School of Info Technology, Deakin University
Verified email at deakin.edu.au - Homepage
Cited by
Cited by
A Review of Compressive Sensing in Information Security Field
Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He
IEEE Access, 2016
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials, 2018
Breaking a novel colour image encryption algorithm based on chaos
C Li, LY Zhang, R Ou, KW Wong, S Shu
Nonlinear dynamics, 1-6, 2012
Embedding cryptographic features in compressive sensing
Y Zhang, KW Wong, D Xiao, LY Zhang, M Li
Neurocomputing 40 (12), 472-480, 2016
A chaotic image encryption scheme owning temp-value feedback
LY Zhang, X Hu, Y Liu, KW Wong, J Gan
Communications in Nonlinear Science and Numerical Simulation, 2013
On the security of a class of diffusion mechanisms for image encryption
LY Zhang, Y Liu, F Pareschi, Y Zhang, KW Wong, R Rovatti, G Setti
IEEE Transactions on Cybernetics 48 (4), 1163 - 1175, 2018
Breaking a chaotic image encryption algorithm based on perceptron model
LY Zhang, C Li, Q Li, D Zhang, S Shu
Nonlinear Dynamics 69 (3), 1091-1096, 2012
Bi-level Protected Compressive Sampling
LY Zhang, KW WONG, Y ZHANG, J Zhou
IEEE Transactions on Multimedia 18 (9), 1720 - 1732, 2016
Low-cost and confidentiality-preserving data acquisition for internet of multimedia things
Y Zhang, Q He, Y Xiang, LY Zhang, B Liu, J Chen, Y Xie
IEEE Internet of Things Journal 5 (5), 3442-3451, 2017
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
LY Zhang, C Li, KW Wong, S Shu, G Chen
Journal of Systems and Software 85 (9), 2077-2085, 2012
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Y Liu, LY Zhang, J Wang, Y Zhang, K Wong
Nonlinear Dynamics 84 (4), 2241-2250, 2015
Breaking a chaotic image encryption algorithm based on modulo addition and xor operation
C Li, Y Liu, LY Zhang, MZQ Chen
International Journal of Bifurcation and Chaos 23 (04), 1350075, 2013
Compressive Sensing
Y Zhang, Y Xiang, LY Zhang
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT, 1-9, 2019
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
C Li, Y Liu, LY Zhang, KW Wong
Signal Processing: Image Communication 29 (8), 914-920, 2014
Improved known-plaintext attack to permutation-only multimedia ciphers
LY Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen
Information Sciences 430, 228-239, 2018
Secure wireless communications based on compressive sensing: a survey
Y Zhang, Y Xiang, LY Zhang, Y Rong, S Guo
IEEE Communications Surveys & Tutorials 21 (2), 1093-1111, 2018
Medical image cipher using hierarchical diffusion and non-sequential encryption
J Chen, L Chen, LY Zhang, Z Zhu
Nonlinear Dynamics 96 (1), 301-322, 2019
A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions
Y Zhang, J Zhou, F Chen, LY Zhang, D Xiao, B Chen, X Liao
International Journal of Bifurcation and Chaos 26 (11), 1650191, 2016
A genetic algorithm for constructing bijective substitution boxes with high nonlinearity
Y Wang, Z Zhang, LY Zhang, J Feng, G Gao, L Peng
Information Sciences 523, 152-166, 2020
Exploiting random convolution and random subsampling for image encryption and compression
Y Zhang, LY Zhang
Electron. Lett 51 (20), 1572-1574, 2015
The system can't perform the operation now. Try again later.
Articles 1–20