Yushu Zhang (张玉书)
Nanjing University of Aeronautics and Astronautics
H-index: 50
Asia-China
Top articles of Yushu Zhang (张玉书)
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service | IEEE Transactions on Services Computing (TSC) | Zhongyun Hua Yufei Yao Mingyang Song Yifeng Zheng Yushu Zhang | 2024 |
Adversarial visible watermark attack based on intelligent evolutionary algorithm | Computer Engineering & Science | JI Jun-hao ZHANG Yu-shu ZHAO Ruo-yu WEN Wen-ying DONG Li | 2024/1/25 |
Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales | arXiv preprint arXiv:2402.15430 | Shuren Qi Yushu Zhang Chao Wang Zhihua Xia Xiaochun Cao | 2024/2/23 |
4DPM: Deepfake Detection with a Denoising Diffusion Probabilistic Mask | IEEE Signal Processing Letters | Rui Yang Zhenrong Deng Yushu Zhang Xiaonan Luo Rushi Lan | 2024/3/19 |
TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion | IEEE Signal Processing Letters | Wenying Wen Qiyu Jiang Haigang Huang Yushu Zhang Yuming Fang | 2024/4/3 |
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption | IEEE Internet of Things Journal | Dezhi An Dawei Hao Jun Lu Jun Mou Ruoyu Zhao | 2024/1/22 |
基于智能进化算法的可见水印对抗攻击. | Computer Engineering & Science/Jisuanji Gongcheng yu Kexue | 季俊豪, 张玉书, 赵若宇, 温文媖, 董理 | 2024/1/1 |
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images | Applied Intelligence | Xiuli Chai Guoqiang Long Zhihua Gan Yushu Zhang | 2024/2/23 |
Exploiting Four-Dimensional Chaotic Systems with Dissipation and Optimized Logical Operations for Secure Image Compression and Encryption | IEEE Transactions on Circuits and Systems for Video Technology | Mengxin Gong Xiuli Chai Yang Lu Yushu Zhang | 2024/3/14 |
An Explainable Intellectual Property Protection Method for Deep Neural Networks based on Intrinsic Features | IEEE Transactions on Artificial Intelligence | Mingfu Xue Xin Wang Yinghao Wu Shifeng Ni Leo Yu Zhang | 2024/4/16 |
Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages | IEEE Transactions on Network Science and Engineering | Wenying Wen Haigang Huang Shuren Qi Yushu Zhang Yuming Fang | 2024/1/16 |
Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images | ACM Transactions on Multimedia Computing, Communications and Applications | Xingyu Liu Zhongyun Hua Shuang Yi Yushu Zhang Yicong Zhou | 2024 |
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query | Frontiers of Computer Science | Xingxin LI Youwen ZHU Rui XU Jian WANG Yushu ZHANG | 2024/2/15 |
RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things | IEEE Internet of Things Journal | Zhen Chen Xiuli Chai Zhihua Gan Binjie Wang Yushu Zhang | 2024/3/5 |
SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things | Biomedical Signal Processing and Control | Xiuli Chai Zongwei Tang Zhihua Gan Yang Lu Binjie Wang | 2024/4/1 |
Representing noisy image without denoising | IEEE Transactions on Pattern Analysis and Machine Intelligence | Shuren Qi Yushu Zhang Chao Wang Tao Xiang Xiaochun Cao | 2024/4/10 |
Reversible gender privacy enhancement via adversarial perturbations | Neural Networks | Yiyi Xie Yuqian Zhou Tao Wang Wenying Wen Shuang Yi | 2024/1/15 |
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark | IEEE Transactions on Information Forensics and Security (TIFS) | Zhongyun Hua Yan Tong Yifeng Zheng Yuhong Li Yushu Zhang | 2024 |
A 3D model encryption method supporting adaptive visual effects after decryption | Advanced Engineering Informatics | Shimin Li Ruoyu Zhao Qingxiao Guan Junxin Chen Yushu Zhang | 2024/1/1 |
基于模糊测试的智能合约正确性检测. | Journal of Computer Engineering & Applications | 王嘉诚, 蒋佳佳, 赵佳豪, 张玉书, 王良民 | 2024/3/1 |