Deep learning for intelligent wireless networks: A comprehensive survey Q Mao, F Hu, Q Hao IEEE Communications Surveys & Tutorials 20 (4), 2595-2621, 2018 | 743 | 2018 |
A fast algorithm for matrix embedding steganography Q Mao Digital Signal Processing 25, 248-254, 2014 | 57 | 2014 |
Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method F Li, Q Mao, CC Chang Multimedia Tools and Applications 77, 5149-5168, 2018 | 27 | 2018 |
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. F Li, Q Mao, CC Chang Int. J. Netw. Secur. 18 (3), 410-419, 2016 | 27 | 2016 |
Reversible data hiding with oriented and minimized distortions using cascading trellis coding Q Mao, F Li, CC Chang Information Sciences 317, 170-180, 2015 | 23 | 2015 |
A novel turbo-based encryption scheme using dynamic puncture mechanism Q Mao, C Qin Journal of Networks 7 (2), 236, 2012 | 20 | 2012 |
Edge directed automatic control point selection algorithm for image morphing Q Mao, K Bharanitharan, CC Chang IETE Technical Review 30 (4), 343-243, 2013 | 16 | 2013 |
Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images F Li, K Bharanitharan, CC Chang, Q Mao Multimedia Tools and Applications 75, 16153-16171, 2016 | 14 | 2016 |
Forecasting the number of monthly active Facebook and Twitter worldwide users using ARMA model QA Al-Haija, Q Mao, K Al Nasr | 13 | 2019 |
Intelligent high-speed unmanned vehicle communications via bio-inspired multi-beam pipe transmission F Hu, Q Mao, L Hu, S Kumar US Patent 10,686,691, 2020 | 11 | 2020 |
A new scheme to improve the quality of compressed image transmission by turbo unequal error protection codes Q Mao, B Xu, Y Qin 2011 Seventh International Conference on Intelligent Information Hiding and …, 2011 | 11 | 2011 |
Joint error correction and encryption scheme based on turbo codes Q Mao, L Sun, C Qin 2010 International Symposium on Intelligence Information Processing and …, 2010 | 10 | 2010 |
An Efficient Smart Card Based Authentication Scheme Using Image Encryption. CC Chang, HL Wu, ZH Wang, Q Mao Journal of Information Science & Engineering 29 (6), 2013 | 9 | 2013 |
An image encryption scheme based on concatenated torus automorphisms Q Mao, CC Chang, HL Wu KSII Transactions on Internet and Information Systems (TIIS) 7 (6), 1492-1511, 2013 | 9 | 2013 |
Simulation methodology and performance analysis of network coding based transport protocol in wireless big data networks Q Mao, F Hu, S Kumar Simulation Modelling Practice and Theory 84, 38-49, 2018 | 8 | 2018 |
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. S Zhai, F Li, CC Chang, Q Mao Int. J. Netw. Secur. 17 (5), 643-649, 2015 | 7 | 2015 |
Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images. Q Mao, K Bharanitharan, CC Chang J. Inf. Hiding Multim. Signal Process. 7 (6), 1168-1184, 2016 | 5 | 2016 |
An image-based key agreement protocol using the morphing technique Q Mao, CC Chang, L Harn, SC Chang Multimedia Tools and Applications 74, 3207-3229, 2015 | 5 | 2015 |
Turbo-Based Encryption with Error Correction Capability Q Mao, C Qin, B Xu, X Guo Journal of Computational Information Systems 7 (8), 2876-2885, 2011 | 5 | 2011 |
Image watermarking scheme with unequal protection capability based on error correcting codes C Qin, Q Mao, X Zhang Journal of multimedia 5 (5), 427, 2010 | 5 | 2010 |