| Publication | Date of Publication | Type |
|---|
Normalized solutions for critical Schrödinger-Poisson system involving \(p\)-Laplacian in \(\mathbb{R}^3\) ZAMP. Zeitschrift für angewandte Mathematik und Physik | 2025-01-06 | Paper |
Three-level quantum image encryption based on Arnold transform and logistic map Quantum Information Processing | 2023-02-16 | Paper |
Quantum image encryption algorithm based on bit-plane permutation and sine logistic map Quantum Information Processing | 2023-02-03 | Paper |
Submodular maximization over data streams with differential privacy noise Theoretical Computer Science | 2023-01-30 | Paper |
Quantum identity authentication in the orthogonal-state-encoding QKD system Quantum Information Processing | 2022-11-25 | Paper |
Streaming submodular maximization under differential privacy noise | 2022-06-29 | Paper |
Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer Information Sciences | 2021-11-30 | Paper |
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register Communications in Nonlinear Science and Numerical Simulation | 2020-09-10 | Paper |
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption Communications in Nonlinear Science and Numerical Simulation | 2020-02-24 | Paper |
A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud Information Sciences | 2020-02-06 | Paper |
A verifiable secret image sharing scheme based on compressive sensing Wuhan University Journal of Natural Sciences | 2019-06-21 | Paper |
Pricing strategy for supply chain considering horizontal competition under C2B mode | 2019-06-21 | Paper |
Multimodality image fusion based on quantum wavelet transform and sum-modified-Laplacian rule International Journal of Theoretical Physics | 2019-05-03 | Paper |
Graph based and multifractal analysis of financial time series model by continuum percolation International Journal of Nonlinear Sciences and Numerical Simulation | 2018-09-24 | Paper |
Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion Nonlinear Dynamics | 2017-11-24 | Paper |
Quantum private comparison employing single-photon interference Quantum Information Processing | 2017-10-25 | Paper |
Physical effects of geometric phases | 2017-10-20 | Paper |
Processing consistency in non-Bayesian inference Journal of Mathematical Economics | 2017-06-15 | Paper |
On the security of symmetric ciphers based on DNA coding Information Sciences | 2017-02-08 | Paper |
A block compressive sensing based scalable encryption framework for protecting significant image regions International Journal of Bifurcation and Chaos in Applied Sciences and Engineering | 2016-12-01 | Paper |
Chaotic image encryption of regions of interest International Journal of Bifurcation and Chaos in Applied Sciences and Engineering | 2016-12-01 | Paper |
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion Communications in Nonlinear Science and Numerical Simulation | 2016-09-13 | Paper |
Collusive attacks to ``circle-type multi-party quantum key agreement protocols Quantum Information Processing | 2016-06-14 | Paper |
First-principles calculation of \(Z_2\) topological invariants within the FP-LAPW Computer Physics Communications | 2014-12-17 | Paper |
An image encryption algorithm based on the synchronization of permutation and diffusion | 2013-01-24 | Paper |
Hash function construction based on the chaotic look-up table with changeable parameter International Journal of Modern Physics B | 2012-10-02 | Paper |
Secret image sharing based on chaotic map and Chinese remainder theorem International Journal of Wavelets, Multiresolution and Information Processing | 2012-08-22 | Paper |
Berry phase effects on electronic properties Reviews of Modern Physics | 2012-07-27 | Paper |
Collision analysis of one kind of chaos-based hash function Physics Letters. A | 2012-04-30 | Paper |
Improving the security of a parallel keyed hash function based on chaotic maps Physics Letters. A | 2012-03-28 | Paper |
A chaos-based hash function with both modification detection and localization capabilities Communications in Nonlinear Science and Numerical Simulation | 2011-10-13 | Paper |
Corrigendum to ``Analysis and improvement of a chaos-based hash function construction Communications in Nonlinear Science and Numerical Simulation | 2011-10-13 | Paper |
Parallel keyed hash function construction based on chaotic maps Physics Letters. A | 2011-09-27 | Paper |
A novel combined cryptographic and hash algorithm based on chaotic control character Communications in Nonlinear Science and Numerical Simulation | 2011-09-23 | Paper |
Analysis and improvement of a chaos-based hash function construction Communications in Nonlinear Science and Numerical Simulation | 2011-09-23 | Paper |
Parallel hash function construction based on coupled map lattices Communications in Nonlinear Science and Numerical Simulation | 2011-09-23 | Paper |
Cryptanalysis of a chaos block cipher for wireless sensor network Communications in Nonlinear Science and Numerical Simulation | 2011-09-23 | Paper |
Chaos Based Hash Function Studies in Computational Intelligence | 2011-09-07 | Paper |
Analysis and improvement of a hash-based image encryption algorithm Communications in Nonlinear Science and Numerical Simulation | 2011-07-13 | Paper |
Analysis and improvement of a chaos-based image encryption algorithm Chaos, Solitons and Fractals | 2010-11-04 | Paper |
Adaptive synchronization of GLHS with unknown parameters International Journal of Circuit Theory and Applications | 2010-05-31 | Paper |
Generalization rough set theory and real-valued attributes reduction Journal of Computer Applications | 2010-02-20 | Paper |
The stock competition policy between supply chains under demand uncertainty | 2010-02-12 | Paper |
scientific article; zbMATH DE number 5548274 (Why is no real title available?) | 2009-04-28 | Paper |
Real Rough Set Theory and Attribute Reduction ACTA AUTOMATICA SINICA | 2008-04-04 | Paper |
One-way hash function construction based on 2D coupled map lattices Information Sciences | 2008-03-12 | Paper |
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol Information Sciences | 2008-03-12 | Paper |
A region and gradient based active contour model and its application in boundary tracking on anal canal ultrasound images Pattern Recognition | 2007-09-14 | Paper |
Ellipsoidal basis functional neural network based on rough \(K\)-means | 2007-01-04 | Paper |
Advances in Neural Networks – ISNN 2005 Lecture Notes in Computer Science | 2005-11-23 | Paper |
Advances in Neural Networks – ISNN 2005 Lecture Notes in Computer Science | 2005-11-23 | Paper |
One-way hash function construction based on the chaotic map with changeable-parameter Chaos, Solitons and Fractals | 2005-05-04 | Paper |
scientific article; zbMATH DE number 4197886 (Why is no real title available?) | 1991-01-01 | Paper |