default search action
Di Xiao 0001
Person information
- affiliation: Chongqing University, Chongqing, China
Other persons with the same name
- Di Xiao — disambiguation page
- Di Xiao 0002 — University of Minnesota, Minneapolis, MN, USA
- Di Xiao 0003 — Texas A&M University, College Station, TX, USA
- Di Xiao 0004 — TeleMedC Pty Ltd., Brisbane, Australia (and 1 more)
- Di Xiao 0005 — Fuzhou University, Fuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j88]Bo Zhang, Di Xiao, Min Li, Kai Wang:
Cipher-image coding via 2D compressive sensing and cipher-domain mapping. Digit. Signal Process. 152: 104593 (2024) - [j87]Lvjun Chen, Di Xiao, Zhuyang Yu, Maolan Zhang:
Secure and efficient federated learning via novel multi-party computation and compressed sensing. Inf. Sci. 667: 120481 (2024) - [j86]Di Xiao, Jingdong Xia, Min Li, Maolan Zhang:
Manipulable, reversible and diversified de-identification via face identity disentanglement. Multim. Tools Appl. 83(31): 75653-75670 (2024) - [j85]Hui Huang, Di Xiao, Jia Liang:
Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization Reconstruction. ACM Trans. Multim. Comput. Commun. Appl. 20(4): 116:1-116:22 (2024) - [j84]Hui Huang, Di Xiao, Jia Liang, Min Li:
Prior-based privacy-assured compressed sensing scheme in cloud. Vis. Comput. 40(3): 2103-2117 (2024) - [i4]Yuwen Qian, Shuchi Wu, Kang Wei, Ming Ding, Di Xiao, Tao Xiang, Chuan Ma, Song Guo:
EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection. CoRR abs/2405.13080 (2024) - 2023
- [j83]Yawen Huang, Hongying Zheng, Di Xiao:
Convolutional neural networks tamper detection and location based on fragile watermarking. Appl. Intell. 53(20): 24056-24067 (2023) - [j82]Baokun Qin, Hongying Zheng, Di Xiao:
High-capacity data hiding in encrypted images based on compressive sensing and intra-block difference coding. Appl. Intell. 53(21): 26240-26254 (2023) - [j81]Di Xiao, Yue Li, Min Li:
Invertible Privacy-Preserving Adversarial Reconstruction for Image Compressed Sensing. Sensors 23(7): 3575 (2023) - [j80]Mengdi Wang, Di Xiao, Jia Liang, Guiqiang Hu:
Distributed privacy-preserving nested compressed sensing for multiclass data collection with identity authentication. Signal Process. 204: 108823 (2023) - [j79]Bo Zhang, Di Xiao, Xiuling Li, Jia Liang:
Privacy-preserving image compressed sensing by embedding a controllable noise-injected transformation for IoT devices. Signal Process. 210: 109055 (2023) - [j78]Jia Liang, Di Xiao, Hui Huang, Min Li:
Multilevel Privacy Preservation Scheme Based on Compressed Sensing. IEEE Trans. Ind. Informatics 19(6): 7435-7444 (2023) - [c24]Bo Zhang, Di Xiao, Dongjing Shan:
Image Compressed Sensing Using Auxiliary Information for Efficient Coding. DCC 2023: 1 - [c23]Hui Huang, Di Xiao, Mengdi Wang:
Hierarchical Privacy-Preserving and Communication-Efficient Compression via Compressed Sensing. DCC 2023: 342 - [c22]Di Xiao, Qin Tang, Aozhu Zhao, Min Li:
Robust Watermarking Scheme in Encrypted Domain Based on Integer Lifting Wavelet Transform and Compressed Sensing. ICASSP 2023: 1-5 - [c21]Di Xiao, Jinkun Li, Min Li:
Privacy-Preserving Federated Compressed Learning Against Data Reconstruction Attacks Based on Secure Data. ICONIP (15) 2023: 325-339 - 2022
- [j77]Min Li, Di Xiao, Jia Liang, Hui Huang:
Communication-Efficient and Byzantine-Robust Differentially Private Federated Learning. IEEE Commun. Lett. 26(8): 1725-1729 (2022) - [j76]Min Li, Di Xiao, Hui Huang, Bo Zhang:
Multi-level video quality services and security guarantees based on compressive sensing in sensor-cloud system. J. Netw. Comput. Appl. 205: 103456 (2022) - [j75]Di Xiao, Aozhu Zhao, Fei Li:
Robust Watermarking Scheme for Encrypted Images Based on Scrambling and Kronecker Compressed Sensing. IEEE Signal Process. Lett. 29: 484-488 (2022) - [j74]Bo Zhang, Di Xiao, Ying Li, Lei Yang:
2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction for Cipher-Image Coding. IEEE Signal Process. Lett. 29: 2033-2037 (2022) - [j73]Hui Huang, Di Xiao, Jia Liang:
Two-Layer Controllable Recovery for Privacy-Preserving Double-Compressed Images. IEEE Signal Process. Lett. 29: 2452-2456 (2022) - [j72]Jia Liang, Di Xiao, Xue Tan, Hui Huang:
Secure Sampling and Low-Overhead Compressive Analysis by Linear Transformation. IEEE Trans. Circuits Syst. II Express Briefs 69(2): 639-643 (2022) - [c20]Hui Huang, Di Xiao, Min Li:
Privacy-Assured and Multi-Prior Recovered Compressed Sensing for Image Compression-Encryption Applications. DCC 2022: 113-122 - [c19]Bo Zhang, Di Xiao, Hui Huang, Jia Liang:
Compressing Cipher Images by Using Semi-tensor Product Compressed Sensing and Pre-mapping. DCC 2022: 123-132 - [c18]Bo Zhang, Di Xiao, Sen Bai, Min Li:
Compressed Sensing by Using Measurement Completion for Robust Image Coding. HPCC/DSS/SmartCity/DependSys 2022: 523-529 - [c17]Di Xiao, Pengcen Jiang, Min Li:
Communication-Efficient Federated Learning Based on Chained Secure Multiparty Computing and Compressed Sensing. HPCC/DSS/SmartCity/DependSys 2022: 1539-1546 - [c16]Jia Liang, Di Xiao, Yong Xiang, Robin Doss:
A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission. ICC 2022: 5573-5578 - [c15]Di Xiao, Xue Tan, Min Li:
Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing. ISC 2022: 491-508 - [c14]Hongying Zheng, Yawen Huang, Lin Li, Di Xiao:
Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds. MMM (2) 2022: 382-393 - 2021
- [j71]Di Xiao, Jia Liang, Yanping Xiang, Jiaqi Zhou:
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing. Int. J. Digit. Crime Forensics 13(6): 1-19 (2021) - [j70]Mengdi Wang, Di Xiao, Yong Xiang:
Low-Cost and Confidentiality-Preserving Multi-Image Compressed Acquisition and Separate Reconstruction for Internet of Multimedia Things. IEEE Internet Things J. 8(3): 1662-1673 (2021) - [j69]Yanping Xiang, Di Xiao, Rui Zhang, Jia Liang, Ran Liu:
Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer. Inf. Sci. 545: 188-206 (2021) - [j68]Xingbin Liu, Di Xiao, Cong Liu:
Three-level quantum image encryption based on Arnold transform and logistic map. Quantum Inf. Process. 20(1): 23 (2021) - [j67]Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu, Di Xiao, Yong Xiang:
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Trans. Ind. Informatics 17(5): 3401-3411 (2021) - [j66]Bo Zhang, Di Xiao, Yong Xiang:
Robust Coding of Encrypted Images via 2D Compressed Sensing. IEEE Trans. Multim. 23: 2656-2671 (2021) - [c13]Bo Zhang, Di Xiao, Mengdi Wang, Jia Liang:
Privacy-Preserving Compressed Sensing for Image Simultaneous Compression-Encryption Applications. DCC 2021: 283-292 - [c12]Mengdi Wang, Di Xiao, Jia Liang:
Low Complexity Secure P-Tensor Product Compressed Sensing Reconstruction Outsourcing and Identity Authentication in Cloud. ICASSP 2021: 2630-2634 - [c11]Di Xiao, Shuwen Lan:
Secure Image Coding Based on Compressive Sensing with Optimized Rate-Distortion. ICICS (2) 2021: 125-141 - [i3]Bo Zhang, Di Xiao, Lan Wang, Sen Bai, Lei Yang:
Efficient Compressed Sensing Based Image Coding by Using Gray Transformation. CoRR abs/2102.01272 (2021) - 2020
- [j65]Xinyan Li, Di Xiao, Huajian Mou, Dianjun Lu, Mei Peng:
A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption. IEEE Access 8: 211676-211690 (2020) - [j64]Rui Zhang, Di Xiao:
A secure image permutation-substitution framework based on chaos and compressive sensing. Int. J. Distributed Sens. Networks 16(3) (2020) - [j63]Di Xiao, Min Li, Mengdi Wang, Jia Liang, Ran Liu:
Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks. J. Netw. Comput. Appl. 161: 102654 (2020) - [j62]Xingbin Liu, Di Xiao, Cong Liu:
Quantum image encryption algorithm based on bit-plane permutation and sine logistic map. Quantum Inf. Process. 19(8): 239 (2020) - [j61]Di Xiao, Min Li, Hongying Zheng:
Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing. Sensors 20(5): 1517 (2020) - [j60]Di Xiao, Fei Li, Mengdi Wang, Hongying Zheng:
A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery. IEEE Signal Process. Lett. 27: 296-300 (2020)
2010 – 2019
- 2019
- [j59]Xingbin Liu, Di Xiao, Yanping Xiang:
Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map. IEEE Access 7: 6937-6946 (2019) - [j58]Xingbin Liu, Di Xiao, Wei Huang, Cong Liu:
Quantum Block Image Encryption Based on Arnold Transform and Sine Chaotification Model. IEEE Access 7: 57188-57199 (2019) - [j57]Bin Liu, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang, Yang Li, Bing-Jie Xu:
QKD-Based Quantum Private Query Protocol in the Single-Photon Interference Communication System. IEEE Access 7: 104749-104758 (2019) - [j56]Bin Liu, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang, Bingjie Xu:
Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol. Entropy 21(5): 518 (2019) - [j55]Mengdi Wang, Di Xiao, Yanping Xiang, Hui Wang:
Privacy-Aware Controllable Compressed Data Publishing Against Sparse Estimation Attack in IoT. IEEE Internet Things J. 6(4): 7305-7318 (2019) - [j54]Aqeel-ur Rehman, Di Xiao, Ayesha Kulsoom, Muntazim Abbas Hashmi, Syed Ali Abbas:
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multim. Tools Appl. 78(7): 9355-9382 (2019) - [j53]Ming Li, Di Xiao, Ye Zhu, Yushu Zhang, Lin Sun:
Commutative fragile zero-watermarking and encryption for image integrity protection. Multim. Tools Appl. 78(16): 22727-22742 (2019) - [j52]Bin Liu, Zhifeng Gao, Di Xiao, Wei Huang, Xingbin Liu, Bingjie Xu:
Quantum identity authentication in the orthogonal-state-encoding QKD system. Quantum Inf. Process. 18(5): 137 (2019) - [j51]Hui Wang, Di Xiao, Min Li, Yanping Xiang, Xinyan Li:
A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 155: 218-232 (2019) - [j50]Yanping Xiang, Di Xiao, Hui Wang, Xinyan Li:
A secure image tampering detection and self-recovery scheme using POB number system over cloud. Signal Process. 162: 282-295 (2019) - [c10]Bo Zhang, Di Xiao, Zhenyu Zhang, Lei Yang:
Compressing Encrypted Images by Using 2D Compressed Sensing. HPCC/SmartCity/DSS 2019: 1914-1919 - [c9]Mengdi Wang, Di Xiao, Zihang Ao:
A Novel Privacy-Preserving Data Gathering Scheme in WSN Based on Compressive Sensing and Embedding. ICC 2019: 1-6 - 2018
- [j49]Xingbin Liu, Di Xiao, Cong Liu:
Double Quantum Image Encryption Based on Arnold Transform and Qubit Random Rotation. Entropy 20(11): 867 (2018) - [j48]Di Xiao, Juan Zhao, Mengdi Wang, Yong Wang:
Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment. Multim. Tools Appl. 77(18): 23949-23968 (2018) - [j47]Rui Zhang, Di Xiao, Yanting Chang:
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing. Secur. Commun. Networks 2018: 1591206:1-1591206:15 (2018) - [j46]Ming Li, Hua Ren, En Zhang, Wei Wang, Lin Sun, Di Xiao:
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. Secur. Commun. Networks 2018: 4313769:1-4313769:11 (2018) - [j45]Ming Li, Haiju Fan, Hua Ren, Dandan Lu, Di Xiao, Yang Li:
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain. Secur. Commun. Networks 2018: 9803519:1-9803519:12 (2018) - [j44]Hui Wang, Di Xiao, Xin Chen, Hongyu Huang:
Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process. 144: 444-452 (2018) - [c8]Yong Wang, Zhiqiang Zhang, Nanchuan Cai, Yousheng Zhou, Di Xiao:
A Prediction Model for the Risk of Osteoporosis Fracture in the Elderly Based on a Neural Network. ISNN 2018: 815-823 - 2017
- [j43]Guiqiang Hu, Di Xiao, Tao Xiang, Sen Bai, Yushu Zhang:
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf. Sci. 387: 132-145 (2017) - [j42]Guiqiang Hu, Di Xiao, Yong Wang, Tao Xiang:
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J. Vis. Commun. Image Represent. 44: 116-127 (2017) - [j41]Di Xiao, Yanping Xiang, Hongying Zheng, Yong Wang:
Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J. Vis. Commun. Image Represent. 45: 1-10 (2017) - [j40]Di Xiao, Ying Wang, Tao Xiang, Sen Bai:
High-payload completely reversible data hiding in encrypted images by an interpolation technique. Frontiers Inf. Technol. Electron. Eng. 18(11): 1732-1743 (2017) - [j39]Di Xiao, Yanting Chang, Tao Xiang, Sen Bai:
A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multim. Tools Appl. 76(7): 9265-9296 (2017) - [j38]Bin Liu, Di Xiao, Wei Huang, Heng-Yue Jia, Ting-Ting Song:
Quantum private comparison employing single-photon interference. Quantum Inf. Process. 16(7): 180 (2017) - 2016
- [j37]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Di Xiao, Bin Chen, Xiaofeng Liao:
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions. Int. J. Bifurc. Chaos 26(11): 1650191:1-1650191:15 (2016) - [j36]Di Xiao, Qingqing Fu, Tao Xiang, Yushu Zhang:
Chaotic Image Encryption of Regions of Interest. Int. J. Bifurc. Chaos 26(11): 1650193:1-1650193:15 (2016) - [j35]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao:
Embedding cryptographic features in compressive sensing. Neurocomputing 205: 472-480 (2016) - [j34]Ayesha Kulsoom, Di Xiao, Aqeel-ur Rehman, Syed Ali Abbas:
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multim. Tools Appl. 75(1): 1-23 (2016) - [j33]Hong Liu, Di Xiao, Yunpeng Xiao, Yushu Zhang:
Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multim. Tools Appl. 75(13): 7681-7696 (2016) - [j32]Di Xiao, Hongkun Cai, Yong Wang, Sen Bai:
High-capacity separable data hiding in encrypted image based on compressive sensing. Multim. Tools Appl. 75(21): 13779-13789 (2016) - [j31]Bin Liu, Di Xiao, Heng-Yue Jia, Runzong Liu:
Collusive attacks to "circle-type" multi-party quantum key agreement protocols. Quantum Inf. Process. 15(5): 2113-2124 (2016) - [j30]Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su:
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization. Secur. Commun. Networks 9(1): 43-53 (2016) - [j29]Ming Li, Di Xiao, Hong Liu, Sen Bai:
A recoverable chaos-based fragile watermarking with high PSNR preservation. Secur. Commun. Networks 9(14): 2371-2386 (2016) - [j28]Hong Liu, Di Xiao, Rui Zhang, Yushu Zhang, Sen Bai:
Robust and hierarchical watermarking of encrypted images based on Compressive Sensing. Signal Process. Image Commun. 45: 41-51 (2016) - 2015
- [j27]Yushu Zhang, Di Xiao, Wenying Wen, Hai Nan, Moting Su:
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register. Commun. Nonlinear Sci. Numer. Simul. 27(Issues): 22-29 (2015) - [j26]Di Xiao, Shulei Hu, Hongying Zheng:
A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multim. Tools Appl. 74(6): 2109-2126 (2015) - [j25]Di Xiao, Mimi Deng, Xinyi Zhu:
A reversible image authentication scheme based on compressive sensing. Multim. Tools Appl. 74(18): 7729-7752 (2015) - [j24]Jiyun Yang, Tao Xiang, Di Xiao:
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks. Multim. Tools Appl. 74(23): 10873-10881 (2015) - [j23]Ming Li, Di Xiao, Yushu Zhang, Hai Nan:
Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process. Image Commun. 39: 234-248 (2015) - 2014
- [j22]Tao Xiang, Jinyu Qu, Di Xiao:
Joint SPIHT compression and selective encryption. Appl. Soft Comput. 21: 159-170 (2014) - [j21]Yushu Zhang, Di Xiao:
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1): 74-82 (2014) - [j20]Yushu Zhang, Di Xiao, Hong Liu, Hai Nan:
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption. Commun. Nonlinear Sci. Numer. Simul. 19(5): 1366-1374 (2014) - [j19]Yushu Zhang, Di Xiao, Wenying Wen, Kwok-Wo Wong:
On the security of symmetric ciphers based on DNA coding. Inf. Sci. 289: 254-261 (2014) - [j18]Yushu Zhang, Di Xiao, Wenying Wen, Ming Li:
Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multim. Tools Appl. 73(3): 1885-1896 (2014) - [j17]Ming Li, Di Xiao, Yushu Zhang, Hong Liu:
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images. Signal Process. 99: 17-28 (2014) - [i2]Yushu Zhang, Kwok-Wo Wong, Di Xiao, Leo Yu Zhang, Ming Li:
Embedding Cryptographic Features in Compressive Sensing. CoRR abs/1403.6213 (2014) - [i1]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Di Xiao:
Robust Coding of Encrypted Images via Structural Matrix. CoRR abs/1405.6843 (2014) - 2013
- [j16]Xi Shi, Di Xiao:
A reversible watermarking authentication scheme for wireless sensor networks. Inf. Sci. 240: 173-183 (2013) - [j15]Yantao Li, Di Xiao, Shaojiang Deng, Gang Zhou:
Improvement and performance analysis of a novel hash function based on chaotic neural network. Neural Comput. Appl. 22(2): 391-402 (2013) - [j14]Yushu Zhang, Di Xiao, Yonglu Shu, Jing Li:
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process. Image Commun. 28(3): 292-300 (2013) - [j13]Yantao Li, Xin Qi, Matthew Keally, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks. IEEE Trans. Parallel Distributed Syst. 24(9): 1741-1751 (2013) - [j12]Yantao Li, Daniel Graham, Gang Zhou, Xin Qi, Shaojiang Deng, Di Xiao:
Discrete-time Markov Model for Wireless Link Burstiness Simulations. Wirel. Pers. Commun. 72(2): 987-1004 (2013) - [c7]Jiyun Yang, Rui Zhang, Di Xiao:
Analysis and Improvement of an Efficient and Secure Key Agreement Protocol. CIS 2013: 528-532 - 2012
- [j11]Chunqiang Hu, Xiaofeng Liao, Di Xiao:
Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem. Int. J. Wavelets Multiresolution Inf. Process. 10(3) (2012) - [j10]Yantao Li, Di Xiao, Shaojiang Deng:
Keyed hash function based on a dynamic lookup table of functions. Inf. Sci. 214: 56-75 (2012) - [j9]Yantao Li, Di Xiao, Huaqing Li, Shaojiang Deng:
Parallel chaotic Hash function construction based on cellular neural network. Neural Comput. Appl. 21(7): 1563-1573 (2012) - [c6]Yantao Li, Ge Peng, Xin Qi, Gang Zhou, Di Xiao, Shaojiang Deng, Hongyu Huang:
Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks. NAS 2012: 235-244 - 2011
- [j8]Yantao Li, Shaojiang Deng, Di Xiao:
A novel Hash algorithm construction based on chaotic neural network. Neural Comput. Appl. 20(1): 133-141 (2011) - [j7]Yantao Li, Di Xiao, Shaojiang Deng, Qi Han, Gang Zhou:
Parallel Hash function construction based on chaotic maps with changeable parameters. Neural Comput. Appl. 20(8): 1305-1312 (2011) - [c5]Yantao Li, Xin Qi, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks. IPCCC 2011: 1-8 - [p1]Di Xiao, Xiaofeng Liao, Shaojiang Deng:
Chaos Based Hash Function. Chaos-Based Cryptography 2011: 137-203 - 2010
- [c4]Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai:
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. IWDW 2010: 45-59
2000 – 2009
- 2009
- [j6]Di Xiao, Xiaofeng Liao, Yong Wang:
Parallel keyed hash function construction based on chaotic neural network.