| Publication | Date of Publication | Type |
|---|
| Normalized solutions for critical Schrödinger-Poisson system involving \(p\)-Laplacian in \(\mathbb{R}^3\) | 2025-01-06 | Paper |
| Three-level quantum image encryption based on Arnold transform and logistic map | 2023-02-16 | Paper |
| Quantum image encryption algorithm based on bit-plane permutation and sine logistic map | 2023-02-03 | Paper |
| Submodular maximization over data streams with differential privacy noise | 2023-01-30 | Paper |
| Quantum identity authentication in the orthogonal-state-encoding QKD system | 2022-11-25 | Paper |
| Streaming submodular maximization under differential privacy noise | 2022-06-29 | Paper |
| Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer | 2021-11-30 | Paper |
| Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register | 2020-09-10 | Paper |
| GLS coding based security solution to JPEG with the structure of aggregated compression and encryption | 2020-02-24 | Paper |
| A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud | 2020-02-06 | Paper |
| A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing | 2019-06-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5381871 | 2019-06-21 | Paper |
| Multimodality image fusion based on quantum wavelet transform and sum-modified-Laplacian rule | 2019-05-03 | Paper |
| Graph based and multifractal analysis of financial time series model by continuum percolation | 2018-09-24 | Paper |
| Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion | 2017-11-24 | Paper |
| Quantum private comparison employing single-photon interference | 2017-10-25 | Paper |
| Physical Effects of Geometric Phases | 2017-10-20 | Paper |
| Processing consistency in non-Bayesian inference | 2017-06-15 | Paper |
| On the security of symmetric ciphers based on DNA coding | 2017-02-08 | Paper |
| A block compressive sensing based scalable encryption framework for protecting significant image regions | 2016-12-01 | Paper |
| Chaotic image encryption of regions of interest | 2016-12-01 | Paper |
| An image encryption scheme based on rotation matrix bit-level permutation and block diffusion | 2016-09-13 | Paper |
| Collusive attacks to ``circle-type multi-party quantum key agreement protocols | 2016-06-14 | Paper |
| First-principles calculation of \(Z_2\) topological invariants within the FP-LAPW | 2014-12-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4902102 | 2013-01-24 | Paper |
| Hash function construction based on the chaotic look-up table with changeable parameter | 2012-10-02 | Paper |
| Secret image sharing based on chaotic map and Chinese remainder theorem | 2012-08-22 | Paper |
| Berry phase effects on electronic properties | 2012-07-27 | Paper |
| Collision analysis of one kind of chaos-based hash function | 2012-04-30 | Paper |
| Improving the security of a parallel keyed hash function based on chaotic maps | 2012-03-28 | Paper |
| A chaos-based hash function with both modification detection and localization capabilities | 2011-10-13 | Paper |
| Corrigendum to ``Analysis and improvement of a chaos-based hash function construction | 2011-10-13 | Paper |
| Parallel keyed hash function construction based on chaotic maps | 2011-09-27 | Paper |
| A novel combined cryptographic and hash algorithm based on chaotic control character | 2011-09-23 | Paper |
| Analysis and improvement of a chaos-based hash function construction | 2011-09-23 | Paper |
| Parallel hash function construction based on coupled map lattices | 2011-09-23 | Paper |
| Cryptanalysis of a chaos block cipher for wireless sensor network | 2011-09-23 | Paper |
| Chaos Based Hash Function | 2011-09-07 | Paper |
| Analysis and improvement of a hash-based image encryption algorithm | 2011-07-13 | Paper |
| Analysis and improvement of a chaos-based image encryption algorithm | 2010-11-04 | Paper |
| Adaptive synchronization of GLHS with unknown parameters | 2010-05-31 | Paper |
| Generalization rough set theory and real-valued attributes reduction | 2010-02-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3402740 | 2010-02-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3622333 | 2009-04-28 | Paper |
| Real Rough Set Theory and Attribute Reduction | 2008-04-04 | Paper |
| One-way hash function construction based on 2D coupled map lattices | 2008-03-12 | Paper |
| Using time-stamp to improve the security of a chaotic maps-based key agreement protocol | 2008-03-12 | Paper |
| A region and gradient based active contour model and its application in boundary tracking on anal canal ultrasound images | 2007-09-14 | Paper |
| Ellipsoidal basis functional neural network based on rough \(K\)-means | 2007-01-04 | Paper |
| Advances in Neural Networks – ISNN 2005 | 2005-11-23 | Paper |
| Advances in Neural Networks – ISNN 2005 | 2005-11-23 | Paper |
| One-way hash function construction based on the chaotic map with changeable-parameter | 2005-05-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5202929 | 1991-01-01 | Paper |