Leo Yu ZHANG
Leo Yu ZHANG
School of Info Technology, Deakin University
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
A Review of Compressive Sensing in Information Security Field
Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He
IEEE Access, 2016
1422016
Embedding cryptographic features in compressive sensing
Y Zhang, KW Wong, D Xiao, LY Zhang, M Li
Neurocomputing 40 (12), 472-480, 2016
1012016
Breaking a novel colour image encryption algorithm based on chaos
C Li, LY Zhang, R Ou, KW Wong, S Shu
Nonlinear dynamics, 1-6, 2012
1012012
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials, 2018
952018
A chaotic image encryption scheme owning temp-value feedback
LY Zhang, X Hu, Y Liu, KW Wong, J Gan
Communications in Nonlinear Science and Numerical Simulation, 2013
942013
Breaking a chaotic image encryption algorithm based on perceptron model
LY Zhang, C Li, Q Li, D Zhang, S Shu
Nonlinear Dynamics 69 (3), 1091-1096, 2012
852012
On the security of a class of diffusion mechanisms for image encryption
LY Zhang, Y Liu, F Pareschi, Y Zhang, KW Wong, R Rovatti, G Setti
IEEE Transactions on Cybernetics 48 (4), 1163 - 1175, 2018
822018
Bi-level Protected Compressive Sampling
LY Zhang, KW WONG, Y ZHANG, J Zhou
IEEE Transactions on Multimedia 18 (9), 1720 - 1732, 2016
76*2016
Low-cost and confidentiality-preserving data acquisition for internet of multimedia things
Y Zhang, Q He, Y Xiang, LY Zhang, B Liu, J Chen, Y Xie
IEEE Internet of Things Journal 5 (5), 3442-3451, 2017
572017
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
LY Zhang, C Li, KW Wong, S Shu, G Chen
Journal of Systems and Software 85 (9), 2077-2085, 2012
572012
Breaking a chaotic image encryption algorithm based on modulo addition and xor operation
C Li, Y Liu, LY Zhang, MZQ Chen
International Journal of Bifurcation and Chaos 23 (04), 1350075, 2013
492013
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Y Liu, LY Zhang, J Wang, Y Zhang, K Wong
Nonlinear Dynamics 84 (4), 2241-2250, 2015
442015
Improved known-plaintext attack to permutation-only multimedia ciphers
LY Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen
Information Sciences 430, 228-239, 2018
392018
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
C Li, Y Liu, LY Zhang, KW Wong
Signal Processing: Image Communication 29 (8), 914-920, 2014
382014
Compressive Sensing
Y Zhang, Y Xiang, LY Zhang
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT, 1-9, 2019
35*2019
Secure wireless communications based on compressive sensing: a survey
Y Zhang, Y Xiang, LY Zhang, Y Rong, S Guo
IEEE Communications Surveys & Tutorials 21 (2), 1093-1111, 2018
302018
Medical image cipher using hierarchical diffusion and non-sequential encryption
J Chen, L Chen, LY Zhang, Z Zhu
Nonlinear Dynamics 96 (1), 301-322, 2019
282019
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions
Y Zhang, J Zhou, F Chen, LY Zhang, D Xiao, B Chen, X Liao
International Journal of Bifurcation and Chaos 26 (11), 1650191, 2016
282016
Defining embedding distortion for intra prediction mode-based video steganography
Q Nie, X Xu, B Feng, LY Zhang
Computers, Materials & Continua 55 (1), 59-70, 2018
232018
Exploiting random convolution and random subsampling for image encryption and compression
Y Zhang, LY Zhang
Electron. Lett 51 (20), 1572-1574, 2015
232015
The system can't perform the operation now. Try again later.
Articles 1–20