Skip to main content

and
  1. No Access

    Article

    Proof of outsourced encryption: cross verification of security service level agreement

    With the popularity of cloud and edge computing, user data is often stored at third party service providers. Restricted by the available resources, end users may need to outsource the data encryption operation...

    Sultan Alasmari, Weichao Wang, Tuanfa Qin, Yu Wang in CCF Transactions on Networking (2020)

  2. No Access

    Chapter and Conference Paper

    Multi-users Cooperation in Spectrum Sensing Based on HMM Model for Cognitive Radios

    In order to solve the problem of frequent spectral state transition in the traditional cognitive radio network, the existing spectrum sensing is less reliable and the “hidden terminal” is added to reduce the i...

    Wenwei Yang, Weiyun Chen, Messaykabew Mekonen in Geo-Spatial Knowledge and Intelligence (2018)

  3. No Access

    Chapter and Conference Paper

    Color Image Super Resolution by Using Cross-Channel Correlation

    Single image super resolution (SR) aims to reconstruct a high resolution (HR) image from a low resolution (LR) image. However, many SR methods are only designed for the grayscale images. As a result, when deal...

    Kan Chang, Caiwang Mo, Minghong Li in Advances in Multimedia Information Process… (2018)

  4. No Access

    Chapter and Conference Paper

    Single Image Super Resolution Using Local and Non-local Priors

    The task of single image super resolution (SR) is to generate a plausible high-resolution (HR) image from a given low-resolution (LR) measurement. This paper presents a reconstruction-based single image SR met...

    Tianyi Li, Kan Chang, Caiwang Mo in Advances in Multimedia Information Process… (2018)

  5. No Access

    Article

    Reconstruction of multi-view compressed imaging using weighted total variation

    This paper concentrates on the problem of image reconstruction from compressed sensing (CS) measurements in multi-view compressed imaging systems, where each view is acquired independently by CS technique. In ...

    Kan Chang, Tuanfa Qin, Wenbo Xu, Zhenhua Tang in Multimedia Systems (2014)

  6. No Access

    Chapter and Conference Paper

    A Novel Energy-Minimized Optimization Algorithm for Mobile Image Transmission

    In this paper, we propose a novel energy-minimized optimization algorithm for image coding and transmission over wireless channel. In order to reduce computational complexity of reaching optimal solutions, the...

    Zhenhua Tang, Tuanfa Qin, Wenyu Liu in Advances in Multimedia Information Process… (2010)

  7. No Access

    Article

    Energy-saving PPM schemes for WSNs

    Energy conservation is a critical problem in recently-emerging wireless sensor networks (WSNs). Pulse position modulation (PPM), as an exploring-worthy modulation format for energy efficiency, is tailored for ...

    QiuLing Tang, LiuQing Yang, TuanFa Qin in Science in China Series F: Information Sci… (2008)

  8. No Access

    Chapter and Conference Paper

    CAD on Liver Using CT and MRI

    The incidence of liver diseases is very high in Asian countries. This paper introduces our computer-aided diagnosis (CAD) system for diagnosing liver cancer and describes the fundamental technologies employed ...

    Xuejun Zhang, Hiroshi Fujita, Tuanfa Qin, **chuang Zhao in Medical Imaging and Informatics (2008)

  9. No Access

    Chapter and Conference Paper

    Cryptanalysis of the Energy Efficient Stream Ciphers SSC2

    The SSC2 is a fast software stream cipher designed for wireless handsets with limited computational capabilities. It is the only one stream cipher which is special designed aim to energy efficient cryptography...

    Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang in Secure Mobile Ad-hoc Networks and Sensors (2006)