default search action
Chengqing Li
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Yuchen Ren, Hegui Zhu, Chong Liu, Chengqing Li:
Efficient polar coordinates attack with adaptive activation strategy. Expert Syst. Appl. 249: 123850 (2024) - [j49]Chengqing Li, Xianhui Shen, Sheng Liu:
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map. IEEE Multim. 31(1): 99-109 (2024) - [j48]Ke You, Pengbo Chen, Chengqing Li:
Cryptanalyzing an Image Encryption Algorithm Underpinned by a 3-D Boolean Convolution Neural Network. IEEE Multim. 31(4): 17-24 (2024) - [j47]Shaoxuan He, Hongjiao Yang, Chengqing Li, Xianhui Shen:
Cryptanalyzing an Image Encryption Scheme Using Synchronization of Memristor Chaotic Systems. Int. J. Bifurc. Chaos 34(11): 2450138:1-2450138:9 (2024) - [j46]Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C.-C. Jay Kuo:
Recovering sign bits of DCT coefficients in digital images as an optimization problem. J. Vis. Commun. Image Represent. 98: 104045 (2024) - [j45]Xuenan Peng, Chengqing Li, Yicheng Zeng, Chun-Lai Li:
Adjusting Dynamics of Hopfield Neural Network via Time-Variant Stimulus. IEEE Trans. Circuits Syst. I Regul. Pap. 71(7): 3242-3255 (2024) - [j44]Hegui Zhu, Zhan Gao, Jiayi Wang, Yange Zhou, Chengqing Li:
Few-Shot Fine-Grained Image Classification via Multi-Frequency Neighborhood and Double-Cross Modulation. IEEE Trans. Multim. 26: 10264-10278 (2024) - [c8]Kai Tan, Chengqing Li:
Network Analysis of Baker's Map Implemented in a Fixed-Point Arithmetic Domain. ISIT 2024: 1332-1337 - [i52]Xiaoxiong Lu, Chengqing Li, Bo Zhou:
Graph Structure of an Inversive Pseudorandom Number Generator over Ring Zpe. CoRR abs/2401.08161 (2024) - [i51]Xuenan Peng, Chengqing Li, Yicheng Zeng, Chun-Lai Li:
Adjusting Dynamics of Hopfield Neural Network via Time-variant Stimulus. CoRR abs/2402.18584 (2024) - 2023
- [j43]Xiaoxiong Lu, Eric Yong Xie, Chengqing Li:
Periodicity Analysis of the Logistic Map Over Ring ℤ3n. Int. J. Bifurc. Chaos 33(5): 2350063:1-2350063:9 (2023) - [j42]Siwang Zhou, Xiaoning Deng, Chengqing Li, Yonghe Liu, Hongbo Jiang:
Recognition-Oriented Image Compressive Sensing With Deep Learning. IEEE Trans. Multim. 25: 2022-2032 (2023) - [i50]Xiaoxiong Lu, Eric Yong Xie, Chengqing Li:
Periodicity Analysis of the Logistic Map over Ring ℤ3n. CoRR abs/2304.12193 (2023) - [i49]Chengqing Li, Sheng Liu:
Recovering the Block-wise Relationship in an Encryption-Then-Compression System. CoRR abs/2305.04543 (2023) - 2022
- [j41]Sheng Liu, Chengqing Li, Qiao Hu:
Cryptanalyzing Two Image Encryption Algorithms Based on a First-Order Time-Delay System. IEEE Multim. 29(1): 74-84 (2022) - [j40]Lei Chen, Chengqing Li, Chao Li:
Security measurement of a medical communication scheme based on chaos and DNA coding. J. Vis. Commun. Image Represent. 83: 103424 (2022) - [j39]Chengqing Li, Kai Tan, Bingbing Feng, Jinhu Lü:
The Graph Structure of the Generalized Discrete Arnold's Cat Map. IEEE Trans. Computers 71(2): 364-377 (2022) - [j38]Hegui Zhu, Ruoyang Xiao, Jiapeng Zhang, Jinhai Liu, Chengqing Li, Lianping Yang:
A Driving Behavior Risk Classification Framework via the Unbalanced Time Series Samples. IEEE Trans. Instrum. Meas. 71: 1-12 (2022) - [i48]Hegui Zhu, Zhan Gao, Jiayi Wang, Yange Zhou, Chengqing Li:
Few-shot Fine-grained Image Classification via Multi-Frequency Neighborhood and Double-cross Modulation. CoRR abs/2207.08547 (2022) - [i47]Chengqing Li, Xianhui Shen, Sheng Liu:
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2D Lag-Complex Logistic Map. CoRR abs/2208.06774 (2022) - [i46]Ruiyuan Lin, Sheng Liu, Jun Jiang, Shujun Li, Chengqing Li, C.-C. Jay Kuo:
Recovering Sign Bits of DCT Coefficients in Digital Images as an Optimization Problem. CoRR abs/2211.01096 (2022) - 2021
- [j37]Siwang Zhou, Yan He, Yonghe Liu, Chengqing Li, Jianming Zhang:
Multi-Channel Deep Networks for Block-Based Image Compressive Sensing. IEEE Trans. Multim. 23: 2627-2640 (2021) - [i45]Sheng Liu, Chengqing Li, Qiao Hu:
Cryptanalyzing two image encryption algorithms based on a first-order time-delay system. CoRR abs/2109.11718 (2021) - 2020
- [j36]Yunling Ma, Chengqing Li, Bo Ou:
Cryptanalysis of an image block encryption algorithm based on chaotic maps. J. Inf. Secur. Appl. 54: 102566 (2020)
2010 – 2019
- 2019
- [j35]Chengqing Li, Yun Zhang, Eric Yong Xie:
When an attacker meets a cipher-image in 2018: A year in review. J. Inf. Secur. Appl. 48 (2019) - [j34]Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths, Guanrong Chen:
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(6): 2322-2335 (2019) - [j33]Ning Wang, Chengqing Li, Han Bao, Mo Chen, Bocheng Bao:
Generating Multi-Scroll Chua's Attractors via Simplified Piecewise-Linear Chua's Diode. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(12): 4767-4779 (2019) - [c7]Chengqing Li, Jinhu Lu, Guanrong Chen:
Network Analysis of Chaotic Dynamics in Fixed-Precision Digital Domain. ISCAS 2019: 1-5 - [i44]Chengqing Li:
When an attacker meets a cipher-image in 2018: A Year in Review. CoRR abs/1903.11764 (2019) - [i43]Lei Chen, Chengqing Li:
Cryptanalyzing a Medical Privacy Protection Scheme based on DNA Coding and Chaos. CoRR abs/1908.02553 (2019) - [i42]Siwang Zhou, Yan He, Yonghe Liu, Chengqing Li:
Multi-Channel Deep Networks for Block-Based Image Compressive Sensing. CoRR abs/1908.11221 (2019) - [i41]Yunling Ma, Chengqing Li:
Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps. CoRR abs/1912.12915 (2019) - 2018
- [j32]Chengqing Li, Dongdong Lin, Bingbing Feng, Jinhu Lu, Feng Hao:
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy. IEEE Access 6: 75834-75842 (2018) - [j31]Chengqing Li, Dongdong Lin, Jinhu Lu, Feng Hao:
Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography. IEEE Multim. 25(4): 46-56 (2018) - [j30]Zhongyun Hua, Shuang Yi, Yicong Zhou, Chengqing Li, Yue Wu:
Designing Hyperchaotic Cat Maps With Any Desired Number of Positive Lyapunov Exponents. IEEE Trans. Cybern. 48(2): 463-473 (2018) - [i40]Chengqing Li, Bingbing Feng, Jinhu Lü:
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy. CoRR abs/1803.10024 (2018) - 2017
- [j29]Chengqing Li, Dongdong Lin, Jinhu Lu:
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits. IEEE Multim. 24(3): 64-71 (2017) - [j28]Cheng Xu, Chengqing Li, Jinhu Lü, Shi Shu:
On the Network Analysis of the State Space of Discrete Dynamical Systems. Int. J. Bifurc. Chaos 27(4): 1750062:1-1750062:4 (2017) - [j27]Qiuye Gan, Simin Yu, Chengqing Li, Jinhu Lü, Zhuosheng Lin, Ping Chen:
Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication. Int. J. Circuit Theory Appl. 45(11): 1849-1872 (2017) - [j26]Eric Yong Xie, Chengqing Li, Simin Yu, Jinhu Lü:
On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Process. 132: 150-154 (2017) - [i39]Zhetao Li, Hongqing Zeng, Chengqing Li, Jun Fang:
Greedy Sparse Signal Reconstruction Using Matching Pursuit Based on Hope-tree. CoRR abs/1701.02922 (2017) - [i38]Chengqing Li, Dongdong Lin:
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. CoRR abs/1711.01858 (2017) - 2016
- [j25]Zhuosheng Lin, Simin Yu, Chengqing Li, Jinhu Lü, Qianxue Wang:
Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission. Int. J. Bifurc. Chaos 26(9): 1650158:1-1650158:8 (2016) - [j24]Chengqing Li:
Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process. 118: 203-210 (2016) - [j23]Xiaowei Li, Chengqing Li, In-Kwon Lee:
Chaotic image encryption using pseudo-random masks and pixel mapping. Signal Process. 125: 48-63 (2016) - [j22]Qianxue Wang, Simin Yu, Chengqing Li, Jinhu Lu, Xiaole Fang, Christophe Guyeux, Jacques M. Bahi:
Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 63-I(3): 401-412 (2016) - [i37]Chengqing Li, Dongdong Lin:
Cryptanalysis of an Image Scrambling Encryption Algorithm. CoRR abs/1607.01642 (2016) - [i36]Eric Yong Xie, Chengqing Li, Simin Yu, Jinhu Lü:
On Cryptanalysis of Fridrich's chaotic image encryption scheme. CoRR abs/1609.05352 (2016) - [i35]Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen:
On the security defects of an image encryption scheme. CoRR abs/1610.02534 (2016) - [i34]Qiuye Gan, Simin Yu, Chengqing Li, Jinhu Lü, Zhuosheng Lin, Ping Chen:
Design and ARM-embedded implementation of a chaotic map-based multicast scheme for multiuser speech wireless communication. CoRR abs/1612.01837 (2016) - 2015
- [j21]Yuansheng Liu, Hua Fan, Eric Yong Xie, Ge Cheng, Chengqing Li:
Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps. Int. J. Bifurc. Chaos 25(13): 1550188:1-1550188:9 (2015) - [j20]Kongfeng Zhu, Chengqing Li, Vijayan K. Asari, Dietmar Saupe:
No-Reference Video Quality Assessment Based on Artifact Measurement and Statistical Analysis. IEEE Trans. Circuits Syst. Video Technol. 25(4): 533-546 (2015) - [i33]Xiaowei Li, Chengqing Li, Seok-Tae Kim, In-Kwon Lee:
An optical image encryption scheme based on depth-conversion integral imaging and chaotic maps. CoRR abs/1501.04167 (2015) - [i32]Chengqing Li:
Cracking a hierarchical chaotic image encryption algorithm based on permutation. CoRR abs/1505.00335 (2015) - 2014
- [j19]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-Wo Wong:
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem. Signal Process. Image Commun. 29(8): 914-920 (2014) - [i31]Yuansheng Liu, Eric Yong Xie, Ge Cheng, Chengqing Li:
Deciphering a novel image cipher based on mixed transformed Logistic maps. CoRR abs/1404.3600 (2014) - [i30]Leo Yu Zhang, Kwok-Wo Wong, Chengqing Li, Yushu Zhang:
Towards Secure Compressive Sampling Scheme. CoRR abs/1406.1725 (2014) - [i29]Chengqing Li:
Network analysis of the state space of chaotic map in digital domain. CoRR abs/1410.7694 (2014) - 2013
- [j18]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Michael Z. Q. Chen:
Breaking a Chaotic Image Encryption Algorithm Based on Modulo Addition and XOR Operation. Int. J. Bifurc. Chaos 23(4) (2013) - [j17]Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Changji Wang:
Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7): 2427-2439 (2013) - [i28]Chengqing Li, Tao Xie, Qi Liu:
Cryptanalyzing an image encryption scheme based on logistic map. CoRR abs/1301.4089 (2013) - [i27]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Kwok-Wo Wong:
Breaking an image compression and encryption scheme based on Chinese Remainder Theorem. CoRR abs/1306.5615 (2013) - 2012
- [j16]Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J. Syst. Softw. 85(9): 2077-2085 (2012) - [j15]Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Chun-Hui Wu:
On the impossibility of non-static quantum bit commitment between two parties. Quantum Inf. Process. 11(2): 519-527 (2012) - [i26]Chengqing Li, Leo Yu Zhang, Rong Ou, Kwok-Wo Wong:
Breaking a novel colour image encryption algorithm based on chaos. CoRR abs/1203.5467 (2012) - [i25]Chengqing Li, Yuansheng Liu, Leo Yu Zhang, Michael Z. Q. Chen:
Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. CoRR abs/1207.6536 (2012) - [i24]Chengqing Li, Yuansheng Liu, Tao Xie:
Breaking a novel image encryption scheme based on improved hyperchaotic sequences. CoRR abs/1211.3553 (2012) - 2011
- [j14]Chengqing Li, Michael Z. Q. Chen, Kwok-Tung Lo:
Breaking an Image Encryption Algorithm Based on Chaos. Int. J. Bifurc. Chaos 21(7): 2067-2076 (2011) - [j13]Chengqing Li, Kwok-Tung Lo:
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4): 949-954 (2011) - [c6]Shujun Li, Chengqing Li, C.-C. Jay Kuo:
On the security of a secure Lempel-Ziv-Welch (LZW) algorithm. ICME 2011: 1-5 - [i23]Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Chun-Hui Wu:
On the impossibility of non-static quantum bit commitment between two parties. CoRR abs/1101.5684 (2011) - [i22]Yu Zhang, Chengqing Li, Qin Li, Dan Zhang, Shi Shu:
Breaking a chaotic image encryption algorithm based on perceptron model. CoRR abs/1111.1410 (2011) - [i21]Leo Yu Zhang, Chengqing Li, Kwok-Wo Wong, Shi Shu, Guanrong Chen:
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. CoRR abs/1112.4941 (2011) - 2010
- [j12]Chengqing Li, David Arroyo, Kwok-Tung Lo:
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps. Int. J. Bifurc. Chaos 20(8): 2561-2568 (2010) - [j11]Chengqing Li, Shujun Li, Kwok-Tung Lo, Kyandoghere Kyamakya:
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system. J. Syst. Softw. 83(8): 1443-1452 (2010) - [c5]Chengqing Li, Kwok-Tung Lo:
Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN. PCM (1) 2010: 601-610 - [i20]Chengqing Li, Michael Z. Q. Chen, Kwok-Tung Lo:
Breaking an image encryption algorithm based on chaos. CoRR abs/1007.3862 (2010)
2000 – 2009
- 2009
- [j10]Chengqing Li, Shujun Li, Guanrong Chen, Wolfgang A. Halang:
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis. Comput. 27(8): 1035-1039 (2009) - [j9]Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen:
On the security defects of an image encryption scheme. Image Vis. Comput. 27(9): 1371-1381 (2009) - [i19]Chengqing Li, Shujun Li, Kwok-Tung Lo:
Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps. CoRR abs/0907.0821 (2009) - [i18]Chengqing Li, David Arroyo, Kwok-Tung Lo:
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps. CoRR abs/0907.3177 (2009) - [i17]Chengqing Li, Shujun Li, Kwok-Tung Lo, Kyandoghere Kyamakya:
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS). CoRR abs/0908.2496 (2009) - [i16]Chengqing Li, Kwok-Tung Lo:
Security analysis of a binary image permutation scheme based on Logistic map. CoRR abs/0912.1918 (2009) - [i15]Chengqing Li, Shujun Li, Kwok-Tung Lo:
Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. CoRR abs/0912.3050 (2009) - 2008
- [j8]Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of the RCES/RSES image encryption scheme. J. Syst. Softw. 81(7): 1130-1143 (2008) - [j7]Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo:
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. Image Commun. 23(3): 212-223 (2008) - [j6]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalyzing an Encryption Scheme Based on Blind Source Separation. IEEE Trans. Circuits Syst. I Regul. Pap. 55-I(4): 1055-1063 (2008) - [j5]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion. IEEE Trans. Circuits Syst. Video Technol. 18(3): 338-349 (2008) - [c4]Chengqing Li, Guanrong Chen:
On the security of a class of image encryption schemes. ISCAS 2008: 3290-3293 - 2007
- [i14]David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez, Wolfgang A. Halang:
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. CoRR abs/0710.5465 (2007) - [i13]David Arroyo, Chengqing Li, Shujun Li, Gonzalo Álvarez:
Cryptanalysis of a computer cryptography scheme based on a filter bank. CoRR abs/0710.5471 (2007) - [i12]Chengqing Li, Dan Zhang, Guanrong Chen:
Cryptanalysis of an image encryption scheme based on the Hill cipher. CoRR abs/0712.0693 (2007) - [i11]Chengqing Li, Shujun Li, Guanrong Chen, Wolfgang A. Halang:
Cryptanalysis of an Image Encryption Scheme Based on a Compound Chaotic Sequence. CoRR abs/0712.3964 (2007) - [i10]Chengqing Li, Guanrong Chen:
On the security of a class of image encryption schemes. IACR Cryptol. ePrint Arch. 2007: 339 (2007) - [i9]Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen:
On the security defects of an image encryption scheme. IACR Cryptol. ePrint Arch. 2007: 397 (2007) - 2006
- [j4]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an image encryption scheme. J. Electronic Imaging 15(4): 043012 (2006) - [j3]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). J. Syst. Softw. 79(2): 253-258 (2006) - [j2]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. J. Syst. Softw. 79(12): 1789 (2006) - [i8]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation. CoRR abs/cs/0608024 (2006) - [i7]Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of a chaotic block cipher with external key and its improved version. CoRR abs/nlin/0608020 (2006) - [i6]Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen:
Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion. IACR Cryptol. ePrint Arch. 2006: 215 (2006) - [i5]Chengqing Li:
Cryptanalyses of Some Multimedia Encryption Schemes. IACR Cryptol. ePrint Arch. 2006: 340 (2006) - 2005
- [j1]Chengqing Li, Shujun Li, Guanrong Chen, Gang Chen, Lei Hu:
Cryptanalysis of a New Signal Security System for Multimedia Data Transmission. EURASIP J. Adv. Signal Process. 2005(8): 1277-1288 (2005) - [c3]Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen:
Cryptanalysis of a multistage encryption system. ISCAS (2) 2005: 880-883 - [c2]Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen:
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. ISNN (2) 2005: 630-636 - [i4]Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang:
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). CoRR abs/cs/0501013 (2005) - 2004
- [c1]Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen:
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. PCM (3) 2004: 418-425 - [i3]Chengqing Li, Shujun Li, Xiaofeng Liao, Guanrong Chen:
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. CoRR abs/cs/0412103 (2004) - [i2]Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, Kwok-Tung Lo:
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. IACR Cryptol. ePrint Arch. 2004: 374 (2004) - [i1]Shujun Li, Chengqing Li, Guanrong Chen, Kwok-Tung Lo:
Cryptanalysis of RCES/RSES Image Encryption Scheme. IACR Cryptol. ePrint Arch. 2004: 376 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint