


Остановите войну!
for scientists:


default search action
Wenying Wen
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j29]Wenying Wen, Yunpeng Jian, Yuming Fang, Yushu Zhang, Baolin Qiu:
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework. Multim. Syst. 29(2): 831-845 (2023) - [j28]Wenying Wen, Rongxin Tu, Yushu Zhang, Yuming Fang, Yong Yang:
A multi-level approach with visual information for encrypted H.265/HEVC videos. Multim. Syst. 29(3): 1073-1087 (2023) - [j27]Tao Wang
, Yushu Zhang
, Ruoyu Zhao
, Wenying Wen
, Rushi Lan
:
Identifiable Face Privacy Protection via Virtual Identity Transformation. IEEE Signal Process. Lett. 30: 773-777 (2023) - [j26]Yifan Zuo
, Jiacheng Xie, Hao Wang, Yuming Fang
, Deyang Liu
, Wenying Wen
:
Gradient-Guided Single Image Super-Resolution Based on Joint Trilateral Feature Filtering. IEEE Trans. Circuits Syst. Video Technol. 33(2): 505-520 (2023) - [j25]Yushu Zhang
, Tao Wang
, Ruoyu Zhao
, Wenying Wen
, Youwen Zhu
:
RAPP: Reversible Privacy Preservation for Various Face Attributes. IEEE Trans. Inf. Forensics Secur. 18: 3074-3087 (2023) - [i2]Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao:
Visual Content Privacy Protection: A Survey. CoRR abs/2303.16552 (2023) - 2022
- [j24]Ruoyu Zhao, Yushu Zhang, Yu Nan, Wenying Wen, Xiuli Chai, Rushi Lan:
Primitively visually meaningful image encryption: A new paradigm. Inf. Sci. 613: 628-648 (2022) - [c3]Boyang Wan, Wenhui Jiang, Yuming Fang, Wenying Wen, Hantao Liu:
Dual-stream Self-attention Network for Image Captioning. VCIP 2022: 1-5 - 2021
- [j23]Kangkang Wei, Wenying Wen, Yuming Fang:
Light field image encryption based on spatial-angular characteristic. Signal Process. 185: 108080 (2021) - [j22]Yong Yang, Jia-Xiang Liu, Shu-Ying Huang, Hangyuan Lu, Wenying Wen:
VMDM-fusion: a saliency feature representation method for infrared and visible image fusion. Signal Image Video Process. 15(6): 1221-1229 (2021) - [j21]Wenying Wen
, Kangkang Wei, Yuming Fang, Yushu Zhang
:
Visual Quality Assessment for Perceptually Encrypted Light Field Images. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2522-2534 (2021) - [j20]Yong Yang
, Jiaxiang Liu
, Shuying Huang
, Weiguo Wan
, Wenying Wen
, Juwei Guan
:
Infrared and Visible Image Fusion via Texture Conditional Generative Adversarial Network. IEEE Trans. Circuits Syst. Video Technol. 31(12): 4771-4783 (2021) - [j19]Yuming Fang
, Jiebin Yan, Rengang Du, Yifan Zuo
, Wenying Wen, Yan Zeng, Leida Li
:
Blind Quality Assessment for Tone-Mapped Images by Analysis of Gradient and Chromatic Statistics. IEEE Trans. Multim. 23: 955-966 (2021) - 2020
- [j18]Xuelin Liu, Yuming Fang, Rengang Du, Yifan Zuo, Wenying Wen:
Blind quality assessment for tone-mapped images based on local and global features. Inf. Sci. 528: 46-57 (2020) - [j17]Haiju Fan, Kanglei Zhou
, En Zhang, Wenying Wen, Ming Li
:
Subdata image encryption scheme based on compressive sensing and vector quantization. Neural Comput. Appl. 32(16): 12771-12787 (2020) - [j16]Rongxin Tu
, Wenying Wen
, Changsheng Hua:
An Unequal Image Privacy Protection Method Based on Saliency Detection. Secur. Commun. Networks 2020: 8842376:1-8842376:13 (2020) - [j15]Wenying Wen, Yukun Hong, Yuming Fang, Meng Li, Ming Li:
A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process. 173: 107580 (2020) - [j14]Yuming Fang
, Rengang Du, Yifan Zuo
, Wenying Wen
, Leida Li
:
Perceptual Quality Assessment for Screen Content Images by Spatial Continuity. IEEE Trans. Circuits Syst. Video Technol. 30(11): 4050-4063 (2020) - [j13]Yuming Fang
, Guanqun Ding
, Wenying Wen, Feiniu Yuan
, Yong Yang
, Zhijun Fang, Weisi Lin
:
Salient Object Detection by Spatiotemporal and Semantic Features in Real-Time Video Processing Systems. IEEE Trans. Ind. Electron. 67(11): 9893-9903 (2020) - [i1]Wenying Wen, Rongxin Tu, Yushu Zhang, Yuming Fang, Yong Yang:
A multi-level approach with visual information for encrypted H.265/HEVC videos. CoRR abs/2011.02620 (2020)
2010 – 2019
- 2019
- [j12]Ping Wang
, Xing He, Yushu Zhang, Wenying Wen, Ming Li:
A robust and secure image sharing scheme with personal identity information embedded. Comput. Secur. 85: 107-121 (2019) - 2018
- [j11]Ming Li, Dandan Lu, Wenying Wen, Hua Ren, Yushu Zhang
:
Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata. IEEE Access 6: 47102-47111 (2018) - [j10]Wenying Wen, Yushu Zhang, Yuming Fang, Zhijun Fang:
Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput. Appl. 29(3): 653-663 (2018) - [j9]Hui Huang, Xing He, Yong Xiang, Wenying Wen, Yushu Zhang:
A compression-diffusion-permutation strategy for securing image. Signal Process. 150: 183-190 (2018) - [c2]Yuming Fang, Kangkang Wei
, Junhui Hou
, Wenying Wen, Nevrez Imamoglu
:
Light Filed Image Quality Assessment by Local and Global Features of Epipolar Plane Image. BigMM 2018: 1-6 - 2017
- [j8]Wenying Wen, Chuanjiang He
, Yushu Zhang, Zhijun Fang:
A novel method for image segmentation using reaction-diffusion model. Multidimens. Syst. Signal Process. 28(2): 657-677 (2017) - [j7]Yushu Zhang, Wenying Wen, Yongfei Wu, Rui Zhang, Jun-Xin Chen
, Xing He:
Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral. Neural Comput. Appl. 28(1): 165-169 (2017) - 2016
- [j6]Wenying Wen:
Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack. Multim. Tools Appl. 75(6): 3553-3560 (2016) - [c1]Wenying Wen, Yushu Zhang, Yuming Fang, Zhijun Fang:
A novel selective image encryption method based on saliency detection. VCIP 2016: 1-4 - 2015
- [j5]Yushu Zhang, Di Xiao, Wenying Wen, Hai Nan, Moting Su:
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register. Commun. Nonlinear Sci. Numer. Simul. 27(Issues): 22-29 (2015) - [j4]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang
, Wenying Wen, Jiantao Zhou, Xing He:
Robust coding of encrypted images via structural matrix. Signal Process. Image Commun. 39: 202-211 (2015) - 2014
- [j3]Yushu Zhang, Di Xiao, Wenying Wen, Kwok-Wo Wong:
On the security of symmetric ciphers based on DNA coding. Inf. Sci. 289: 254-261 (2014) - [j2]Yushu Zhang, Di Xiao, Wenying Wen, Ming Li
:
Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multim. Tools Appl. 73(3): 1885-1896 (2014) - 2013
- [j1]Wenying Wen, Chuanjiang He, Meng Li:
Transition region-based active contour model for image segmentation. J. Electronic Imaging 22(1): 013021 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-02 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint