Showing 1 - 20 results of 53 for search 'Nenghai YU', query time: 0.06s
Refine Results
-
1
Improvement of the blockchain protocol based on memory-hard function by Sui CHENG, Xianzheng LIN, Nenghai YU
Published 2020-10-01
Article -
2
Color Image Quality Assessment Based on CIEDE2000 by Yang Yang, Jun Ming, Nenghai Yu
Published 2012-01-01
Article -
3
A Design Method of Saturation Test Image Based on CIEDE2000 by Yang Yang, Jun Ming, Nenghai Yu
Published 2012-01-01
Article -
4
Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU
Published 2023-10-01
Article -
5
Adaptable privacy protection scheme in JPEG images by Hongxin WEN, Fei HU, Nenghai YU
Published 2024-02-01
Article -
6
Block level cloud data deduplication scheme based on attribute encryption by Wenting GE, Weihai LI, Nenghai YU
Published 2023-10-01
Article -
7
Adaptable privacy protection scheme in JPEG images by Hongxin WEN, Fei HU, Nenghai YU
Published 2024-02-01
Article -
8
The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications by Hao Zhang, Nenghai Yu, Honggang Hu
Published 2014-02-01
Article -
9
Rapid responsive and efficient multi-valued Byzantine consensus scheme by Wang ZHOU, Honggang HU, Nenghai YU
Published 2021-02-01
Article -
10
A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics by Zhuo Hao, Sheng Zhong, Nenghai Yu
Published 2013-01-01
Article -
11
Compression of bitcoin blockchain by Xiaojiao CHEN, Xianzheng LIN, Nenghai YU
Published 2021-02-01
Article -
12
A Class of In-Place Linear Transformations Possessing the Cache-Oblivious Property by Zhe Zhao, Sian-Jheng Lin, Nenghai Yu
Published 2019-01-01
Article -
13
Carrier-independent deep optical watermarking algorithm by Hao CHEN, Feng WANG, Weiming ZHANG, Nenghai YU
Published 2022-08-01
Article -
14
Key-customizable encrypted deduplication with access control for cloud storage by Bolun GU, Zikai XU, Weihai LI, Nenghai YU
Published 2024-08-01
Article -
15
-
16
Privacy leakage risk assessment for reversible neural network by Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU
Published 2023-08-01
Article -
17
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU
Published 2023-06-01
Article -
18
Reversible data hiding in encrypted images based on fine-grained embedding room reservation by Jinwei LI, Xiaoya ZHANG, Yuanzhi YAO, Nenghai YU
Published 2022-02-01
Article -
19
Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data by Kai Jiang, Like Liu, Rong Xiao, Nenghai Yu
Published 2012-01-01
Article -
20
Binary image steganography method based on layered embedding by Yuxiang CHENG, Weiming ZHANG, Weixiang LI, Nenghai YU
Published 2021-10-01
Article