Showing 1 - 20 results of 23 for search 'Nenghai YU', query time: 0.03s
Refine Results
-
1
Improvement of the blockchain protocol based on memory-hard function by Sui CHENG, Xianzheng LIN, Nenghai YU
Published 2020-10-01
Article -
2
A Design Method of Saturation Test Image Based on CIEDE2000 by Yang Yang, Jun Ming, Nenghai Yu
Published 2012-01-01
Article -
3
Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU
Published 2023-10-01
Article -
4
Adaptable privacy protection scheme in JPEG images by Hongxin WEN, Fei HU, Nenghai YU
Published 2024-02-01
Article -
5
The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications by Hao Zhang, Nenghai Yu, Honggang Hu
Published 2014-02-01
Article -
6
Rapid responsive and efficient multi-valued Byzantine consensus scheme by Wang ZHOU, Honggang HU, Nenghai YU
Published 2021-02-01
Article -
7
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics by Zhuo Hao, Sheng Zhong, Nenghai Yu
Published 2013-01-01
Article -
8
Compression of bitcoin blockchain by Xiaojiao CHEN, Xianzheng LIN, Nenghai YU
Published 2021-02-01
Article -
9
Carrier-independent deep optical watermarking algorithm by Hao CHEN, Feng WANG, Weiming ZHANG, Nenghai YU
Published 2022-08-01
Article -
10
Privacy leakage risk assessment for reversible neural network by Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU
Published 2023-08-01
Article -
11
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU
Published 2023-06-01
Article -
12
Reversible data hiding in encrypted images based on fine-grained embedding room reservation by Jinwei LI, Xiaoya ZHANG, Yuanzhi YAO, Nenghai YU
Published 2022-02-01
Article -
13
Binary image steganography method based on layered embedding by Yuxiang CHENG, Weiming ZHANG, Weixiang LI, Nenghai YU
Published 2021-10-01
Article -
14
Lip forgery detection via spatial-frequency domain combination by Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU
Published 2022-12-01
Article -
15
Quantum information course for the undergraduate students of cyber security by Wei CHEN, Zhenqiang YIN, Zhengfu HAN, Nenghai YU
Published 2019-06-01
Article -
16
Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding by Yue YU, Xianzheng LIN, Weihai LI, Nenghai YU
Published 2023-08-01
Article -
17
Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
Published 2022-06-01
Article -
18
Image privacy preservation scheme based on QR code and reversible visible watermarking by Yuanzhi YAO, Feng WANG, Wenbo YAN, Nenghai YU
Published 2019-11-01
Article -
19
Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU
Published 2023-02-01
Article -
20
Improved fast leakage assessment based on online counting by Zhengguang SHI, Mengce ZHENG, Honggang HU, Nenghai YU
Published 2021-04-01
Article