Novel threshold changeable secret sharing schemes based on polynomial interpolation L Yuan, M Li, C Guo, KKR Choo, Y Ren PloS one 11 (10), e0165512, 2016 | 20 | 2016 |
Secret image sharing scheme with threshold changeable capability L Yuan, M Li, C Guo, W Hu, X Luo Mathematical Problems in Engineering 2016, 2016 | 17 | 2016 |
An evaluation of deep learning-based computer generated image detection approaches X Ni, L Chen, L Yuan, G Wu, Y Yao IEEE Access 7, 130830-130840, 2019 | 14 | 2019 |
Reversible data hiding in encrypted images using median edge detector and two’s complement R Wang, G Wu, Q Wang, L Yuan, Z Zhang, G Miao Symmetry 13 (6), 921, 2021 | 13 | 2021 |
A verifiable e-voting scheme with secret sharing LYMLCGWHZ Wang International Journal of Network Security 19 (2), 260-271, 2017 | 12* | 2017 |
A verifiable e-voting scheme with secret sharing L Yuan, M Li, C Guo, W Hu, X Tan 2015 IEEE 16th International Conference on Communication Technology (ICCT …, 2015 | 12 | 2015 |
A reversible steganography scheme of secret image sharing based on cellular automata and least significant bits construction WT Hu, MC Li, C Guo, LF Yuan Mathematical Problems in Engineering 2015, 2015 | 12 | 2015 |
Data poisoning attacks on graph convolutional matrix completion Q Zhou, Y Ren, T Xia, L Yuan, L Chen International conference on algorithms and architectures for parallel …, 2019 | 11 | 2019 |
A group authentication scheme supporting cheating detection and identification C Guo, R Zhuang, L Yuan, B Feng 2015 Ninth International Conference on Frontier of Computer Science and …, 2015 | 8 | 2015 |
A lossless secret image sharing scheme using a larger finite field W Hu, T Wu, Y Chen, Y Shen, L Yuan Multimedia Tools and Applications 80 (19), 28731-28743, 2021 | 7 | 2021 |
A new blockchain-based multi-level location secure sharing scheme Q Wang, T Xia, Y Ren, L Yuan, G Miao Applied Sciences 11 (5), 2260, 2021 | 5 | 2021 |
A novel threshold changeable secret image sharing scheme G Wu, M Wang, Q Wang, Y Yao, L Yuan, G Miao Symmetry 13 (2), 286, 2021 | 2 | 2021 |
Cps: A Community Priority Based Vaccine Distribution Strategy in Different Networks M Jiang, Y Ren, Y Yao, L Yuan, T Wu, Z Wang 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 2 | 2018 |
一种利用数独和细胞自动机的秘密图像共享方案 胡伟通, 李明楚, 郭成, 袁理锋 小型微型计算机系统 36 (6), 1271-1275, 2015 | 2 | 2015 |
SNN-PPRL: A secure record matching scheme based on siamese neural network S Yao, Y Ren, D Wang, Y Wang, W Yin, L Yuan Journal of Information Security and Applications 76, 103529, 2023 | 1 | 2023 |
A Study of Local Differential Privacy Mechanisms Based on Federated Learning Y REN, R LIU, D WANG, L YUAN, Y SHEN, G WU, Q WANG, C YANG 电子与信息学报 45 (3), 784-792, 2023 | 1 | 2023 |
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems Y Ren, Z Li, L Yuan, Z Zhang, C Su, Y Wang, G Wu IEICE TRANSACTIONS on Information and Systems 105 (2), 289-299, 2022 | 1 | 2022 |
DGNN: Dependency Graph Neural Network for Multimodal Emotion Recognition in Conversation Z Zhang, X Wang, L Yuan, G Miao, M Liu, W Yun, G Wu International Conference on Neural Information Processing, 86-99, 2023 | | 2023 |
Feature Attribution-Guided Contrastive Learning: Mitigating Lexical Bias in Toxic Speech Detection Z Peng, Y Ren, D Wang, L Zhang, L Yuan, Y Ji 2023 International Conference on New Trends in Computational Intelligence …, 2023 | | 2023 |
Chinese Event Causality Identification Based on Retrieval Enhancement Y Gao, Y Ren, J Rao, Z Chen, Q Xi, H Wang, D Wang, L Yuan CCF International Conference on Natural Language Processing and Chinese …, 2023 | | 2023 |