32]Fang Han, Xiaofeng Liao, Bo Yang, Yushu Zhang:
A hybrid scheme for self-adaptive double color-image encryption. Multim. Tools Appl. 77(11): 14285-14304 (2018) - [j31]Wenying Wen, Yushu Zhang, Yuming Fang, Zhijun Fang:
Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput. Appl. 29(3): 653-663 (2018) - [j30]Junxin Chen
, Leo Yu Zhang
, Yushu Zhang, Fabio Pareschi
, Yu-Dong Yao:
Exploiting the Security Aspects of Compressive Sampling. Secur. Commun. Networks 2018: 4740174:1 (2018) - [j29]Junxin Chen
, Zhiliang Zhu, Li-bo Zhang
, Yushu Zhang, Benqiang Yang
:
Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 142: 340-353 (2018) - [j28]Hui Huang, Xing He, Yong Xiang, Wenying Wen, Yushu Zhang:
A compression-diffusion-permutation strategy for securing image. Signal Process. 150: 183-190 (2018) - [j27]Licheng Liu
, C. L. Philip Chen
, Xinge You, Yuan Yan Tang, Yushu Zhang
, Shutao Li:
Mixed Noise Removal via Robust Constrained Sparse Representation. IEEE Trans. Circuits Syst. Video Technol. 28(9): 2177-2189 (2018) - [j26]Leo Yu Zhang
, Yuansheng Liu, Fabio Pareschi, Yushu Zhang, Kwok-Wo Wong, Riccardo Rovatti, Gianluca Setti
:
On the Security of a Class of Diffusion Mechanisms for Image Encryption. IEEE Trans. Cybern. 48(4): 1163-1175 (2018) - 2017
- [j25]Leo Yu Zhang
, Yushu Zhang, Yuansheng Liu, Anjia Yang
, Guanrong Chen:
Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers. Int. J. Bifurc. Chaos 27(10): 1750155:1-1750155:13 (2017) - [j24]Yushu Zhang
, Hui Huang
, Yong Xiang
, Leo Yu Zhang
, Xing He:
Harnessing the Hybrid Cloud for Secure Big Image Data Service. IEEE Internet Things J. 4(5): 1380-1388 (2017) - [j23]Guiqiang Hu, Di Xiao, Tao Xiang, Sen Bai, Yushu Zhang:
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf. Sci. 387: 132-145 (2017) - [j22]Wenying Wen, Chuanjiang He
, Yushu Zhang, Zhijun Fang:
A novel method for image segmentation using reaction-diffusion model. Multidimens. Syst. Signal Process. 28(2): 657-677 (2017) - [j21]Yushu Zhang, Wenying Wen, Yongfei Wu, Rui Zhang, Junxin Chen
, Xing He:
Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral. Neural Comput. Appl. 28(1): 165-169 (2017) - [j20]Xiu-Li Chai, Zhihua Gan, Yiran Chen, Yushu Zhang:
A visually secure image encryption scheme based on compressive sensing. Signal Process. 134: 35-51 (2017) - [c4]Fang Han, Xiaofeng Liao, Huiwei Wang, Bo Yang, Yushu Zhang:
A self-adaptive scheme for double color-image encryption. ICACI 2017: 121-128 - 2016
- [j19]Yushu Zhang, Leo Yu Zhang
, Jiantao Zhou, Licheng Liu, Fei Chen
, Xing He:
A Review of Compressive Sensing in Information Security Field. IEEE Access 4: 2507-2519 (2016) - [j18]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang
, Di Xiao, Bin Chen, Xiaofeng Liao:
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions. Int. J. Bifurc. Chaos 26(11): 1650191:1-1650191:15 (2016) - [j17]Di Xiao, Qingqing Fu, Tao Xiang, Yushu Zhang:
Chaotic Image Encryption of Regions of Interest. Int. J. Bifurc. Chaos 26(11): 1650193:1-1650193:15 (2016) - [j16]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang
, Kwok-Wo Wong, Xing He, Di Xiao:
Embedding cryptographic features in compressive sensing. Neurocomputing 205: 472-480 (2016) - [j15]Hong Liu
, Di Xiao, Yunpeng Xiao
, Yushu Zhang:
Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multim. Tools Appl. 75(13): 7681-7696 (2016) - [j14]Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su:
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization. Secur. Commun. Networks 9(1): 43-53 (2016) - [j13]Hong Liu
, Di Xiao, Rui Zhang, Yushu Zhang, Sen Bai:
Robust and hierarchical watermarking of encrypted images based on Compressive Sensing. Signal Process. Image Commun. 45: 41-51 (2016) - [j12]Leo Yu Zhang
, Kwok-Wo Wong, Yushu Zhang, Jiantao Zhou:
Bi-level Protected Compressive Sampling. IEEE Trans. Multim. 18(9): 1720-1732 (2016) - [c3]Wenying Wen, Yushu Zhang, Yuming Fang, Zhijun Fang:
A novel selective image encryption method based on saliency detection. VCIP 2016: 1-4 - 2015
- [j11]Junxin Chen
, Zhiliang Zhu, Chong Fu, Li-bo Zhang, Yushu Zhang:
An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun. Nonlinear Sci. Numer. Simul. 23(Issues): 294-310 (2015) - [j10]Yushu Zhang, Di Xiao, Wenying Wen, Hai Nan, Moting Su:
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register. Commun. Nonlinear Sci. Numer. Simul. 27(Issues): 22-29 (2015) - [j9]Junxin Chen
, Zhiliang Zhu, Chong Fu, Hai Yu
, Yushu Zhang:
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process. 111: 294-307 (2015) - [j8]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang
, Wenying Wen, Jiantao Zhou, Xing He:
Robust coding of encrypted images via structural matrix. Signal Process. Image Commun. 39: 202-211 (2015) - [j7]Ming Li
, Di Xiao, Yushu Zhang, Hai Nan:
Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process. Image Commun. 39: 234-248 (2015) - [c2]Leo Yu Zhang
, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin
:
Joint quantization and diffusion for compressed sensing measurements of natural images. ISCAS 2015: 2744-2747 - [c1]Yushu Zhang, Jiantao Zhou, Leo Yu Zhang
, Fei Chen, Xinyu Lei:
Support-Set-Assured Parallel Outsourcing of Sparse Reconstruction Service for Compressive Sensing in Multi-clouds. SocialSec 2015: 1-6 - [i6]Yuansheng Liu, Leo Yu Zhang, Jia Wang, Yushu Zhang, Kwok-Wo Wong:
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure. CoRR abs/1503.06638 (2015) - [i5]Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong, Fabio Pareschi, Yushu Zhang, Riccardo Rovatti, Gianluca Setti:
On the security of a class of diffusion mechanisms for image encryption. CoRR abs/1512.09263 (2015) - 2014
- [j6]Yushu Zhang, Di Xiao:
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1): 74-82 (2014) - [j5]Yushu Zhang, Di Xiao, Hong Liu
, Hai Nan:
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption. Commun. Nonlinear Sci. Numer. Simul. 19(5): 1366-1374 (2014) - [j4]Yushu Zhang, Di Xiao, Wenying Wen, Kwok-Wo Wong:
On the security of symmetric ciphers based on DNA coding. Inf. Sci. 289: 254-261 (2014) - [j3]Yushu Zhang, Di Xiao, Wenying Wen, Ming Li
:
Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multim. Tools Appl. 73(3): 1885-1896 (2014) - [j2]Ming Li
, Di Xiao, Yushu Zhang, Hong Liu
:
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images. Signal Process. 99: 17-28 (2014) - [i4]Yushu Zhang, Kwok-Wo Wong, Di Xiao, Leo Yu Zhang, Ming Li:
Embedding Cryptographic Features in Compressive Sensing. CoRR abs/1403.6213 (2014) - [i3]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Di Xiao:
Robust Coding of Encrypted Images via Structural Matrix. CoRR abs/1405.6843 (2014) - [i2]Leo Yu Zhang, Kwok-Wo Wong, Chengqing Li, Yushu Zhang:
Towards Secure Compressive Sampling Scheme. CoRR abs/1406.1725 (2014) - [i1]Leo Yu Zhang, Kwok-Wo Wong, Yushu Zhang, Qiuzhen Lin:
Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images. CoRR abs/1411.6079 (2014) - 2013
- [j1]Yushu Zhang, Di Xiao, Yonglu Shu, Jing Li:
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process. Image Commun. 28(3): 292-300 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-20 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint