Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Identity-Based Key Verifiable Inner Product Functional Encryption Scheme

    Functional encryption is a novel form of public key encryption that has captured significant attention since its inception, with researchers proposing a series of theoretical constructions. Functional encrypti...

    Mingwu Zhang, Chao He, Gang Shen in Blockchain Technology and Emerging Applications (2024)

  2. Article

    Open Access

    A conditional random field framework for language process in product review mining

    The Part-Of-Speech tagging is widely used in the natural language process. There are many statistical approaches in this area. The most popular one is Hidden Markov Model. In this paper, an alternative approac...

    Yue Ming, **yuan Liu, Gang Shen, Di Gao, Yu Wang in Multimedia Tools and Applications (2023)

  3. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces

    Federated learning has received widespread attention in recent years, since it trains a model by only sharing gradients without accessing training sets. In this paper, we consider two security issues in the tr...

    Mingwu Zhang, Chenmei Cui, Gang Shen in Security and Privacy in Social Networks an… (2022)

  4. No Access

    Chapter and Conference Paper

    Subset Ratio Dynamic Selection for Consistency Enhancement Evaluation

    Due to poor imaging conditions, large-scale underwater images need the consistency enhancement. According to the subset-guided consistency enhancement evaluation criterion, the existing subset selection method...

    Kaixun Wang, Hao Liu, Gang Shen, Tingting Shi in Pattern Recognition and Computer Vision (2020)

  5. No Access

    Article

    Improved schemes for visual secret sharing based on random grids

    Random grid (RG) is an alternative approach to realize a visual secret sharing (VSS) scheme. RG-based VSS has merits such as no pixel expansion and no tailor-made matrix requirement. Recently, many investigati...

    Hao Hu, Gang Shen, Yuling Liu, Zhengxin Fu, Bin Yu in Multimedia Tools and Applications (2019)

  6. No Access

    Article

    A new two-level QR code with visual cryptography scheme

    The Quick Response (QR) code is designed for information storage recognizable by machine vision. With the popularity of QR code applications, the security of QR codes becomes hot issues concerned by many schol...

    Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen in Multimedia Tools and Applications (2018)

  7. No Access

    Article

    Visual cryptograms of random grids via linear algebra

    Two visual models of image secret sharing have been studied: visual cryptography schemes (VCS), introduced by Naor and Shamir, and visual cryptograms of random grids (VCRG), introduced by Kafri and Keren. VCRG...

    Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu in Multimedia Tools and Applications (2018)

  8. No Access

    Article

    New insight into linear algebraic technique to construct visual cryptography scheme for general access structure

    The most essential advantage of applying linear algebra to construct visual cryptography scheme (VCS) lies in that it only requires solving linear equations in the construction of initial basis matrices, which...

    Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu in Multimedia Tools and Applications (2017)

  9. No Access

    Article

    General construction for XOR-based visual cryptography and its extended capability

    A visual cryptography scheme (VCS) can be realized by Boolean operations OR and XOR, respectively. The monotone property of OR operation reduces the visual quality of recovered image. To overcome this problem,...

    Hao Hu, Gang Shen, Zhengxin Fu, Bin Yu, **g**g Wang in Multimedia Tools and Applications (2016)

  10. No Access

    Article

    Multi-secret visual cryptography with deterministic contrast

    The multi-secret visual cryptography scheme (MVCS) allows for the encryption of multiple secret images into a given image area. The previous works on MVCS with probabilistic contrast can not guarantee that eve...

    Bin Yu, Gang Shen in Multimedia Tools and Applications (2014)

  11. No Access

    Article

    Superposition Coding and Analysis for Cooperative Multiple Access Relay System

    The conventional straightforward relaying scheme named decode-and-forward (DF) protocol is used at relay to decode the data received from source and forward the decoded data to the destination to improve the s...

    Yan Meng, Gang Liu, Gang Shen, Zheng Liu, Qi Jiang in Wireless Personal Communications (2013)

  12. No Access

    Chapter and Conference Paper

    A Message Passing Graph Match Algorithm Based on a Generative Graphical Model

    In This paper, we present a generative model to measure the graph similarity, assuming that an observed graph is generated from a template by a Markov random field. The potentials of this random process are ch...

    Gang Shen, Wei Li in Active Media Technology (2012)

  13. No Access

    Book and Conference Proceedings

    Advanced Research on Computer Science and Information Engineering

    International Conference, CSIE 2011, Zhengzhou, China, May 21-22, 2011, Proceedings, Part II

    Gang Shen, **ong Huang in Communications in Computer and Information Science (2011)

  14. No Access

    Book and Conference Proceedings

    Advanced Research on Computer Science and Information Engineering

    International Conference, CSIE 2011, Zhengzhou, China, May 21-22, 2011. Proceedings, Part I

    Gang Shen, **ong Huang in Communications in Computer and Information Science (2011)

  15. No Access

    Chapter and Conference Paper

    A Shadow Price Guided Genetic Algorithm for Energy Aware Task Scheduling on Cloud Computers

    Minimizing computing energy consumption has many benefits, such as environment protection, cost savings, etc. An important research problem is the energy aware task scheduling for cloud computing. For many div...

    Gang Shen, Yan-Qing Zhang in Advances in Swarm Intelligence (2011)

  16. No Access

    Article

    Joint Carrier Frequency Offset and Channel Estimation for Amplify-and-Forward Cooperative OFDM System

    In this paper, we develop a new joint carrier frequency offset (CFO) and channel estimation algorithm for Amplify-and-Forward (AF) cooperative (CO)-OFDM systems. An expanded Basis Expansion Model (E-BEM) is pr...

    Qi Jiang, Kaibin Zhang, Jimin Liu, Gang Shen in Wireless Personal Communications (2010)