Follow
Leo Yu ZHANG
Leo Yu ZHANG
Other namesLeo Zhang
School of Info Technology, Deakin University
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials, 2018
2082018
A Review of Compressive Sensing in Information Security Field
Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He
IEEE Access, 2016
1782016
On the security of a class of diffusion mechanisms for image encryption
LY Zhang, Y Liu, F Pareschi, Y Zhang, KW Wong, R Rovatti, G Setti
IEEE Transactions on Cybernetics 48 (4), 1163 - 1175, 2018
1212018
Embedding cryptographic features in compressive sensing
Y Zhang, KW Wong, D Xiao, LY Zhang, M Li
Neurocomputing 40 (12), 472-480, 2016
1202016
A chaotic image encryption scheme owning temp-value feedback
LY Zhang, X Hu, Y Liu, KW Wong, J Gan
Communications in Nonlinear Science and Numerical Simulation, 2013
1192013
Breaking a novel colour image encryption algorithm based on chaos
C Li, LY Zhang, R Ou, KW Wong, S Shu
Nonlinear dynamics, 1-6, 2012
1152012
Low-cost and confidentiality-preserving data acquisition for internet of multimedia things
Y Zhang, Q He, Y Xiang, LY Zhang, B Liu, J Chen, Y Xie
IEEE Internet of Things Journal 5 (5), 3442-3451, 2017
1012017
Breaking a chaotic image encryption algorithm based on perceptron model
LY Zhang, C Li, Q Li, D Zhang, S Shu
Nonlinear Dynamics 69 (3), 1091-1096, 2012
992012
Bi-level Protected Compressive Sampling
LY Zhang, KW WONG, Y ZHANG, J Zhou
IEEE Transactions on Multimedia 18 (9), 1720 - 1732, 2016
90*2016
Compressive Sensing
Y Zhang, Y Xiang, LY Zhang
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT, 1-9, 2019
68*2019
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Y Liu, LY Zhang, J Wang, Y Zhang, K Wong
Nonlinear Dynamics 84 (4), 2241-2250, 2015
652015
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
LY Zhang, C Li, KW Wong, S Shu, G Chen
Journal of Systems and Software 85 (9), 2077-2085, 2012
612012
Breaking a chaotic image encryption algorithm based on modulo addition and xor operation
C Li, Y Liu, LY Zhang, MZQ Chen
International Journal of Bifurcation and Chaos 23 (04), 1350075, 2013
562013
A genetic algorithm for constructing bijective substitution boxes with high nonlinearity
Y Wang, Z Zhang, LY Zhang, J Feng, G Gao, L Peng
Information Sciences 523, 152-166, 2020
552020
Improved known-plaintext attack to permutation-only multimedia ciphers
LY Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen
Information Sciences 430, 228-239, 2018
532018
Secure wireless communications based on compressive sensing: a survey
Y Zhang, Y Xiang, LY Zhang, Y Rong, S Guo
IEEE Communications Surveys & Tutorials 21 (2), 1093-1111, 2018
522018
Medical image cipher using hierarchical diffusion and non-sequential encryption
J Chen, L Chen, LY Zhang, Z Zhu
Nonlinear Dynamics 96, 301-322, 2019
482019
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem
C Li, Y Liu, LY Zhang, KW Wong
Signal Processing: Image Communication 29 (8), 914-920, 2014
432014
Defining embedding distortion for intra prediction mode-based video steganography
Q Nie, X Xu, B Feng, LY Zhang
Computers, Materials & Continua 55 (1), 59-70, 2018
362018
Compressed Sensing Based Selective Encryption With Data Hiding Capability
J Wang, LY Zhang, J Chen, G Hua, Y Zhang, Y Xiang
IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2019.2924083, 2019
322019
The system can't perform the operation now. Try again later.
Articles 1–20