


Остановите войну!
for scientists:


default search action
Yushu Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j149]Ruoyu Zhao, Yushu Zhang, Shimin Li, Wenying Wen, Shuang Yi, Rushi Lan:
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system. Expert Syst. Appl. 238(Part E): 122140 (2024) - [j148]Xingxin Li, Youwen Zhu, Rui Xu, Jian Wang, Yushu Zhang:
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query. Frontiers Comput. Sci. 18(1): 181803 (2024) - [j147]Youwen Zhu, Yiran Cao, Qiao Xue, Qihui Wu, Yushu Zhang:
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 19: 414-426 (2024) - [j146]Wenying Wen
, Minghui Huang
, Yushu Zhang
, Yuming Fang
, Yifan Zuo
:
Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 25:1-25:15 (2024) - 2023
- [j145]Yinjing Wang, Xiuli Chai, Zhihua Gan
, Yushu Zhang, Xiuhui Chen, Xin He:
TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding. Appl. Intell. 53(4): 4027-4046 (2023) - [j144]Mingfu Xue
, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples. Appl. Intell. 53(6): 7298-7309 (2023) - [j143]Mingfu Xue
, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-resistant backdoor attack against deep neural networks. Appl. Intell. 53(17): 20402-20417 (2023) - [j142]Qin Tao, Shuowen Zhang, Caijun Zhong, Yushu Zhang:
Joint information transmission design for intelligent reflecting surface aided system with discrete phase shifts. Sci. China Inf. Sci. 66(3) (2023) - [j141]Miao Tian
, Yushu Zhang, Youwen Zhu, Liangmin Wang, Yong Xiang:
DIVRS: Data integrity verification based on ring signature in cloud storage. Comput. Secur. 124: 103002 (2023) - [j140]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. ACM Comput. Surv. 55(2): 1:1-1:35 (2023) - [j139]Tao Wang
, Yushu Zhang, Ruoyu Zhao:
Face Database Protection via Beautification with Chaotic Systems. Entropy 25(4): 566 (2023) - [j138]Moting Su
, Wenjie Zhao
, Ye Zhu
, Donglan Zha
, Yushu Zhang
, Peng Xu
:
Anomaly detection of vectorized time series on aircraft battery data. Expert Syst. Appl. 227: 120219 (2023) - [j137]Dezhi An, Dawei Hao
, Ruoyu Zhao
, Shengcai Zhang
, Jun Lu, Yushu Zhang:
Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation. Expert Syst. Appl. 233: 120931 (2023) - [j136]Yao Zhang, Yushu Zhang, Yan Wu
, Frank Krueger:
Default Matters in Trust and Reciprocity. Games 14(1): 8 (2023) - [j135]Mingfu Xue
, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - [j134]Ruoyu Zhao
, Yushu Zhang
, Rushi Lan
, Zhongyun Hua
, Yong Xiang
:
Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT. IEEE Internet Things J. 10(3): 2630-2645 (2023) - [j133]Xiuli Chai
, Jiangyu Fu
, Zhihua Gan
, Yang Lu, Yushu Zhang
, Daojun Han:
Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission. IEEE Internet Things J. 10(8, April 15): 7380-7392 (2023) - [j132]Mingfu Xue
, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu
:
Detecting backdoor in deep neural networks via intentional adversarial perturbations. Inf. Sci. 634: 564-577 (2023) - [j131]Miao Tian, Yushu Zhang, Youwen Zhu, Wei Wang, Qihui Wu, Yong Xiang:
BPPIR: Blockchain-assisted privacy-preserving similarity image retrieval over multiple clouds. J. King Saud Univ. Comput. Inf. Sci. 35(1): 324-334 (2023) - [j130]Dezhi An, Dawei Hao
, Ruoyu Zhao, Jun Lu, Yan Li, Yushu Zhang:
A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system. J. King Saud Univ. Comput. Inf. Sci. 35(2): 576-589 (2023) - [j129]Xiuli Chai
, Xiuhui Chen, Yakun Ma, Fang Zuo
, Zhihua Gan
, Yushu Zhang:
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion. Frontiers Inf. Technol. Electron. Eng. 24(8): 1169-1180 (2023) - [j128]Wenying Wen, Yunpeng Jian, Yuming Fang, Yushu Zhang, Baolin Qiu:
Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework. Multim. Syst. 29(2): 831-845 (2023) - [j127]Wenying Wen, Rongxin Tu, Yushu Zhang, Yuming Fang, Yong Yang:
A multi-level approach with visual information for encrypted H.265/HEVC videos. Multim. Syst. 29(3): 1073-1087 (2023) - [j126]Shuren Qi
, Yushu Zhang
, Chao Wang
, Jiantao Zhou
, Xiaochun Cao
:
A Principled Design of Image Representation: Towards Forensic Tasks. IEEE Trans. Pattern Anal. Mach. Intell. 45(5): 5337-5354 (2023) - [j125]Tao Wang
, Yushu Zhang
, Ruoyu Zhao
, Wenying Wen
, Rushi Lan
:
Identifiable Face Privacy Protection via Virtual Identity Transformation. IEEE Signal Process. Lett. 30: 773-777 (2023) - [j124]Xi Ye
, Yushu Zhang
, Xiangli Xiao
, Shuang Yi
, Rushi Lan
:
Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images. IEEE Signal Process. Lett. 30: 793-797 (2023) - [j123]Wentao Zhou
, Yushu Zhang
, Ruoyu Zhao
, Shuang Yi
, Rushi Lan
:
Adversarial Thumbnail-Preserving Transformation for Facial Images Based on GAN. IEEE Signal Process. Lett. 30: 1147-1151 (2023) - [j122]Juan Zhao
, Tianrui Zong, Yong Xiang
, Longxiang Gao
, Guang Hua
, Keshav Sood
, Yushu Zhang
:
SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals. IEEE ACM Trans. Audio Speech Lang. Process. 31: 448-461 (2023) - [j121]Yushu Zhang
, Zhibin Fu, Shuren Qi
, Mingfu Xue
, Zhongyun Hua
, Yong Xiang
:
Localization of Inpainting Forgery With Feature Enhancement Network. IEEE Trans. Big Data 9(3): 936-948 (2023) - [j120]Hong Liu
, Xiaojing Lu, Shengchen Duan, Yushu Zhang
, Yong Xiang
:
An Efficient Oblivious Random Data Access Scheme in Cloud Computing. IEEE Trans. Cloud Comput. 11(2): 1940-1953 (2023) - [j119]Yushu Zhang
, Jiajia Jiang
, Xuewen Dong
, Liangmin Wang
, Yong Xiang
:
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation. IEEE Trans. Cloud Comput. 11(3): 2273-2284 (2023) - [j118]Xuewen Dong
, Lingtao Xue
, Zhiwei Zhang
, Yushu Zhang
, Teng Li
, Zhichao You
, Yulong Shen
:
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control. IEEE Trans. Cloud Comput. 11(3): 3139-3152 (2023) - [j117]Xinyu Gao, Jun Mou
, Santo Banerjee, Yushu Zhang
:
Color-Gray Multi-Image Hybrid Compression-Encryption Scheme Based on BP Neural Network and Knight Tour. IEEE Trans. Cybern. 53(8): 5037-5047 (2023) - [j116]Mingfu Xue
, Chengxiang Yuan, Can He
, Yinghao Wu, Zhiyu Wu, Yushu Zhang
, Zhe Liu
, Weiqiang Liu
:
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks. IEEE Trans. Emerg. Top. Comput. 11(1): 153-169 (2023) - [j115]Mingfu Xue
, Zhiyu Wu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - [j114]Chao Wang
, Zhiqiu Huang
, Shuren Qi
, Yaoshen Yu
, Guohua Shen
, Yushu Zhang
:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. IEEE Trans. Inf. Forensics Secur. 18: 1064-1079 (2023) - [j113]Yushu Zhang
, Tao Wang
, Ruoyu Zhao
, Wenying Wen
, Youwen Zhu
:
RAPP: Reversible Privacy Preservation for Various Face Attributes. IEEE Trans. Inf. Forensics Secur. 18: 3074-3087 (2023) - [j112]Yushu Zhang
, Xi Ye
, Xiangli Xiao
, Tao Xiang
, Hongwei Li
, Xiaochun Cao
:
A Reversible Framework for Efficient and Secure Visual Privacy Protection. IEEE Trans. Inf. Forensics Secur. 18: 3334-3349 (2023) - [j111]Yushu Zhang
, Wentao Zhou, Ruoyu Zhao
, Xinpeng Zhang
, Xiaochun Cao:
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption. IEEE Trans. Multim. 25: 5877-5891 (2023) - [j110]Xiangli Xiao
, Yushu Zhang
, Youwen Zhu
, Pengfei Hu
, Xiaochun Cao
:
FingerChain: Copyrighted Multi-Owner Media Sharing by Introducing Asymmetric Fingerprinting Into Blockchain. IEEE Trans. Netw. Serv. Manag. 20(3): 2869-2885 (2023) - [j109]Yushu Zhang
, Qing Tan
, Shuren Qi
, Mingfu Xue
:
PRNU-based Image Forgery Localization with Deep Multi-scale Fusion. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 67:1-67:20 (2023) - [j108]Yushu Zhang
, Nuo Chen
, Shuren Qi
, Mingfu Xue
, Zhongyun Hua
:
Detection of Recolored Image by Texture Features in Chrominance Components. ACM Trans. Multim. Comput. Commun. Appl. 19(3): 121:1-121:23 (2023) - [j107]Xiangli Xiao
, Yushu Zhang
, Xuewen Dong
, Liangmin Wang
, Yong Xiang
, Xiaochun Cao:
Fair Outsourcing Paid in Fiat Money Using Blockchain. IEEE Trans. Serv. Comput. 16(3): 1860-1873 (2023) - [j106]Yao Zhao
, Youyang Qu
, Yong Xiang
, Yushu Zhang
, Longxiang Gao
:
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT. IEEE Trans. Serv. Comput. 16(4): 2343-2358 (2023) - [c27]Yushu Zhang, Gang Li, Xiao-Ping Zhang, You He:
Transformer-based tracking Network for Maneuvering Targets. ICASSP 2023: 1-5 - [c26]Zeming Hou, Zhongyun Hua, Kuiyuan Zhang, Yushu Zhang:
CDNet: Cluster Decision for Deepfake Detection Generalization. ICIP 2023: 3010-3014 - [i33]Shuren Qi, Yushu Zhang, Chao Wang, Tao Xiang, Xiaochun Cao, Yong Xiang:
Representing Noisy Image Without Denoising. CoRR abs/2301.07409 (2023) - [i32]Ruoyu Zhao, Yushu Zhang, Tao Wang, Wenying Wen, Yong Xiang, Xiaochun Cao:
Visual Content Privacy Protection: A Survey. CoRR abs/2303.16552 (2023) - [i31]Chao Wang, Shuren Qi, Zhiqiu Huang, Yushu Zhang, Xiaochun Cao:
Towards an Accurate and Secure Detector against Adversarial Perturbations. CoRR abs/2305.10856 (2023) - [i30]Tao Wang, Yushu Zhang, Zixuan Yang, Hua Zhang, Zhongyun Hua:
Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection. CoRR abs/2307.00481 (2023) - [i29]Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng:
Security and Privacy on Generative Data in AIGC: A Survey. CoRR abs/2309.09435 (2023) - [i28]Mingfu Xue, Leo Yu Zhang, Yushu Zhang, Weiqiang Liu:
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models. CoRR abs/2310.09822 (2023) - 2022
- [j105]Mingfu Xue
, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication. Appl. Intell. 52(14): 16497-16511 (2022) - [j104]Fangcheng Tang, Yushu Zhang, Jun Wang:
How do enterprises determine which breakthrough invention should be commercialized? A multiple attribute group decision-making-based method. Comput. Appl. Math. 41(8) (2022) - [j103]Mingfu Xue
, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. Comput. Secur. 118: 102726 (2022) - [j102]Eko N. Onggosanusi, Min Zhang, Yushu Zhang, Jiwon Kang:
Enhancing 5G MIMO Core Spectral Efficiency with Higher-Resolution Multi-User MIMO and Multi-Beam Operation. IEEE Commun. Stand. Mag. 6(1): 20-26 (2022) - [j101]Dan Wang, Ming Li, Yushu Zhang:
Adversarial Data Hiding in Digital Images. Entropy 24(6): 749 (2022) - [j100]Xiuli Chai
, Yinjing Wang, Zhihua Gan, Xiuhui Chen, Yushu Zhang:
Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud. Inf. Sci. 604: 115-141 (2022) - [j99]Hong Liu, Yushu Zhang, Yong Xiang, Bo Liu, ErChuan Guo:
Multi-user image retrieval with suppression of search pattern leakage. Inf. Sci. 607: 1041-1060 (2022) - [j98]Ruoyu Zhao, Yushu Zhang, Yu Nan, Wenying Wen, Xiuli Chai, Rushi Lan:
Primitively visually meaningful image encryption: A new paradigm. Inf. Sci. 613: 628-648 (2022) - [j97]Ye Zhu, Ruoyu Zhao, Yushu Zhang, Xiangli Xiao, Rushi Lan, Yong Xiang:
Noise-free thumbnail-preserving image encryption based on MSB prediction. Inf. Sci. 617: 395-415 (2022) - [j96]Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Rushi Lan, Xiuli Chai:
High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2993-3010 (2022) - [j95]Jiajia Jiang
, Yushu Zhang, Youwen Zhu, Xuewen Dong, Liangmin Wang, Yong Xiang:
DCIV: Decentralized cross-chain data integrity verification with blockchain. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 7988-7999 (2022) - [j94]Xi Ye
, Yushu Zhang, Ruoyu Zhao
, Rushi Lan, Yong Xiang
:
PRA-TPE: Perfectly Recoverable Approximate Thumbnail-Preserving Image Encryption. J. Vis. Commun. Image Represent. 87: 103589 (2022) - [j93]Xiuli Chai
, Yinjing Wang
, Xiuhui Chen, Zhihua Gan
, Yushu Zhang
:
TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key. IEEE Signal Process. Lett. 29: 972-976 (2022) - [j92]Mingfu Xue
, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations. IEEE Trans. Artif. Intell. 3(6): 908-923 (2022) - [j91]Zhitong He
, Kewu Peng
, Jian Song
, Yushu Zhang
:
Sliding Window Decoding for QC-SC-LDPC Codes Under the Constraint of Implementation Complexity. IEEE Trans. Broadcast. 68(2): 305-316 (2022) - [j90]Yushu Zhang
, Ruoyu Zhao, Xiangli Xiao
, Rushi Lan
, Zhe Liu
, Xinpeng Zhang
:
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption. IEEE Trans. Circuits Syst. Video Technol. 32(3): 947-961 (2022) - [j89]Yushu Zhang
, Hongbo Lin
, Yue Li
, Haitao Ma
, Guijin Yao
:
Low-Frequency Seismic Noise Reduction Based on Deep Complex Reaction-Diffusion Model. IEEE Trans. Geosci. Remote. Sens. 60: 1-14 (2022) - [j88]Xuewen Dong
, Wen Zhang
, Yushu Zhang
, Zhichao You
, Sheng Gao
, Yulong Shen
, Chao Wang:
Optimizing Task Location Privacy in Mobile Crowdsensing Systems. IEEE Trans. Ind. Informatics 18(4): 2762-2772 (2022) - [j87]Mohammad Belayet Hossain
, Iynkaran Natgunanathan
, Yong Xiang
, Yushu Zhang
:
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices. IEEE Trans. Serv. Comput. 15(5): 2648-2657 (2022) - [c25]Yinghao Wu, Mingfu Xue, Dujuan Gu, Yushu Zhang, Weiqiang Liu:
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks. AICAS 2022: 316-319 - [c24]Qing Tan, Shuren Qi, Yushu Zhang, Mingfu Xue:
PRNU-based Image Forgery Localization With Convolutional Neural Network. MMSP 2022: 1-6 - [i27]Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Compression-Resistant Backdoor Attack against Deep Neural Networks. CoRR abs/2201.00672 (2022) - [i26]Mingfu Xue, Shifeng Ni, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks. CoRR abs/2201.13164 (2022) - [i25]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Principled Design of Image Representation: Towards Forensic Tasks. CoRR abs/2203.00913 (2022) - [i24]Ruoyu Zhao, Yushu Zhang, Youwen Zhu, Rushi Lan, Zhongyun Hua:
Metaverse: Security and Privacy Concerns. CoRR abs/2203.03854 (2022) - [i23]Yushu Zhang, Nuo Chen, Shuren Qi, Mingfu Xue, Xiaochun Cao:
Detecting Recolored Image by Spatial Correlation. CoRR abs/2204.10973 (2022) - [i22]Kuiyuan Zhang, Zhongyun Hua, Yuanman Li, Yushu Zhang, Yicong Zhou:
Uformer-ICS: A Specialized U-Shaped Transformer for Image Compressive Sensing. CoRR abs/2209.01763 (2022) - [i21]Yushu Zhang, Jiahao Zhu, Mingfu Xue, Xinpeng Zhang, Xiaochun Cao:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. CoRR abs/2209.08884 (2022) - [i20]Mingfu Xue, Xin Wang, Yinghao Wu, Shifeng Ni, Yushu Zhang, Weiqiang Liu:
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features. CoRR abs/2210.07481 (2022) - 2021
- [j86]Akanksha Saini
, Qingyi Zhu
, Navneet Singh
, Yong Xiang
, Longxiang Gao
, Yushu Zhang
:
A Smart-Contract-Based Access Control Framework for Cloud Smart Healthcare System. IEEE Internet Things J. 8(7): 5914-5925 (2021) - [j85]Xiuli Chai, Haiyang Wu, Zhihua Gan, Daojun Han, Yushu Zhang, Yiran Chen:
An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf. Sci. 556: 305-340 (2021) - [j84]Ye Tian, Xiuli Chai, Zhihua Gan, Yang Lu, Yushu Zhang, Shiping Song:
SWDGAN: GAN-based sampling and whole image denoising network for compressed sensing image reconstruction. J. Electronic Imaging 30(6) (2021) - [j83]Ming Li
, Hua Ren, Yong Xiang
, Yushu Zhang:
Reversible data hiding in encrypted color images using cross-channel correlations. J. Vis. Commun. Image Represent. 78: 103166 (2021) - [j82]Wenjie Zhao
, Yushu Zhang
, Ye Zhu
, Peng Xu
:
Anomaly detection of aircraft lead-acid battery. Qual. Reliab. Eng. Int. 37(3): 1186-1197 (2021) - [j81]Ruoyu Zhao
, Yushu Zhang, Xiangli Xiao
, Xi Ye, Rushi Lan:
TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption. Signal Process. 183: 108019 (2021) - [j80]Xiuli Chai
, Xiangcheng Zhi, Zhihua Gan
, Yushu Zhang, Yiran Chen, Jiangyu Fu:
Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. 183: 108041 (2021) - [j79]Jiahao Zhu, Yushu Zhang
, Xinpeng Zhang
, Xiaochun Cao:
Gaussian Model for 3D Mesh Steganography. IEEE Signal Process. Lett. 28: 1729-1733 (2021) - [j78]Yushu Zhang
, Jiantao Zhou
, Yong Xiang
, Leo Yu Zhang
, Fei Chen
, Shaoning Pang
, Xiaofeng Liao
:
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds. IEEE Trans. Big Data 7(4): 717-728 (2021) - [j77]Wenying Wen
, Kangkang Wei, Yuming Fang, Yushu Zhang
:
Visual Quality Assessment for Perceptually Encrypted Light Field Images. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2522-2534 (2021) - [j76]Yushu Zhang
, Ping Wang
, Hui Huang
, Youwen Zhu
, Di Xiao
, Yong Xiang
:
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Trans. Ind. Informatics 17(5): 3401-3411 (2021) - [j75]Lu-Xing Yang
, Kaifan Huang
, Xiaofan Yang
, Yushu Zhang
, Yong Xiang
, Yuan Yan Tang:
Defense Against Advanced Persistent Threat Through Data Backup and Recovery. IEEE Trans. Netw. Sci. Eng. 8(3): 2001-2013 (2021) - [j74]Wei Wang
, Junyang Chen, Yushu Zhang, Zhiguo Gong, Neeraj Kumar
, Wei Wei:
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction. ACM Trans. Internet Techn. 21(4): 106:1-106:13 (2021) - [c23]Shichang Sun, Haoqi Wang, Mingfu Xue, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks. ISC 2021: 341-357 - [i19]Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples. CoRR abs/2103.01527 (2021) - [i18]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. CoRR abs/2103.14799 (2021) - [i17]Yushu Zhang, Xiangli Xiao
, Leo Yu Zhang
, Zhe Liu, Jiwu Huang:
CREAMS: Copyrighted Cloud Media Sharing. CoRR abs/2105.08899 (2021) - [i16]Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. CoRR abs/2105.13697 (2021) - [i15]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. CoRR abs/2105.14259 (2021) - [i14]Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detect and remove watermark in deep neural networks via generative adversarial networks. CoRR abs/2106.08104 (2021) - [i13]Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Protect the Intellectual Property of Dataset against Unauthorized Use. CoRR abs/2109.07921 (2021) - 2020
- [j73]Mingfu Xue
, Chengxiang Yuan, Heyi Wu, Yushu Zhang, Weiqiang Liu
:
Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access 8: 74720-74742 (2020) - [j72]Feiyi Xu, Chi-Man Pun
, Haolun Li, Yushu Zhang, Yurong Song, Hao Gao
:
Training Feed-Forward Artificial Neural Networks with a modified artificial bee colony algorithm. Neurocomputing 416: 69-84 (2020) - [j71]Yushu Zhang, Jin Jiang
, Yong Xiang
, Ye Zhu
, Liangtian Wan, Xiyuan Xie:
Cloud-assisted privacy-conscious large-scale Markowitz portfolio. Inf. Sci. 527: 548-559 (2020) - [j70]