Data-driven cybersecurity incident prediction: A survey N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang IEEE Communications Surveys & Tutorials, 2018 | 349 | 2018 |
A Review of Compressive Sensing in Information Security Field Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He IEEE Access, 2016 | 205 | 2016 |
On the security of a class of diffusion mechanisms for image encryption LY Zhang, Y Liu, F Pareschi, Y Zhang, KW Wong, R Rovatti, G Setti IEEE Transactions on Cybernetics 48 (4), 1163 - 1175, 2018 | 140 | 2018 |
Embedding cryptographic features in compressive sensing Y Zhang, KW Wong, D Xiao, LY Zhang, M Li Neurocomputing 40 (12), 472-480, 2016 | 132 | 2016 |
Breaking a novel colour image encryption algorithm based on chaos C Li, LY Zhang, R Ou, KW Wong, S Shu Nonlinear dynamics, 1-6, 2012 | 129 | 2012 |
A chaotic image encryption scheme owning temp-value feedback LY Zhang, X Hu, Y Liu, KW Wong, J Gan Communications in Nonlinear Science and Numerical Simulation, 2013 | 123 | 2013 |
Low-cost and confidentiality-preserving data acquisition for internet of multimedia things Y Zhang, Q He, Y Xiang, LY Zhang, B Liu, J Chen, Y Xie IEEE Internet of Things Journal 5 (5), 3442-3451, 2017 | 110 | 2017 |
Breaking a chaotic image encryption algorithm based on perceptron model LY Zhang, C Li, Q Li, D Zhang, S Shu Nonlinear Dynamics 69 (3), 1091-1096, 2012 | 110 | 2012 |
Bi-level Protected Compressive Sampling LY Zhang, KW WONG, Y ZHANG, J Zhou IEEE Transactions on Multimedia 18 (9), 1720 - 1732, 2016 | 105* | 2016 |
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer S Hu, X Liu, Y Zhang, M Li, LY Zhang, H Jin, L Wu CVPR, 15014-15023, 2022 | 103 | 2022 |
A genetic algorithm for constructing bijective substitution boxes with high nonlinearity Y Wang, Z Zhang, LY Zhang, J Feng, G Gao, L Peng Information Sciences 523, 152-166, 2020 | 100 | 2020 |
Compressive Sensing Y Zhang, Y Xiang, LY Zhang Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT, 1-9, 2019 | 99* | 2019 |
Challenges and approaches for mitigating byzantine attacks in federated learning J Shi, J Lu, S Hu, LY Zhang TrustCom (arXiv preprint arXiv:2112.14468), 2022 | 83 | 2022 |
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure Y Liu, LY Zhang, J Wang, Y Zhang, K Wong Nonlinear Dynamics 84 (4), 2241-2250, 2015 | 74 | 2015 |
Improved known-plaintext attack to permutation-only multimedia ciphers LY Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen Information Sciences 430, 228-239, 2018 | 73 | 2018 |
Secure wireless communications based on compressive sensing: a survey Y Zhang, Y Xiang, LY Zhang, Y Rong, S Guo IEEE Communications Surveys & Tutorials 21 (2), 1093-1111, 2018 | 72 | 2018 |
Medical image cipher using hierarchical diffusion and non-sequential encryption J Chen, L Chen, LY Zhang, Z Zhu Nonlinear Dynamics 96, 301-322, 2019 | 70 | 2019 |
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure LY Zhang, C Li, KW Wong, S Shu, G Chen Journal of Systems and Software 85 (9), 2077-2085, 2012 | 67 | 2012 |
Breaking a chaotic image encryption algorithm based on modulo addition and xor operation C Li, Y Liu, LY Zhang, MZQ Chen International Journal of Bifurcation and Chaos 23 (04), 1350075, 2013 | 62 | 2013 |
Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps Q Zhong, LY Zhang, J Zhang, L Gao, Y Xiang The Pacific-Asia Conference on Knowledge Discovery and Data Mining, 462-474, 2020 | 56 | 2020 |