default search action
BibTeX records: Guodong Ye
@article{DBLP:journals/istr/WongYGWY24, author = {Kuan{-}Wai Wong and Wun{-}She Yap and Bok{-}Min Goi and Denis Chee{-}Keong Wong and Guodong Ye}, title = {Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map}, journal = {J. Inf. Secur. Appl.}, volume = {81}, pages = {103692}, year = {2024}, url = {https://doi.org/10.1016/j.jisa.2023.103692}, doi = {10.1016/J.JISA.2023.103692}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WongYGWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/HuangDYYG23, author = {Xiaoling Huang and Youxia Dong and Guodong Ye and Wun{-}She Yap and Bok{-}Min Goi}, title = {Visually meaningful image encryption algorithm based on digital signature}, journal = {Digit. Commun. Networks}, volume = {9}, number = {1}, pages = {159--165}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.04.028}, doi = {10.1016/J.DCAN.2022.04.028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/HuangDYYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HuangDYS23, author = {Xiaoling Huang and Youxia Dong and Guodong Ye and Yang Shi}, title = {Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform}, journal = {Frontiers Comput. Sci.}, volume = {17}, number = {3}, pages = {173804}, year = {2023}, url = {https://doi.org/10.1007/s11704-022-1419-8}, doi = {10.1007/S11704-022-1419-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/HuangDYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YeLFTZZZ23, author = {Guodong Ye and Xin Liu and Siqi Fan and Yuan Tan and Qingguo Zhou and Rui Zhou and Xiaokang Zhou}, title = {Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT}, journal = {Future Gener. Comput. Syst.}, volume = {148}, pages = {201--210}, year = {2023}, url = {https://doi.org/10.1016/j.future.2023.06.006}, doi = {10.1016/J.FUTURE.2023.06.006}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YeLFTZZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangMLYJMZ23, author = {Yingli Zhang and Jiali Ma and Xin Liu and Guodong Ye and Qun Jin and Jianhua Ma and Qingguo Zhou}, title = {An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {21431--21442}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3294496}, doi = {10.1109/JIOT.2023.3294496}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangMLYJMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/YeWLS22, author = {Guodong Ye and Huishan Wu and Min Liu and Yang Shi}, title = {Image encryption scheme based on blind signature and an improved Lorenz system}, journal = {Expert Syst. Appl.}, volume = {205}, pages = {117709}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.117709}, doi = {10.1016/J.ESWA.2022.117709}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/YeWLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/0002LLMYLZ22, author = {Yang Shi and Junqing Liang and Mianhong Li and Tianchen Ma and Guodong Ye and Jiangfeng Li and Qinpei Zhao}, title = {Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications}, booktitle = {25th International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022}, pages = {129--142}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3545948.3545977}, doi = {10.1145/3545948.3545977}, timestamp = {Thu, 20 Oct 2022 10:46:43 +0200}, biburl = {https://dblp.org/rec/conf/raid/0002LLMYLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/YePDJH21, author = {Guodong Ye and Chen Pan and Youxia Dong and Kaixin Jiao and Xiaoling Huang}, title = {A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/ett.4071}, doi = {10.1002/ETT.4071}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/YePDJH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DongHY21, author = {Youxia Dong and Xiaoling Huang and Guodong Ye}, title = {Visually Meaningful Image Encryption Scheme Based on {DWT} and Schur Decomposition}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6677325:1--6677325:16}, year = {2021}, url = {https://doi.org/10.1155/2021/6677325}, doi = {10.1155/2021/6677325}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DongHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/JiaoYM21, author = {Kaixin Jiao and Guodong Ye and Qixiang Mei}, title = {Image Encryption Scheme Based on Quantum Logistic Map and Cellular Automata}, booktitle = {6th {IEEE} International Conference on Computer and Communication Systems, {ICCCS} 2021, Chengdu, China, April 23-26, 2021}, pages = {375--379}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCS52626.2021.9449238}, doi = {10.1109/ICCCS52626.2021.9449238}, timestamp = {Wed, 28 Jul 2021 08:35:29 +0200}, biburl = {https://dblp.org/rec/conf/ccoms/JiaoYM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccv/ZhouSLYX21, author = {Junwei Zhou and Delong Shang and Huile Lang and Guodong Ye and Zhe Xia}, title = {Face Template Protection through Residual Learning Based Error-Correcting Codes}, booktitle = {{ICCCV} 2021: 4th International Conference on Control and Computer Vision, Macau, SAR, China, August 13 - 15, 2021}, pages = {112--118}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3484274.3484292}, doi = {10.1145/3484274.3484292}, timestamp = {Fri, 10 Dec 2021 11:16:30 +0100}, biburl = {https://dblp.org/rec/conf/icccv/ZhouSLYX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/LiuYL21, author = {Min Liu and Guodong Ye and Qiuzhen Lin}, title = {Meaningful color image encryption algorithm based on compressive sensing and chaotic map}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021}, pages = {262--265}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSREW53611.2021.00073}, doi = {10.1109/ISSREW53611.2021.00073}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/LiuYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/YeJWPH20, author = {Guodong Ye and Kaixin Jiao and Huishan Wu and Chen Pan and Xiaoling Huang}, title = {An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the {RSA} Public-Key Cryptosystem}, journal = {Int. J. Bifurc. Chaos}, volume = {30}, number = {15}, pages = {2050233:1--2050233:17}, year = {2020}, url = {https://doi.org/10.1142/S0218127420502338}, doi = {10.1142/S0218127420502338}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/YeJWPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/HuangDJY20, author = {Xiaoling Huang and Youxia Dong and Kaixin Jiao and Guodong Ye}, title = {Asymmetric pixel confusion algorithm for images based on {RSA} and Arnold transform}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {21}, number = {12}, pages = {1783--1794}, year = {2020}, url = {https://doi.org/10.1631/FITEE.2000241}, doi = {10.1631/FITEE.2000241}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/HuangDJY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiaoYDHH20, author = {Kaixin Jiao and Guodong Ye and Youxia Dong and Xiaoling Huang and Jianqing He}, title = {Image Encryption Scheme Based on a Generalized Arnold Map and {RSA} Algorithm}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {9721675:1--9721675:14}, year = {2020}, url = {https://doi.org/10.1155/2020/9721675}, doi = {10.1155/2020/9721675}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiaoYDHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YePDSH20, author = {Guodong Ye and Chen Pan and Youxia Dong and Yang Shi and Xiaoling Huang}, title = {Image encryption and hiding algorithm based on compressive sensing and random numbers insertion}, journal = {Signal Process.}, volume = {172}, pages = {107563}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2020.107563}, doi = {10.1016/J.SIGPRO.2020.107563}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/YePDSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanYHZ19, author = {Chen Pan and Guodong Ye and Xiaoling Huang and Junwei Zhou}, title = {Novel Meaningful Image Encryption Based on Block Compressive Sensing}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6572105:1--6572105:12}, year = {2019}, url = {https://doi.org/10.1155/2019/6572105}, doi = {10.1155/2019/6572105}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanYHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaip/PanHYW19, author = {Chen Pan and Xiaoling Huang and Guodong Ye and Zhengxia Wang}, title = {An Image Visual Cryptography Using Double Encryption and Hiding Technology}, booktitle = {{ICAIP} 2019: 3rd International Conference on Advances in Image Processing, Chengdu, China, November, 2019}, pages = {50--54}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3373419.3373454}, doi = {10.1145/3373419.3373454}, timestamp = {Tue, 25 Apr 2023 14:07:19 +0200}, biburl = {https://dblp.org/rec/conf/icaip/PanHYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/YeH18, author = {Guodong Ye and Xiaoling Huang}, title = {Spatial image encryption algorithm based on chaotic map and pixel frequency}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {5}, pages = {058104:1--058104:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9191-x}, doi = {10.1007/S11432-017-9191-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/YeH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/HuangY18, author = {Xiaoling Huang and Guodong Ye}, title = {An Image Encryption Algorithm Based on Time-Delay and Random Insertion}, journal = {Entropy}, volume = {20}, number = {12}, pages = {974}, year = {2018}, url = {https://doi.org/10.3390/e20120974}, doi = {10.3390/E20120974}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/HuangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/YePHZH18, author = {Guodong Ye and Chen Pan and Xiaoling Huang and Zhenyu Zhao and Jianqing He}, title = {A Chaotic Image Encryption Algorithm Based on Information Entropy}, journal = {Int. J. Bifurc. Chaos}, volume = {28}, number = {1}, pages = {1850010:1--1850010:11}, year = {2018}, url = {https://doi.org/10.1142/S0218127418500104}, doi = {10.1142/S0218127418500104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/YePHZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuangY18, author = {Xiaoling Huang and Guodong Ye}, title = {An image encryption algorithm based on irregular wave representation}, journal = {Multim. Tools Appl.}, volume = {77}, number = {2}, pages = {2611--2628}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4455-x}, doi = {10.1007/S11042-017-4455-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YeJPH18, author = {Guodong Ye and Kaixin Jiao and Chen Pan and Xiaoling Huang}, title = {An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {8402578:1--8402578:11}, year = {2018}, url = {https://doi.org/10.1155/2018/8402578}, doi = {10.1155/2018/8402578}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YeJPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaip/YeHP18, author = {Guodong Ye and Xiaoling Huang and Chen Pan}, title = {An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map}, booktitle = {Proceedings of the 2nd International Conference on Advances in Image Processing, {ICAIP} 2018, Chengdu, China, June 16-18, 2018}, pages = {78--82}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3239576.3239584}, doi = {10.1145/3239576.3239584}, timestamp = {Thu, 23 Mar 2023 11:00:28 +0100}, biburl = {https://dblp.org/rec/conf/icaip/YeHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/YeH17, author = {Guodong Ye and Xiaoling Huang}, title = {An efficient symmetric image encryption algorithm based on an intertwining logistic map}, journal = {Neurocomputing}, volume = {251}, pages = {45--53}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2017.04.016}, doi = {10.1016/J.NEUCOM.2017.04.016}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/YeH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icime/LiuYTLS17, author = {Gang Liu and Guodong Ye and Haitao Tang and Ke Liu and Yongzhong Sha}, title = {Simulation Study on the Propagation Law of Sina Micro-blog for Tianjin Event Based on Improved {SIR} Model}, booktitle = {Proceedings of the 9th International Conference on Information Management and Engineering, Barcelona, Spain, October 09 - 11, 2017}, pages = {167--171}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3149572.3149573}, doi = {10.1145/3149572.3149573}, timestamp = {Tue, 06 Nov 2018 11:07:32 +0100}, biburl = {https://dblp.org/rec/conf/icime/LiuYTLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/YeH16, author = {Guodong Ye and Xiaoling Huang}, title = {An Image Encryption Algorithm Based on Autoblocking and Electrocardiography}, journal = {{IEEE} Multim.}, volume = {23}, number = {2}, pages = {64--71}, year = {2016}, url = {https://doi.org/10.1109/MMUL.2015.72}, doi = {10.1109/MMUL.2015.72}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeemm/YeH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YeH16, author = {Guodong Ye and Xiaoling Huang}, title = {A novel block chaotic encryption scheme for remote sensing image}, journal = {Multim. Tools Appl.}, volume = {75}, number = {18}, pages = {11433--11446}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2861-5}, doi = {10.1007/S11042-015-2861-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YeH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YeH16, author = {Guodong Ye and Xiaoling Huang}, title = {A secure image encryption algorithm based on chaotic maps and {SHA-3}}, journal = {Secur. Commun. Networks}, volume = {9}, number = {13}, pages = {2015--2023}, year = {2016}, url = {https://doi.org/10.1002/sec.1458}, doi = {10.1002/SEC.1458}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YeH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangYCX15, author = {Xiaoling Huang and Guodong Ye and Huajin Chai and Ou Xie}, title = {Compression and encryption for remote sensing image using chaotic system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3659--3666}, year = {2015}, url = {https://doi.org/10.1002/sec.1289}, doi = {10.1002/SEC.1289}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangYCX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/YeZ14, author = {Guodong Ye and Junwei Zhou}, title = {A block chaotic image encryption scheme based on self-adaptive modelling}, journal = {Appl. Soft Comput.}, volume = {22}, pages = {351--357}, year = {2014}, url = {https://doi.org/10.1016/j.asoc.2014.05.025}, doi = {10.1016/J.ASOC.2014.05.025}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/YeZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/HuangY14, author = {Xiaoling Huang and Guodong Ye}, title = {An efficient self-adaptive model for chaotic image encryption algorithm}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {19}, number = {12}, pages = {4094--4104}, year = {2014}, url = {https://doi.org/10.1016/j.cnsns.2014.04.012}, doi = {10.1016/J.CNSNS.2014.04.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cnsns/HuangY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuangY14, author = {Xiaoling Huang and Guodong Ye}, title = {An image encryption algorithm based on hyper-chaos and {DNA} sequence}, journal = {Multim. Tools Appl.}, volume = {72}, number = {1}, pages = {57--70}, year = {2014}, url = {https://doi.org/10.1007/s11042-012-1331-6}, doi = {10.1007/S11042-012-1331-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuangY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Ye10, author = {Guodong Ye}, title = {Another Constructed Chaotic Image Encryption Scheme Based on Toeplitz Matrix and Hankel Matrix}, journal = {Fundam. Informaticae}, volume = {101}, number = {4}, pages = {321--333}, year = {2010}, url = {https://doi.org/10.3233/FI-2010-291}, doi = {10.3233/FI-2010-291}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Ye10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/Ye10, author = {Guodong Ye}, title = {Image scrambling encryption algorithm of pixel bit based on chaos map}, journal = {Pattern Recognit. Lett.}, volume = {31}, number = {5}, pages = {347--354}, year = {2010}, url = {https://doi.org/10.1016/j.patrec.2009.11.008}, doi = {10.1016/J.PATREC.2009.11.008}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/prl/Ye10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijufks/YueJY09, author = {Zhongliang Yue and Yuying Jia and Guodong Ye}, title = {An Approach for Multiple Attribute Group Decision Making Based on Intuitionistic Fuzzy Information}, journal = {Int. J. Uncertain. Fuzziness Knowl. Based Syst.}, volume = {17}, number = {3}, pages = {317--332}, year = {2009}, url = {https://doi.org/10.1142/S0218488509005899}, doi = {10.1142/S0218488509005899}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijufks/YueJY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbta/YeLZ09, author = {Guodong Ye and Gui Lin and Changqing Zhu}, title = {A Designed Edge Marking Fill Algorithm for Elongated Polygon}, booktitle = {First International Workshop on Database Technology and Applications, {DBTA} 2009, Wuhan, Hubei, China, April 25-26, 2009, Proceedings}, pages = {22--24}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DBTA.2009.13}, doi = {10.1109/DBTA.2009.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbta/YeLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YeHZ07, author = {Guodong Ye and Xiaoling Huang and Changqing Zhu}, title = {Image Encryption Algorithm of Double Scrambling Based on {ASCII} Code of Matrix Element}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {843--847}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.120}, doi = {10.1109/CIS.2007.120}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YeHZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.