| Publication | Date of Publication | Type |
|---|
| scientific article; zbMATH DE number 7618403 (Why is no real title available?) | 2022-11-17 | Paper |
| scientific article; zbMATH DE number 7618449 (Why is no real title available?) | 2022-11-17 | Paper |
| scientific article; zbMATH DE number 7618673 (Why is no real title available?) | 2022-11-17 | Paper |
| scientific article; zbMATH DE number 7617190 (Why is no real title available?) | 2022-11-15 | Paper |
Image universal steganalysis based on best wavelet packet decomposition Science China Information Sciences | 2022-10-28 | Paper |
Locating secret messages based on quantitative steganalysis Mathematical Biosciences and Engineering | 2022-08-03 | Paper |
SDN-based double hopping communication against sniffer attack Mathematical Problems in Engineering | 2018-10-12 | Paper |
Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation Nonlinear Dynamics | 2018-06-07 | Paper |
An image encryption algorithm based on information hiding International Journal of Bifurcation and Chaos in Applied Sciences and Engineering | 2016-12-01 | Paper |
| scientific article; zbMATH DE number 6402537 (Why is no real title available?) | 2015-02-11 | Paper |
Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem and its improved version Physics Letters. A | 2012-07-04 | Paper |
Improvement of Rhouma's attacks on Gao algorithm Physics Letters. A | 2012-04-30 | Paper |
Modification ratio estimation for a category of adaptive steganography Science China Information Sciences | 2011-06-17 | Paper |
Embedding Ratio Estimating for Each Bit Plane of Image Information Hiding | 2009-10-20 | Paper |
A review on blind detection for image steganography Signal Processing | 2009-01-20 | Paper |
| Using genetic algorithm solving shortest path problem | 2008-11-24 | Paper |
| scientific article; zbMATH DE number 5308406 (Why is no real title available?) | 2008-08-06 | Paper |
LTSB Steganalysis Based on Quartic Equation Transactions on Data Hiding and Multimedia Security II | 2007-11-13 | Paper |
| scientific article; zbMATH DE number 5181024 (Why is no real title available?) | 2007-08-20 | Paper |
A perturbing scheme of digital chaos Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
| scientific article; zbMATH DE number 5026786 (Why is no real title available?) | 2006-05-24 | Paper |
| scientific article; zbMATH DE number 2233207 (Why is no real title available?) | 2005-11-28 | Paper |
| scientific article; zbMATH DE number 1766906 (Why is no real title available?) | 2002-07-11 | Paper |
Based state observer decentralized output feedback stability of uncertainty composite systems with imperfect inputs Control Theory & Applications | 2001-10-23 | Paper |
Containment relations for a class of analytic functions Journal of Harbin Institute of Technology | 2001-09-20 | Paper |
| scientific article; zbMATH DE number 1474894 (Why is no real title available?) | 2000-10-10 | Paper |
| scientific article; zbMATH DE number 1474900 (Why is no real title available?) | 2000-08-28 | Paper |