default search action
Di Xiao 0001
Person information
- affiliation: Chongqing University, Chongqing, China
Other persons with the same name
- Di Xiao — disambiguation page
- Di Xiao 0002 — University of Minnesota, Minneapolis, MN, USA
- Di Xiao 0003 — Texas A&M University, College Station, TX, USA
- Di Xiao 0004 — TeleMedC Pty Ltd., Brisbane, Australia (and 1 more)
- Di Xiao 0005 — Fuzhou University, Fuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j90]Min Li, Di Xiao, Lvjun Chen:
Adaptive compressed learning boosts both efficiency and utility of differentially private federated learning. Signal Process. 227: 109742 (2025) - 2024
- [j89]Bo Zhang, Di Xiao, Min Li, Kai Wang:
Cipher-image coding via 2D compressive sensing and cipher-domain mapping. Digit. Signal Process. 152: 104593 (2024) - [j88]Lvjun Chen, Di Xiao, Zhuyang Yu, Maolan Zhang:
Secure and efficient federated learning via novel multi-party computation and compressed sensing. Inf. Sci. 667: 120481 (2024) - [j87]Di Xiao, Jingdong Xia, Min Li, Maolan Zhang:
Manipulable, reversible and diversified de-identification via face identity disentanglement. Multim. Tools Appl. 83(31): 75653-75670 (2024) - [j86]Lvjun Chen, Di Xiao, Xiangli Xiao, Yushu Zhang:
Secure and Efficient Federated Learning via Novel Authenticable Multi-Party Computation and Compressed Sensing. IEEE Trans. Inf. Forensics Secur. 19: 10141-10156 (2024) - [j85]Hui Huang, Di Xiao, Jia Liang:
Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization Reconstruction. ACM Trans. Multim. Comput. Commun. Appl. 20(4): 116:1-116:22 (2024) - [j84]Hui Huang, Di Xiao, Jia Liang, Min Li:
Prior-based privacy-assured compressed sensing scheme in cloud. Vis. Comput. 40(3): 2103-2117 (2024) - [c26]Shuchi Wu, Chuan Ma, Kang Wei, Xiaogang Xu, Ming Ding, Yuwen Qian, Di Xiao, Tao Xiang:
Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-relational Extraction. ECCV (34) 2024: 186-203 - [c25]Di Xiao, Meng Zhang, Maolan Zhang, Lvjun Chen:
CFMVOR: Federated Multi-view 3D Object Recognition Based on Compressed Learning. PRCV (13) 2024: 280-293 - [i4]Yuwen Qian, Shuchi Wu, Kang Wei, Ming Ding, Di Xiao, Tao Xiang, Chuan Ma, Song Guo:
EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection. CoRR abs/2405.13080 (2024) - 2023
- [j83]Yawen Huang, Hongying Zheng, Di Xiao:
Convolutional neural networks tamper detection and location based on fragile watermarking. Appl. Intell. 53(20): 24056-24067 (2023) - [j82]Baokun Qin, Hongying Zheng, Di Xiao:
High-capacity data hiding in encrypted images based on compressive sensing and intra-block difference coding. Appl. Intell. 53(21): 26240-26254 (2023) - [j81]Di Xiao, Yue Li, Min Li:
Invertible Privacy-Preserving Adversarial Reconstruction for Image Compressed Sensing. Sensors 23(7): 3575 (2023) - [j80]Mengdi Wang, Di Xiao, Jia Liang, Guiqiang Hu:
Distributed privacy-preserving nested compressed sensing for multiclass data collection with identity authentication. Signal Process. 204: 108823 (2023) - [j79]Bo Zhang, Di Xiao, Xiuling Li, Jia Liang:
Privacy-preserving image compressed sensing by embedding a controllable noise-injected transformation for IoT devices. Signal Process. 210: 109055 (2023) - [j78]Jia Liang, Di Xiao, Hui Huang, Min Li:
Multilevel Privacy Preservation Scheme Based on Compressed Sensing. IEEE Trans. Ind. Informatics 19(6): 7435-7444 (2023) - [c24]Bo Zhang, Di Xiao, Dongjing Shan:
Image Compressed Sensing Using Auxiliary Information for Efficient Coding. DCC 2023: 1 - [c23]Hui Huang, Di Xiao, Mengdi Wang:
Hierarchical Privacy-Preserving and Communication-Efficient Compression via Compressed Sensing. DCC 2023: 342 - [c22]Di Xiao, Qin Tang, Aozhu Zhao, Min Li:
Robust Watermarking Scheme in Encrypted Domain Based on Integer Lifting Wavelet Transform and Compressed Sensing. ICASSP 2023: 1-5 - [c21]Di Xiao, Jinkun Li, Min Li:
Privacy-Preserving Federated Compressed Learning Against Data Reconstruction Attacks Based on Secure Data. ICONIP (15) 2023: 325-339 - 2022
- [j77]Min Li, Di Xiao, Jia Liang, Hui Huang:
Communication-Efficient and Byzantine-Robust Differentially Private Federated Learning. IEEE Commun. Lett. 26(8): 1725-1729 (2022) - [j76]Min Li, Di Xiao, Hui Huang, Bo Zhang:
Multi-level video quality services and security guarantees based on compressive sensing in sensor-cloud system. J. Netw. Comput. Appl. 205: 103456 (2022) - [j75]Di Xiao, Aozhu Zhao, Fei Li:
Robust Watermarking Scheme for Encrypted Images Based on Scrambling and Kronecker Compressed Sensing. IEEE Signal Process. Lett. 29: 484-488 (2022) - [j74]Bo Zhang, Di Xiao, Ying Li, Lei Yang:
2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction for Cipher-Image Coding. IEEE Signal Process. Lett. 29: 2033-2037 (2022) - [j73]Hui Huang, Di Xiao, Jia Liang:
Two-Layer Controllable Recovery for Privacy-Preserving Double-Compressed Images. IEEE Signal Process. Lett. 29: 2452-2456 (2022) - [j72]Jia Liang, Di Xiao, Xue Tan, Hui Huang:
Secure Sampling and Low-Overhead Compressive Analysis by Linear Transformation. IEEE Trans. Circuits Syst. II Express Briefs 69(2): 639-643 (2022) - [c20]Hui Huang, Di Xiao, Min Li:
Privacy-Assured and Multi-Prior Recovered Compressed Sensing for Image Compression-Encryption Applications. DCC 2022: 113-122 - [c19]Bo Zhang, Di Xiao, Hui Huang, Jia Liang:
Compressing Cipher Images by Using Semi-tensor Product Compressed Sensing and Pre-mapping. DCC 2022: 123-132 - [c18]Bo Zhang, Di Xiao, Sen Bai, Min Li:
Compressed Sensing by Using Measurement Completion for Robust Image Coding. HPCC/DSS/SmartCity/DependSys 2022: 523-529 - [c17]Di Xiao, Pengcen Jiang, Min Li:
Communication-Efficient Federated Learning Based on Chained Secure Multiparty Computing and Compressed Sensing. HPCC/DSS/SmartCity/DependSys 2022: 1539-1546 - [c16]Jia Liang, Di Xiao, Yong Xiang, Robin Doss:
A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission. ICC 2022: 5573-5578 - [c15]Di Xiao, Xue Tan, Min Li:
Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing. ISC 2022: 491-508 - [c14]Hongying Zheng, Yawen Huang, Lin Li, Di Xiao:
Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds. MMM (2) 2022: 382-393 - 2021
- [j71]Di Xiao, Jia Liang, Yanping Xiang, Jiaqi Zhou:
Cloud-Assisted Image Double Protection System With Encryption and Data Hiding Based on Compressive Sensing. Int. J. Digit. Crime Forensics 13(6): 1-19 (2021) - [j70]Mengdi Wang, Di Xiao, Yong Xiang:
Low-Cost and Confidentiality-Preserving Multi-Image Compressed Acquisition and Separate Reconstruction for Internet of Multimedia Things. IEEE Internet Things J. 8(3): 1662-1673 (2021) - [j69]Yanping Xiang, Di Xiao, Rui Zhang, Jia Liang, Ran Liu:
Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer. Inf. Sci. 545: 188-206 (2021) - [j68]Xingbin Liu, Di Xiao, Cong Liu:
Three-level quantum image encryption based on Arnold transform and logistic map. Quantum Inf. Process. 20(1): 23 (2021) - [j67]Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu, Di Xiao, Yong Xiang:
Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing. IEEE Trans. Ind. Informatics 17(5): 3401-3411 (2021) - [j66]Bo Zhang, Di Xiao, Yong Xiang:
Robust Coding of Encrypted Images via 2D Compressed Sensing. IEEE Trans. Multim. 23: 2656-2671 (2021) - [c13]Bo Zhang, Di Xiao, Mengdi Wang, Jia Liang:
Privacy-Preserving Compressed Sensing for Image Simultaneous Compression-Encryption Applications. DCC 2021: 283-292 - [c12]Mengdi Wang, Di Xiao, Jia Liang:
Low Complexity Secure P-Tensor Product Compressed Sensing Reconstruction Outsourcing and Identity Authentication in Cloud. ICASSP 2021: 2630-2634 - [c11]Di Xiao, Shuwen Lan:
Secure Image Coding Based on Compressive Sensing with Optimized Rate-Distortion. ICICS (2) 2021: 125-141 - [i3]Bo Zhang, Di Xiao, Lan Wang, Sen Bai, Lei Yang:
Efficient Compressed Sensing Based Image Coding by Using Gray Transformation. CoRR abs/2102.01272 (2021) - 2020
- [j65]Xinyan Li, Di Xiao, Huajian Mou, Dianjun Lu, Mei Peng:
A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption. IEEE Access 8: 211676-211690 (2020) - [j64]Rui Zhang, Di Xiao:
A secure image permutation-substitution framework based on chaos and compressive sensing. Int. J. Distributed Sens. Networks 16(3) (2020) - [j63]Di Xiao, Min Li, Mengdi Wang, Jia Liang, Ran Liu:
Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks. J. Netw. Comput. Appl. 161: 102654 (2020) - [j62]Xingbin Liu, Di Xiao, Cong Liu:
Quantum image encryption algorithm based on bit-plane permutation and sine logistic map. Quantum Inf. Process. 19(8): 239 (2020) - [j61]Di Xiao, Min Li, Hongying Zheng:
Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing. Sensors 20(5): 1517 (2020) - [j60]Di Xiao, Fei Li, Mengdi Wang, Hongying Zheng:
A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery. IEEE Signal Process. Lett. 27: 296-300 (2020)
2010 – 2019
- 2019
- [j59]Xingbin Liu, Di Xiao, Yanping Xiang:
Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map. IEEE Access 7: 6937-6946 (2019) - [j58]Xingbin Liu, Di Xiao, Wei Huang, Cong Liu:
Quantum Block Image Encryption Based on Arnold Transform and Sine Chaotification Model. IEEE Access 7: 57188-57199 (2019) - [j57]Bin Liu, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang, Yang Li, Bing-Jie Xu:
QKD-Based Quantum Private Query Protocol in the Single-Photon Interference Communication System. IEEE Access 7: 104749-104758 (2019) - [j56]Bin Liu, Zhifeng Gao, Di Xiao, Wei Huang, Zhiqing Zhang, Bingjie Xu:
Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol. Entropy 21(5): 518 (2019) - [j55]Mengdi Wang, Di Xiao, Yanping Xiang, Hui Wang:
Privacy-Aware Controllable Compressed Data Publishing Against Sparse Estimation Attack in IoT. IEEE Internet Things J. 6(4): 7305-7318 (2019) - [j54]Aqeel-ur Rehman, Di Xiao, Ayesha Kulsoom, Muntazim Abbas Hashmi, Syed Ali Abbas:
Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multim. Tools Appl. 78(7): 9355-9382 (2019) - [j53]Ming Li, Di Xiao, Ye Zhu, Yushu Zhang, Lin Sun:
Commutative fragile zero-watermarking and encryption for image integrity protection. Multim. Tools Appl. 78(16): 22727-22742 (2019) - [j52]Bin Liu, Zhifeng Gao, Di Xiao, Wei Huang, Xingbin Liu, Bingjie Xu:
Quantum identity authentication in the orthogonal-state-encoding QKD system. Quantum Inf. Process. 18(5): 137 (2019) - [j51]Hui Wang, Di Xiao, Min Li, Yanping Xiang, Xinyan Li:
A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 155: 218-232 (2019) - [j50]Yanping Xiang, Di Xiao, Hui Wang, Xinyan Li:
A secure image tampering detection and self-recovery scheme using POB number system over cloud. Signal Process. 162: 282-295 (2019) - [c10]Bo Zhang, Di Xiao, Zhenyu Zhang, Lei Yang:
Compressing Encrypted Images by Using 2D Compressed Sensing. HPCC/SmartCity/DSS 2019: 1914-1919 - [c9]Mengdi Wang, Di Xiao, Zihang Ao:
A Novel Privacy-Preserving Data Gathering Scheme in WSN Based on Compressive Sensing and Embedding. ICC 2019: 1-6 - 2018
- [j49]Xingbin Liu, Di Xiao, Cong Liu:
Double Quantum Image Encryption Based on Arnold Transform and Qubit Random Rotation. Entropy 20(11): 867 (2018) - [j48]Di Xiao, Juan Zhao, Mengdi Wang, Yong Wang:
Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment. Multim. Tools Appl. 77(18): 23949-23968 (2018) - [j47]Rui Zhang, Di Xiao, Yanting Chang:
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing. Secur. Commun. Networks 2018: 1591206:1-1591206:15 (2018) - [j46]Ming Li, Hua Ren, En Zhang, Wei Wang, Lin Sun, Di Xiao:
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. Secur. Commun. Networks 2018: 4313769:1-4313769:11 (2018) - [j45]Ming Li, Haiju Fan, Hua Ren, Dandan Lu, Di Xiao, Yang Li:
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain. Secur. Commun. Networks 2018: 9803519:1-9803519:12 (2018) - [j44]Hui Wang, Di Xiao, Xin Chen, Hongyu Huang:
Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process. 144: 444-452 (2018) - [c8]Yong Wang, Zhiqiang Zhang, Nanchuan Cai, Yousheng Zhou, Di Xiao:
A Prediction Model for the Risk of Osteoporosis Fracture in the Elderly Based on a Neural Network. ISNN 2018: 815-823 - 2017
- [j43]Guiqiang Hu, Di Xiao, Tao Xiang, Sen Bai, Yushu Zhang:
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. Inf. Sci. 387: 132-145 (2017) - [j42]Guiqiang Hu, Di Xiao, Yong Wang, Tao Xiang:
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications. J. Vis. Commun. Image Represent. 44: 116-127 (2017) - [j41]Di Xiao, Yanping Xiang, Hongying Zheng, Yong Wang:
Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J. Vis. Commun. Image Represent. 45: 1-10 (2017) - [j40]Di Xiao, Ying Wang, Tao Xiang, Sen Bai:
High-payload completely reversible data hiding in encrypted images by an interpolation technique. Frontiers Inf. Technol. Electron. Eng. 18(11): 1732-1743 (2017) - [j39]Di Xiao, Yanting Chang, Tao Xiang, Sen Bai:
A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multim. Tools Appl. 76(7): 9265-9296 (2017) - [j38]Bin Liu, Di Xiao, Wei Huang, Heng-Yue Jia, Ting-Ting Song:
Quantum private comparison employing single-photon interference. Quantum Inf. Process. 16(7): 180 (2017) - 2016
- [j37]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Di Xiao, Bin Chen, Xiaofeng Liao:
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions. Int. J. Bifurc. Chaos 26(11): 1650191:1-1650191:15 (2016) - [j36]Di Xiao, Qingqing Fu, Tao Xiang, Yushu Zhang:
Chaotic Image Encryption of Regions of Interest. Int. J. Bifurc. Chaos 26(11): 1650193:1-1650193:15 (2016) - [j35]Yushu Zhang, Jiantao Zhou, Fei Chen, Leo Yu Zhang, Kwok-Wo Wong, Xing He, Di Xiao:
Embedding cryptographic features in compressive sensing. Neurocomputing 205: 472-480 (2016) - [j34]Ayesha Kulsoom, Di Xiao, Aqeel-ur Rehman, Syed Ali Abbas:
An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multim. Tools Appl. 75(1): 1-23 (2016) - [j33]Hong Liu, Di Xiao, Yunpeng Xiao, Yushu Zhang:
Robust image hashing with tampering recovery capability via low-rank and sparse representation. Multim. Tools Appl. 75(13): 7681-7696 (2016) - [j32]Di Xiao, Hongkun Cai, Yong Wang, Sen Bai:
High-capacity separable data hiding in encrypted image based on compressive sensing. Multim. Tools Appl. 75(21): 13779-13789 (2016) - [j31]Bin Liu, Di Xiao, Heng-Yue Jia, Runzong Liu:
Collusive attacks to "circle-type" multi-party quantum key agreement protocols. Quantum Inf. Process. 15(5): 2113-2124 (2016) - [j30]Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su:
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization. Secur. Commun. Networks 9(1): 43-53 (2016) - [j29]Ming Li, Di Xiao, Hong Liu, Sen Bai:
A recoverable chaos-based fragile watermarking with high PSNR preservation. Secur. Commun. Networks 9(14): 2371-2386 (2016) - [j28]Hong Liu, Di Xiao, Rui Zhang, Yushu Zhang, Sen Bai:
Robust and hierarchical watermarking of encrypted images based on Compressive Sensing. Signal Process. Image Commun. 45: 41-51 (2016) - 2015
- [j27]Yushu Zhang, Di Xiao, Wenying Wen, Hai Nan, Moting Su:
Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register. Commun. Nonlinear Sci. Numer. Simul. 27(Issues): 22-29 (2015) - [j26]Di Xiao, Shulei Hu, Hongying Zheng:
A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multim. Tools Appl. 74(6): 2109-2126 (2015) - [j25]Di Xiao, Mimi Deng, Xinyi Zhu:
A reversible image authentication scheme based on compressive sensing. Multim. Tools Appl. 74(18): 7729-7752 (2015) - [j24]Jiyun Yang, Tao Xiang, Di Xiao:
Cryptanalysis of a secure chaotic map based block cryptosystem with application to camera sensor networks. Multim. Tools Appl. 74(23): 10873-10881 (2015) - [j23]Ming Li, Di Xiao, Yushu Zhang, Hai Nan:
Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process. Image Commun. 39: 234-248 (2015) - 2014
- [j22]Tao Xiang, Jinyu Qu, Di Xiao:
Joint SPIHT compression and selective encryption. Appl. Soft Comput. 21: 159-170 (2014) - [j21]Yushu Zhang, Di Xiao:
An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1): 74-82 (2014) - [j20]Yushu Zhang, Di Xiao, Hong Liu, Hai Nan:
GLS coding based security solution to JPEG with the structure of aggregated compression and encryption. Commun. Nonlinear Sci. Numer. Simul. 19(5): 1366-1374 (2014) - [j19]Yushu Zhang, Di Xiao, Wenying Wen, Kwok-Wo Wong:
On the security of symmetric ciphers based on DNA coding. Inf. Sci. 289: 254-261 (2014) - [j18]Yushu Zhang, Di Xiao, Wenying Wen, Ming Li:
Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multim. Tools Appl. 73(3): 1885-1896 (2014) - [j17]Ming Li, Di Xiao, Yushu Zhang, Hong Liu:
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images. Signal Process. 99: 17-28 (2014) - [i2]Yushu Zhang, Kwok-Wo Wong, Di Xiao, Leo Yu Zhang, Ming Li:
Embedding Cryptographic Features in Compressive Sensing. CoRR abs/1403.6213 (2014) - [i1]Yushu Zhang, Kwok-Wo Wong, Leo Yu Zhang, Di Xiao:
Robust Coding of Encrypted Images via Structural Matrix. CoRR abs/1405.6843 (2014) - 2013
- [j16]Xi Shi, Di Xiao:
A reversible watermarking authentication scheme for wireless sensor networks. Inf. Sci. 240: 173-183 (2013) - [j15]Yantao Li, Di Xiao, Shaojiang Deng, Gang Zhou:
Improvement and performance analysis of a novel hash function based on chaotic neural network. Neural Comput. Appl. 22(2): 391-402 (2013) - [j14]Yushu Zhang, Di Xiao, Yonglu Shu, Jing Li:
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process. Image Commun. 28(3): 292-300 (2013) - [j13]Yantao Li, Xin Qi, Matthew Keally, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks. IEEE Trans. Parallel Distributed Syst. 24(9): 1741-1751 (2013) - [j12]Yantao Li, Daniel Graham, Gang Zhou, Xin Qi, Shaojiang Deng, Di Xiao:
Discrete-time Markov Model for Wireless Link Burstiness Simulations. Wirel. Pers. Commun. 72(2): 987-1004 (2013) - [c7]Jiyun Yang, Rui Zhang, Di Xiao:
Analysis and Improvement of an Efficient and Secure Key Agreement Protocol. CIS 2013: 528-532 - 2012
- [j11]Chunqiang Hu, Xiaofeng Liao, Di Xiao:
Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem. Int. J. Wavelets Multiresolution Inf. Process. 10(3) (2012) - [j10]Yantao Li, Di Xiao, Shaojiang Deng:
Keyed hash function based on a dynamic lookup table of functions. Inf. Sci. 214: 56-75 (2012) - [j9]Yantao Li, Di Xiao, Huaqing Li, Shaojiang Deng:
Parallel chaotic Hash function construction based on cellular neural network. Neural Comput. Appl. 21(7): 1563-1573 (2012) - [c6]Yantao Li, Ge Peng, Xin Qi, Gang Zhou, Di Xiao, Shaojiang Deng, Hongyu Huang:
Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks. NAS 2012: 235-244 - 2011
- [j8]Yantao Li, Shaojiang Deng, Di Xiao:
A novel Hash algorithm construction based on chaotic neural network. Neural Comput. Appl. 20(1): 133-141 (2011) - [j7]Yantao Li, Di Xiao, Shaojiang Deng, Qi Han, Gang Zhou:
Parallel Hash function construction based on chaotic maps with changeable parameters. Neural Comput. Appl. 20(8): 1305-1312 (2011) - [c5]Yantao Li, Xin Qi, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:
Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks. IPCCC 2011: 1-8 - [p1]Di Xiao, Xiaofeng Liao, Shaojiang Deng:
Chaos Based Hash Function. Chaos-Based Cryptography 2011: 137-203 - 2010
- [c4]Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai:
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. IWDW 2010: 45-59
2000 – 2009
- 2009
- [j6]Di Xiao, Xiaofeng Liao, Yong Wang:
Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 72(10-12): 2288-2296 (2009) - [j5]Qing Zhou, Xiaofeng Liao, Kwok-Wo Wong, Yue Hu, Di Xiao:
True random number generator based on mouse movement and chaotic hash function. Inf. Sci. 179(19): 3442-3450 (2009) - 2008
- [j4]Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong:
One-way hash function construction based on 2D coupled map lattices. Inf. Sci. 178(5): 1391-1406 (2008) - [j3]Di Xiao, Xiaofeng Liao, Shaojiang Deng:
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6): 1598-1602 (2008) - 2007
- [j2]Di Xiao, Xiaofeng Liao, Shaojiang Deng:
A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4): 1136-1142 (2007) - 2006
- [j1]Di Xiao, Xiaofeng Liao, Kwok-Wo Wong:
Improving the security of a dynamic look-up table based chaotic cryptosystem. IEEE Trans. Circuits Syst. II Express Briefs 53-II(6): 502-506 (2006) - 2005
- [c3]Hongying Zheng, Lin Ni, Di Xiao:
Intrusion Detection Based on MLP Neural Networks and K-Means Algorithm. ISNN (3) 2005: 434-438 - [c2]Shaojiang Deng, Linhua Zhang, Di Xiao:
Image Encryption Scheme Based on Chaotic Neural System. ISNN (2) 2005: 868-872 - 2004
- [c1]Di Xiao, Xiaofeng Liao:
A Combined Hash and Encryption Scheme by Chaotic Neural Network. ISNN (2) 2004: 633-638
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint