Skip to main content

and
  1. No Access

    Article

    An image compression-then-encryption algorithm using piecewise asymptotic deterministic random measurement matrix

    A digital Image Compression Encryption Method (ICEM) is proposed in this work by using the Compressed Sensing (CS), two-dimensional Logistic-adjusted-Sine map, the piecewise asymptotic deterministic system, dy...

    Yuling Luo, **anya Huang, Shunsheng Zhang, Junxiu Liu in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Hardware Spiking Neural Networks with Pair-Based STDP Using Stochastic Computing

    Spiking Neural Networks (SNNs) can closely mimic the biological neural network systems. Recently, the SNNs have been developed in hardware circuits to emulate the time encoding and information-processing aspec...

    Junxiu Liu, Yanhu Wang, Yuling Luo, Shunsheng Zhang in Neural Processing Letters (2023)

  3. No Access

    Article

    A grape disease identification and severity estimation system

    It is an important research of automatically identifying the type and severity level of crop diseases, which affects food production, disease control, and economic loss prediction. Deep learning-based methods ...

    Hai** Shu, Junxiu Liu, Yifan Hua, Jian Chen in Multimedia Tools and Applications (2023)

  4. No Access

    Article

    An image encryption scheme based on block compressed sensing and Chen’s system

    Image encryption is a common way of information protection. However, most of the existing image encryption schemes have a low transmission efficiency and large memory consumption due to ciphertext redundancy. ...

    Yuling Luo, Yuting Liang, Shunsheng Zhang, Junxiu Liu, Fangxiao Wang in Nonlinear Dynamics (2023)

  5. No Access

    Chapter and Conference Paper

    Efficient-Secure k-means Clustering Guaranteeing Personalized Local Differential Privacy

    One highly discussed research topic is user privacy protection and the usability of models in data mining tasks. Currently, the most k-means clustering approach using differential privacy is based on trusted thir...

    Yuling Luo, Zhangrui Wang, Shunsheng Zhang in Algorithms and Architectures for Parallel … (2023)

  6. No Access

    Article

    COVER: A Secure Blind Image Watermarking Scheme

    The robustness and imperceptibility of the watermarking algorithm are a pair of contradictory properties. When the robustness increases, the imperceptibility decreases. Most strategies proposed in the literatu...

    Yuling Luo, Fangxiao Wang, Junxiu Liu in Circuits, Systems, and Signal Processing (2022)

  7. No Access

    Chapter and Conference Paper

    A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics

    Image tampering forensics is performed by analyzing images to locate the tampered regions. However, most image tampering detection methods lack locational accuracy and are effective only for specific types of ...

    Yuling Luo, Ce Liang, Shunsheng Zhang, Sheng Qin in Advances in Digital Forensics XVIII (2022)

  8. No Access

    Article

    Localization deception performance of FDA signals under passive bi-satellite reconnaissance

    Time difference of arrival (TDOA) and frequency difference of arrival (FDOA) are widely adopted for passive bi-satellite positioning system (BPS) localization. Although TDOA/FDOA localization counter-measures ...

    Haoliang Guan, Shunsheng Zhang, Wen-Qin Wang in Science China Information Sciences (2021)

  9. No Access

    Chapter and Conference Paper

    Automatic Segmentation and Diagnosis of Intervertebral Discs Based on Deep Neural Networks

    Lumbar disc diagnosis belongs to Magnetic Resonance Imaging (MRI) segmentation and detection. It is a challenge for even the most professional radiologists to manually check and interpret MRI. In addition, hig...

    **uhao Liang, Junxiu Liu, Yuling Luo, Guopei Wu in Neural Information Processing (2020)

  10. No Access

    Article

    Improved compressed sensing for high-resolution ISAR image reconstruction

    For inverse synthetic aperture radar (ISAR), an ISAR signal in the cross-range direction has the characteristic of sparsity in the azimuth frequency domain. Due to this property, a Fourier basis is adopted as ...

    Shunsheng Zhang, Bo **ao, Zhulin Zong in Chinese Science Bulletin (2014)