default search action
Xiu-Li Chai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Xiuli Chai, Guoqiang Long, Zhihua Gan, Yushu Zhang:
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images. Appl. Intell. 54(4): 3429-3447 (2024) - [j61]Xiuli Chai, Zongwei Tang, Zhihua Gan, Yang Lu, Binjie Wang, Yushu Zhang:
SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things. Biomed. Signal Process. Control. 90: 105877 (2024) - [j60]Xiuli Chai, Gongyao Cao, Zhifeng Fu, Zhihua Gan, Binjie Wang, Yushu Zhang:
High-capacity reversible data hiding in encrypted medical images using adaptive pixel-modulation and HBP-RMC. Biomed. Signal Process. Control. 95: 106424 (2024) - [j59]Xiuli Chai, Shiping Song, Zhihua Gan, Guoqiang Long, Ye Tian, Xin He:
CSENMT: A deep image compressed sensing encryption network via multi-color space and texture feature. Expert Syst. Appl. 241: 122562 (2024) - [j58]Yakun Ma, Xiuli Chai, Zhihua Gan, Yushu Zhang:
Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 11(3): 4842-4856 (2024) - [j57]Zhen Chen, Xiuli Chai, Zhihua Gan, Binjie Wang, Yushu Zhang:
RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things. IEEE Internet Things J. 11(11): 20757-20768 (2024) - [j56]Xiuli Chai, Gongyao Cao, Zhihua Gan, Yushu Zhang, Yakun Ma, Xin He:
TPE-AP: Thumbnail-Preserving Encryption Based on Adjustable Precision for JPEG Images. IEEE Internet Things J. 11(22): 37021-37031 (2024) - [j55]Yang Lu, Tianfeng Ma, Zilong Pang, Xiuli Chai, Zhen Chen, Zongwei Tang:
Frequency domain-based reversible adversarial attacks for privacy protection in Internet of Things. J. Electronic Imaging 33(4) (2024) - [j54]Jiacheng Zhao, Xiuming Zhao, Zhihua Gan, Xiuli Chai, Tianfeng Ma, Zhen Chen:
RA-RevGAN: region-aware reversible adversarial example generation network for privacy-preserving applications. Multim. Syst. 30(4): 218 (2024) - [j53]Zhifeng Fu, Xiuli Chai, Zongwei Tang, Xin He, Zhihua Gan, Gongyao Cao:
Adaptive embedding combining LBE and IBBE for high-capacity reversible data hiding in encrypted images. Signal Process. 216: 109299 (2024) - [j52]Xiuli Chai, Yong Tan, Zhihua Gan, Yakun Niu, Jinwei Wang:
Forgery detection using polynomial fitting in recompressed JPEG images. Signal Image Video Process. 18(3): 2439-2451 (2024) - [j51]Zhihua Gan, Xiaolong Zheng, Yalin Song, Xiuli Chai:
Screen-shooting watermarking algorithm based on Harris-SIFT feature regions. Signal Image Video Process. 18(5): 4647-4660 (2024) - [j50]Mengxin Gong, Xiuli Chai, Yang Lu, Yushu Zhang:
Exploiting Four-Dimensional Chaotic Systems With Dissipation and Optimized Logical Operations for Secure Image Compression and Encryption. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7628-7642 (2024) - [j49]Xiuli Chai, Yakun Ma, Yinjing Wang, Zhihua Gan, Yushu Zhang:
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images. IEEE Trans. Multim. 26: 6102-6116 (2024) - 2023
- [j48]Yinjing Wang, Xiuli Chai, Zhihua Gan, Yushu Zhang, Xiuhui Chen, Xin He:
TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding. Appl. Intell. 53(4): 4027-4046 (2023) - [j47]Xiuli Chai, Tongtong Wei, Zhen Chen, Xin He, Zhihua Gan, Xiangjun Wu:
LDN-RC: a lightweight denoising network with residual connection to improve adversarial robustness. Appl. Intell. 53(5): 5224-5239 (2023) - [j46]Zilong Pang, Mingxu Wang, Lvchen Cao, Xiuli Chai, Zhihua Gan:
Pairwise open-sourced dataSet protection based on adaptive blind watermarking. Appl. Intell. 53(14): 17391-17410 (2023) - [j45]Xiuli Chai, Jiangyu Fu, Zhihua Gan, Yang Lu, Yushu Zhang, Daojun Han:
Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission. IEEE Internet Things J. 10(8, April 15): 7380-7392 (2023) - [j44]Zongwei Tang, Xiuli Chai, Yang Lu, Binjie Wang, Yong Tan:
An end-to-end screen shooting resilient blind watermarking scheme for medical images. J. Inf. Secur. Appl. 76: 103547 (2023) - [j43]Zhihua Gan, Wenbin Jiang, Xiuli Chai, Yalin Song, Junyang Yu:
End-to-end image splicing localization based on multi-scale features and residual refinement module. J. Electronic Imaging 32(6) (2023) - [j42]Yang Lu, Mengxin Gong, Lvchen Cao, Zhihua Gan, Xiuli Chai, Ang Li:
Exploiting 3D fractal cube and chaos for effective multi-image compression and encryption. J. King Saud Univ. Comput. Inf. Sci. 35(3): 37-58 (2023) - [j41]Xiuli Chai, Xiuhui Chen, Yakun Ma, Fang Zuo, Zhihua Gan, Yushu Zhang:
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion. Frontiers Inf. Technol. Electron. Eng. 24(8): 1169-1180 (2023) - [j40]Qingpeng Yang, Yi Zhou, Xiuli Chai, Miaohui Zhang, Wanjun Zhang, Jun Wang:
Exploring class-agnostic pixels for scribble-supervised high-resolution salient object detection. Neural Comput. Appl. 35(4): 3469-3482 (2023) - [j39]Zhengyun Zhao, Ziqing Huang, Xiuli Chai, Jun Wang:
Depth Enhanced Cross-Modal Cascaded Network for RGB-D Salient Object Detection. Neural Process. Lett. 55(1): 361-384 (2023) - [c5]Xiuli Chai, Zhen Chen, Zhihua Gan, Yushu Zhang, Yong Tan:
RAE-TPE: A Reversible Adversarial Example Generation Method Based on Thumbnail Preserving Encryption. ICSPCC 2023: 1-6 - [c4]Xiuli Chai, Yong Tan, Wenbin Jiang, Zhihua Gan:
Detecting Aligned Double JPEG Compression with the Same Quantization Matrix Based on Hamming Distance and Image Stability. ICSPCC 2023: 1-5 - 2022
- [j38]Jun Wang, Zhengyun Zhao, Shangqin Yang, Xiuli Chai, Wanjun Zhang, Miaohui Zhang:
Global contextual guided residual attention network for salient object detection. Appl. Intell. 52(6): 6208-6226 (2022) - [j37]Jun Wang, Qingpeng Yang, Shangqin Yang, Xiuli Chai, Wanjun Zhang:
Dual-path Processing Network for High-resolution Salient Object Detection. Appl. Intell. 52(10): 12034-12048 (2022) - [j36]Zhifeng Fu, Mengxin Gong, Guoqiang Long, Zhihua Gan, Xiuli Chai, Yang Lu:
Efficient capacity-distortion reversible data hiding based on combining multipeak embedding with local complexity. Appl. Intell. 52(11): 13006-13026 (2022) - [j35]Xiuli Chai, Yinjing Wang, Zhihua Gan, Xiuhui Chen, Yushu Zhang:
Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud. Inf. Sci. 604: 115-141 (2022) - [j34]Ruoyu Zhao, Yushu Zhang, Yu Nan, Wenying Wen, Xiuli Chai, Rushi Lan:
Primitively visually meaningful image encryption: A new paradigm. Inf. Sci. 613: 628-648 (2022) - [j33]Yongming Zhang, Ruoyu Zhao, Yushu Zhang, Rushi Lan, Xiuli Chai:
High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2993-3010 (2022) - [j32]Zhihua Gan, Shiping Song, Lin Zhou, Daojun Han, Jiangyu Fu, Xiuli Chai:
Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9252-9272 (2022) - [j31]Jiangyu Fu, Zhihua Gan, Xiuli Chai, Yang Lu:
Cloud-decryption-assisted image compression and encryption based on compressed sensing. Multim. Tools Appl. 81(12): 17401-17436 (2022) - [j30]Xiuli Chai, Yinjing Wang, Xiuhui Chen, Zhihua Gan, Yushu Zhang:
TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key. IEEE Signal Process. Lett. 29: 972-976 (2022) - [c3]Jie Zhang, Zhihua Gan, Yang Yang, Wenbin Jiang, Xin He, Xiuli Chai:
A New Thumbnail Preserving Encryption Scheme. ICAIP 2022: 61-66 - 2021
- [j29]Xiuli Chai, Haiyang Wu, Zhihua Gan, Daojun Han, Yushu Zhang, Yiran Chen:
An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf. Sci. 556: 305-340 (2021) - [j28]Ye Tian, Xiuli Chai, Zhihua Gan, Yang Lu, Yushu Zhang, Shiping Song:
SWDGAN: GAN-based sampling and whole image denoising network for compressed sensing image reconstruction. J. Electronic Imaging 30(6) (2021) - [j27]Jun Wang, Xiangcheng Zhi, Xiuli Chai, Yang Lu:
Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion. Multim. Tools Appl. 80(10): 16087-16122 (2021) - [j26]Xiuli Chai, Jiangyu Fu, Jitong Zhang, Daojun Han, Zhihua Gan:
Exploiting preprocessing-permutation-diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system. Neural Comput. Appl. 33(16): 10371-10402 (2021) - [j25]Zhihua Gan, Jianqiang Bi, Wenke Ding, Xiuli Chai:
Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption. Neural Comput. Appl. 33(19): 12845-12867 (2021) - [j24]Zhihua Gan, Xiuli Chai, Xiangcheng Zhi, Wenke Ding, Yang Lu, Xiangjun Wu:
Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy. Neural Comput. Appl. 33(23): 16251-16277 (2021) - [j23]Xiuli Chai, Xiangcheng Zhi, Zhihua Gan, Yushu Zhang, Yiran Chen, Jiangyu Fu:
Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. 183: 108041 (2021) - 2020
- [j22]Changjiang Zhu, Zhihua Gan, Yang Lu, Xiuli Chai:
An image encryption algorithm based on 3-D DNA level permutation and substitution scheme. Multim. Tools Appl. 79(11-12): 7227-7258 (2020) - [j21]Xiuli Chai, Xianglong Fu, Zhihua Gan, Yushu Zhang, Yang Lu, Yiran Chen:
An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput. Appl. 32(9): 4961-4988 (2020) - [j20]Xiuli Chai, Xiaoyu Zheng, Zhihua Gan, Yiran Chen:
Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput. Appl. 32(12): 8065-8088 (2020) - [j19]Zhihua Gan, Xiuli Chai, Jitong Zhang, Yushu Zhang, Yiran Chen:
An effective image compression-encryption scheme based on compressive sensing (CS) and game of life (GOL). Neural Comput. Appl. 32(17): 14113-14141 (2020) - [j18]Xiuli Chai, Haiyang Wu, Zhihua Gan, Yushu Zhang, Yiran Chen:
Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy. Signal Process. 171: 107525 (2020) - [j17]Xiuli Chai, Jianqiang Bi, Zhihua Gan, Xianxing Liu, Yushu Zhang, Yiran Chen:
Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Process. 176: 107684 (2020)
2010 – 2019
- 2019
- [j16]Xiu-Li Chai, Zhi-Hua Gan:
Function Projective Lag Synchronization of Chaotic Systems with Certain Parameters via Adaptive-Impulsive Control. Int. J. Autom. Comput. 16(2): 238-247 (2019) - [j15]Xiuli Chai, Jitong Zhang, Zhihua Gan, Yushu Zhang:
Medical image encryption algorithm based on Latin square and memristive chaotic system. Multim. Tools Appl. 78(24): 35419-35453 (2019) - [j14]Xiu-Li Chai, Zhihua Gan, Ke Yuan, Yiran Chen, Xianxing Liu:
A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput. Appl. 31(1): 219-237 (2019) - [j13]Zhihua Gan, Xiu-Li Chai, Daojun Han, Yiran Chen:
A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput. Appl. 31(11): 7111-7130 (2019) - [j12]Xiu-Li Chai, Xianglong Fu, Zhihua Gan, Yang Lu, Yiran Chen:
A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 155: 44-62 (2019) - 2018
- [j11]Zhihua Gan, Xiu-Li Chai, Ke Yuan, Yang Lu:
A novel image encryption algorithm based on LFT based S-boxes and chaos. Multim. Tools Appl. 77(7): 8759-8783 (2018) - [j10]Zhihua Gan, Xiu-Li Chai, Miaohui Zhang, Yang Lu:
A double color image encryption scheme based on three-dimensional brownian motion. Multim. Tools Appl. 77(21): 27919-27953 (2018) - [j9]Xiu-Li Chai, Xiaoyu Zheng, Zhihua Gan, Daojun Han, Yiran Chen:
An image encryption algorithm based on chaotic system and compressive sensing. Signal Process. 148: 124-144 (2018) - 2017
- [j8]Xiu-Li Chai:
An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multim. Tools Appl. 76(1): 1159-1175 (2017) - [j7]Xiu-Li Chai, Kang Yang, Zhihua Gan:
A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multim. Tools Appl. 76(7): 9907-9927 (2017) - [j6]Xiu-Li Chai, Zhihua Gan, Miaohui Zhang:
A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multim. Tools Appl. 76(14): 15561-15585 (2017) - [j5]Xiu-Li Chai, Zhihua Gan, Yiran Chen, Yushu Zhang:
A visually secure image encryption scheme based on compressive sensing. Signal Process. 134: 35-51 (2017) - [j4]Xiu-Li Chai, Zhihua Gan, Kang Yang, Yiran Chen, Xianxing Liu:
An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process. Image Commun. 52: 6-19 (2017) - 2016
- [j3]Xiuli Chai, Zhihua Gan:
基于超混沌系统的位级自适应彩色图像加密新算法 (New Bit-level Self-adaptive Color Image Encryption Algorithm Based on Hyperchaotic System). 计算机科学 43(4): 134-139 (2016) - 2015
- [j2]Xiuli Chai, Zhihua Gan, Jun Wang:
一类时滞混沌系统的修正函数投影拟同步 (Modified Function Projective Quasisynchronization of a Class of Delayed Chaotic System). 计算机科学 42(5): 169-172 (2015) - [j1]Xiuli Chai, Zhihua Gan:
一种基于时空混沌系统的彩色图像自适应位级加密算法 (Self-adaptive Bit-level Colour Image Encryption Algorithm Based on Spatiotemporal Chaotic System). 计算机科学 42(7): 204-209 (2015) - [c2]Wenke Ding, Xiuli Chai:
Adaptive Generalized Function Projective Lag Synchronization and Parameter Identification of Hyperchaotic Systems. PAAP 2015: 65-67 - [c1]Pei-Yan Jia, Xiu-Li Chai, Xia-Jiong Shen:
Adaptive Generalized Function Projective Lag Synchronization of Time-Delay Systems with Uncertain Parameters. PAAP 2015: 68-72
Coauthor Index
aka: Zhi-Hua Gan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint