default search action
Conghuan Ye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Conghuan Ye, Shenglong Tan, Zheng Wang, Binghua Shi, Li Shi:
Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security. Entropy 25(7): 1031 (2023) - [j14]Conghuan Ye, Shenglong Tan, Zheng Wang, Li Shi, Jun Wang:
A secure social multimedia sharing scheme in the TSHWT_SVD domain based on neural network. Multim. Tools Appl. 82(10): 15395-15414 (2023) - 2021
- [j13]Mengjia Yin, Xianbin Xu, Tao Zhang, Conghuan Ye:
Performance Evaluation Model for Matrix Calculation on GPU. Int. J. Pattern Recognit. Artif. Intell. 35(15): 2154030:1-2154030:26 (2021) - [j12]Zenggang Xiong, Zhiwen Tang, Xiaowen Chen, Xue-min Zhang, Kaibin Zhang, Conghuan Ye:
Research on Image Retrieval Algorithm Based on Combination of Color and Shape Features. J. Signal Process. Syst. 93(2-3): 139-146 (2021) - [j11]Zenggang Xiong, Nan Xiao, Fang Xu, Xuemin Zhang, Qiong Xu, Kaibin Zhang, Conghuan Ye:
An Equivalent Exchange Based Data Forwarding Incentive Scheme for Socially Aware Networks. J. Signal Process. Syst. 93(2-3): 249-263 (2021) - [j10]Youfeng Li, Zenggang Xiong, Conghuan Ye, Xuemin Zhang, Fang Xu, Xiaochao Zhao:
Subspace Identification of Closed-Loop EIV System Based on Instrumental Variables Using Orthoprojection. J. Signal Process. Syst. 93(2-3): 345-355 (2021) - [j9]Nan Xiao, Rang Xinyi, Zenggang Xiong, Fang Xu, Xuemin Zhang, Qiong Xu, Xiaochao Zhao, Conghuan Ye:
A Diversity-based Selfish Node Detection Algorithm for Socially Aware Networking. J. Signal Process. Syst. 93(7): 811-825 (2021)
2010 – 2019
- 2019
- [j8]Fang Xu, Min Deng, Zenggang Xiong, Conghuan Ye, Ning Xu:
移动社会网络中基于多维上下文匹配的数据转发算法 (Data Forwarding Algorithm Based on Multidimensional Context Matching in Mobile Social Networks). 计算机科学 46(2): 81-87 (2019) - [j7]Zenggang Xiong, Yuan Wu, Conghuan Ye, Xuemin Zhang, Fang Xu:
Color image chaos encryption algorithm combining CRC and nine palace map. Multim. Tools Appl. 78(22): 31035-31055 (2019) - 2017
- [j6]Mengjia Yin, Xianbin Xu, Shuibing He, Jing Hu, Conghuan Ye, Tao Zhang:
GPU稀疏矩阵向量乘的性能模型构造 (Performance Model of Sparse Matrix Vector Multiplication on GPU). 计算机科学 44(4): 182-187 (2017) - [c6]Weihu Wang, Zenggang Xiong, Yanshen Liu, Fang Xu, Conghuan Ye:
The Research How to Judge Social Vehicles Driving into ART. SmartCom 2017: 239-248 - 2016
- [j5]Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu, Zhen Liu:
Secure social multimedia content distribution based on social network analysis. Int. J. Reason. based Intell. Syst. 8(1/2): 69-75 (2016) - [j4]Lanying Huang, Zenggang Xiong, Guangwei Wang, Conghuan Ye:
A trust-based cloud computing access control model. Int. J. Knowl. Based Intell. Eng. Syst. 20(4): 197-203 (2016) - [j3]Conghuan Ye, Hefei Ling, Zenggang Xiong, Fuhao Zou, Cong Liu, Fang Xu:
Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 61:1-61:23 (2016) - 2015
- [c5]Conghuan Ye, Zenggang Xiong, Yaoming Ding, Guangwei Wang, Xuemin Zhang, Fang Xu:
Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network. DMS 2015: 264-273 - 2014
- [j2]Conghuan Ye, Zenggang Xiong, Yaoming Ding, Guangwei Wang, Jiping Li, Kaibing Zhang:
Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks. J. Vis. Lang. Comput. 25(6): 658-666 (2014) - [c4]Conghuan Ye, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Kaibing Zhang:
Joint Fingerpriting and Encryption in Hybrid domains for Multimedia Sharing in Social Networks. DMS 2014: 22-29 - [c3]Conghuan Ye, Zenggang Xiong, Yaoming Ding, Jiping Li, Guangwei Wang, Xuemin Zhang, Kaibing Zhang:
Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain. TrustCom 2014: 616-621 - 2013
- [j1]Conghuan Ye, Hefei Ling, Fuhao Zou, Zhengding Lu:
A new fingerprinting scheme using social network analysis for majority attack. Telecommun. Syst. 54(3): 315-331 (2013) - 2012
- [c2]Conghuan Ye, Hefei Ling, Fuhao Zou, Zhengding Lu, Zenggang Xiong, Kaibing Zhang:
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA. IWDW 2012: 507-519 - [c1]Conghuan Ye, Hefei Ling, Fuhao Zou, Cong Liu:
Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain. ACM Multimedia 2012: 1117-1120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint