Di Xiao

From MaRDI portal
Person:296138

Available identifiers

zbMath Open xiao.diMaRDI QIDQ296138

List of research outcomes





PublicationDate of PublicationType
Normalized solutions for critical Schrödinger-Poisson system involving \(p\)-Laplacian in \(\mathbb{R}^3\)2025-01-06Paper
Three-level quantum image encryption based on Arnold transform and logistic map2023-02-16Paper
Quantum image encryption algorithm based on bit-plane permutation and sine logistic map2023-02-03Paper
Submodular maximization over data streams with differential privacy noise2023-01-30Paper
Quantum identity authentication in the orthogonal-state-encoding QKD system2022-11-25Paper
Streaming submodular maximization under differential privacy noise2022-06-29Paper
Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer2021-11-30Paper
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register2020-09-10Paper
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption2020-02-24Paper
A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud2020-02-06Paper
A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing2019-06-21Paper
https://portal.mardi4nfdi.de/entity/Q53818712019-06-21Paper
Multimodality image fusion based on quantum wavelet transform and sum-modified-Laplacian rule2019-05-03Paper
Graph based and multifractal analysis of financial time series model by continuum percolation2018-09-24Paper
Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion2017-11-24Paper
Quantum private comparison employing single-photon interference2017-10-25Paper
Physical Effects of Geometric Phases2017-10-20Paper
Processing consistency in non-Bayesian inference2017-06-15Paper
On the security of symmetric ciphers based on DNA coding2017-02-08Paper
A block compressive sensing based scalable encryption framework for protecting significant image regions2016-12-01Paper
Chaotic image encryption of regions of interest2016-12-01Paper
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion2016-09-13Paper
Collusive attacks to ``circle-type multi-party quantum key agreement protocols2016-06-14Paper
First-principles calculation of \(Z_2\) topological invariants within the FP-LAPW2014-12-17Paper
https://portal.mardi4nfdi.de/entity/Q49021022013-01-24Paper
Hash function construction based on the chaotic look-up table with changeable parameter2012-10-02Paper
Secret image sharing based on chaotic map and Chinese remainder theorem2012-08-22Paper
Berry phase effects on electronic properties2012-07-27Paper
Collision analysis of one kind of chaos-based hash function2012-04-30Paper
Improving the security of a parallel keyed hash function based on chaotic maps2012-03-28Paper
A chaos-based hash function with both modification detection and localization capabilities2011-10-13Paper
Corrigendum to ``Analysis and improvement of a chaos-based hash function construction2011-10-13Paper
Parallel keyed hash function construction based on chaotic maps2011-09-27Paper
A novel combined cryptographic and hash algorithm based on chaotic control character2011-09-23Paper
Analysis and improvement of a chaos-based hash function construction2011-09-23Paper
Parallel hash function construction based on coupled map lattices2011-09-23Paper
Cryptanalysis of a chaos block cipher for wireless sensor network2011-09-23Paper
Chaos Based Hash Function2011-09-07Paper
Analysis and improvement of a hash-based image encryption algorithm2011-07-13Paper
Analysis and improvement of a chaos-based image encryption algorithm2010-11-04Paper
Adaptive synchronization of GLHS with unknown parameters2010-05-31Paper
Generalization rough set theory and real-valued attributes reduction2010-02-20Paper
https://portal.mardi4nfdi.de/entity/Q34027402010-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36223332009-04-28Paper
Real Rough Set Theory and Attribute Reduction2008-04-04Paper
One-way hash function construction based on 2D coupled map lattices2008-03-12Paper
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol2008-03-12Paper
A region and gradient based active contour model and its application in boundary tracking on anal canal ultrasound images2007-09-14Paper
Ellipsoidal basis functional neural network based on rough \(K\)-means2007-01-04Paper
Advances in Neural Networks – ISNN 20052005-11-23Paper
Advances in Neural Networks – ISNN 20052005-11-23Paper
One-way hash function construction based on the chaotic map with changeable-parameter2005-05-04Paper
https://portal.mardi4nfdi.de/entity/Q52029291991-01-01Paper

Research outcomes over time

This page was built for person: Di Xiao