


default search action
Min Long
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j83]Gangyang Hou, Bo Ou
, Fei Peng
, Min Long
:
A Traitor Tracing and Access Control Method for Encrypted 3D Models Based on CP-ABE and Fair Watermark. IEEE Signal Process. Lett. 32: 696-700 (2025) - 2024
- [j82]Chengkun Jia, Min Long, Yongchao Liu
:
Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network. Comput. Secur. 137: 103640 (2024) - [j81]Min Long, Jun Zhou, Le-Bing Zhang
, Fei Peng, Dengyong Zhang:
ADFF: Adaptive de-morphing factor framework for restoring accomplice's facial image. IET Image Process. 18(2): 470-480 (2024) - [j80]Juan Cai, Qiangqiang Duan
, Min Long
, Le-Bing Zhang
, Xiangling Ding
:
Feature Interaction-Based Face De-Morphing Factor Prediction for Restoring Accomplice's Facial Image. Sensors 24(17): 5504 (2024) - [j79]Min Long
, Qiangqiang Duan
, Le-Bing Zhang
, Fei Peng
, Dengyong Zhang
:
Trans-FD: Transformer-Based Representation Interaction for Face De-Morphing. IEEE Trans. Biom. Behav. Identity Sci. 6(3): 385-397 (2024) - [j78]Min Long
, Quantao Yao
, Le-Bing Zhang
, Fei Peng
:
Face De-Morphing Based on Diffusion Autoencoders. IEEE Trans. Inf. Forensics Secur. 19: 3051-3063 (2024) - [j77]Yan He
, Fei Peng
, Rizhao Cai
, Zitong Yu
, Min Long
, Kwok-Yan Lam
:
Category-Conditional Gradient Alignment for Domain Adaptive Face Anti-Spoofing. IEEE Trans. Inf. Forensics Secur. 19: 10071-10085 (2024) - [j76]Gangyang Hou
, Bo Ou
, Min Long
, Fei Peng
:
Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction. IEEE Trans. Multim. 26: 2395-2407 (2024) - [j75]Fei Peng
, Le Qin
, Min Long
, Jin Li
:
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 192:1-192:28 (2024) - [c33]Yan He, Fei Peng, Min Long, Kwok-Yan Lam:
Causality-Inspired Single-Source Domain Generalization for Face Anti-Spoofing. ICASSP 2024: 4925-4929 - 2023
- [j74]Hao Wang, Ce Yu, Jian Xiao, Shanjiang Tang, Min Long
, Ming Zhu:
HEGrid: A high efficient multi-channel radio astronomical data gridding framework in heterogeneous computing environments. Future Gener. Comput. Syst. 138: 243-253 (2023) - [j73]Wei-Jie Zhou, Min Long, Xiao-Zhen Liu, Kai-Ning Wu
:
Passivity-based boundary control for stochastic delay reaction-diffusion systems. Int. J. Syst. Sci. 54(1): 124-135 (2023) - [j72]Yan He, Fei Peng
, Min Long
:
Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning. IEEE Trans. Biom. Behav. Identity Sci. 5(4): 579-592 (2023) - [j71]Fei Peng
, Tongxin Liao
, Min Long
, Jin Li
, Wensheng Zhang
, Yicong Zhou
:
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6531-6543 (2023) - [j70]Fei Peng
, Wenyan Jiang
, Min Long
, Keqin Li
:
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning. IEEE Trans. Dependable Secur. Comput. 20(3): 1867-1881 (2023) - [j69]Fei Peng
, Bo Long, Min Long
:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy. IEEE Trans. Multim. 25: 892-906 (2023) - [j68]Fei Peng
, Wenyan Jiang
, Min Long
:
A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 53:1-53:20 (2023) - [c32]Matthew Miller, Skarlet Williams, Gaby G. Dagher, Min Long:
PRISM: A Blockchain-Enabled Reputation-Based Consensus for Enhancing Scientific Workflow Provenance. CIC 2023: 72-81 - [c31]Aakash Shrestha, Yantian Hou, Min Long
, Jiawei Yuan:
Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality. ICNC 2023: 188-194 - [c30]Min Long, Qihuan Wang, Le-Bing Zhang, Jun Zhou:
CALP-FD: Cross Attention-Based Facial Landmarks Prompt for Face De-Morphing. ICSAI 2023: 1-6 - [c29]Fei Peng
, Min Long
:
3DPS: 3D Printing Signature for Authentication Based on Equipment Distortion Model. IWDW 2023: 139-150 - 2022
- [j67]Fei Peng, Shao-hua Meng, Min Long:
Presentation attack detection based on two-stream vision transformers with self-attention fusion. J. Vis. Commun. Image Represent. 85: 103518 (2022) - [j66]Fei Peng
, Le Qin, Min Long:
Face morphing attack detection and attacker identification based on a watchlist. Signal Process. Image Commun. 107: 116748 (2022) - [j65]Fei Peng
, Guanfu Chen, Min Long:
A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5817-5829 (2022) - [j64]Fei Peng
, Liping Yin, Min Long
:
BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(10): 6657-6670 (2022) - [j63]Fei Peng
, Tongxin Liao
, Min Long
:
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8394-8408 (2022) - [j62]Le Qin
, Fei Peng
, Min Long
:
Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision. IEEE Trans. Inf. Forensics Secur. 17: 3649-3662 (2022) - [j61]Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. ACM Trans. Priv. Secur. 25(1): 4:1-4:28 (2022) - [c28]Reagan Hoopes, Hamilton Hardy, Min Long
, Gaby G. Dagher:
SciLedger: A Blockchain-based Scientific Workflow Provenance and Data Sharing Platform. CIC 2022: 125-134 - [c27]Fei Peng, Shao-hua Meng, Min Long:
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion. ML4CS (2) 2022: 283-298 - [c26]Fei Peng, Xin-lin Zhang, Min Long:
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps. ML4CS (2) 2022: 355-369 - [c25]Min Long, Chengkun Jia, Fei Peng:
Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces. ML4CS (3) 2022: 439-454 - [i3]Miu Lun Lau, Min Long
, Jeff Terry
:
Automated Materials Spectroscopy Analysis using Genetic Algorithms. CoRR abs/2203.10152 (2022) - [i2]Hao Wang, Ce Yu, Jian Xiao, Shanjiang Tang, Min Long
, Ming Zhu:
HEGrid: A High Efficient Multi-Channel Radio Astronomical Data Gridding Framework in Heterogeneous Computing Environments. CoRR abs/2207.04584 (2022) - 2021
- [j60]Min Long
, Longlong Wang
:
S-Box Design Based on Discrete Chaotic Map and Improved Artificial Bee Colony Algorithm. IEEE Access 9: 86144-86154 (2021) - [j59]Z. Li, Ce Yu
, Jian Xiao
, Min Long
, Chenzhou Cui:
Detection of radio frequency interference using an improved generative adversarial network. Astron. Comput. 36: 100482 (2021) - [j58]Min Long, Sai Long, Fei Peng
, Xiao-hua Hu:
Identifying natural images and computer-generated graphics based on convolutional neural network. Int. J. Auton. Adapt. Commun. Syst. 14(1/2): 151-162 (2021) - [j57]Le Qin, Fei Peng
, Sushma Venkatesh
, Raghavendra Ramachandra
, Min Long, Christoph Busch
:
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation. IEEE Trans. Biom. Behav. Identity Sci. 3(1): 72-88 (2021) - [j56]Aparna Sankaran Srinath
, Hannah Johnson, Gaby G. Dagher
, Min Long
:
BullyNet: Unmasking Cyberbullies on Social Networks. IEEE Trans. Comput. Soc. Syst. 8(2): 332-344 (2021) - [j55]Fei Peng
, Zi-Xing Lin
, Xiang Zhang
, Min Long:
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting. IEEE Trans. Circuits Syst. Video Technol. 31(1): 411-424 (2021) - [j54]Fei Peng
, Bo Long, Min Long:
A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4538-4553 (2021) - [c24]Justin S. Gazsi, Sajia Zafreen, Gaby G. Dagher, Min Long
:
VAULT: A Scalable Blockchain-Based Protocol for Secure Data Access and Collaboration. Blockchain 2021: 376-381 - [c23]Le-Bing Zhang, Juan Cai, Fei Peng, Min Long:
MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network. IWDW 2021: 17-31 - 2020
- [j53]Xiang Zhang
, Fei Peng
, Zi-Xing Lin, Min Long:
A Coverless Image Information Hiding Algorithm Based on Fractal Theory. Int. J. Bifurc. Chaos 30(4): 2050062:1-2050062:20 (2020) - [j52]Wankai Zhou, Min Long:
基于区块链的环境监测数据安全传输方案 (Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain). 计算机科学 47(1): 315-320 (2020) - [j51]Fei Peng
, Le Qin
, Min Long:
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning. J. Vis. Commun. Image Represent. 66: 102746 (2020) - [j50]Jian Xiao
, Min Long
, Ce Yu, Xin Zhou, Li Ji:
Performance optimization of non-equilibrium ionization simulations from MapReduce and GPU acceleration. Parallel Comput. 98: 102682 (2020) - [j49]Min Long, Yu Zhao, Xiang Zhang
, Fei Peng
:
A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering. Signal Process. 176: 107703 (2020) - [j48]Fei Peng
, Yu Zhao, Xiang Zhang
, Min Long, Weiqiang Pan:
Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting. Signal Process. Image Commun. 81 (2020) - [j47]Fei Peng
, Wen-Yan Jiang
, Ying Qi, Zi-Xing Lin
, Min Long:
Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2391-2405 (2020) - [j46]Fei Peng
, Xiang Zhang
, Zi-Xing Lin
, Min Long:
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2765-2780 (2020) - [j45]Fei Peng
, Liping Yin, Le-Bing Zhang
, Min Long:
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network. IEEE Trans. Multim. 22(10): 2511-2525 (2020) - [c22]Min Long, Sai Long, Guo-lou Ping, Fei Peng:
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing. ICCCN 2020: 1-9 - [c21]Fei Peng
, Wenjie Qian, Min Long:
Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision. IWDW 2020: 136-149
2010 – 2019
- 2019
- [j44]Fei Peng
, Le-Bing Zhang, Min Long:
FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image. IEEE Access 7: 75122-75131 (2019) - [j43]Fei Peng
, Jing Yang
, Zi-Xing Lin, Min Long
:
Source identification of 3D printed objects based on inherent equipment distortion. Comput. Secur. 82: 173-183 (2019) - [j42]Min Long, Yunfei Chen
:
Performance analysis of energy harvesting communications using multiple time slots. IET Commun. 13(3): 289-296 (2019) - [j41]Min Long, You Li, Fei Peng
:
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree. Int. J. Digit. Crime Forensics 11(1): 126-137 (2019) - [j40]Peipei Zhu, Min Long:
基于用户间接信任及高斯填充的推荐算法 (Recommendation Methods Considering User Indirect Trust and Gaussian Filling). 计算机科学 46(11A): 178-184 (2019) - [j39]Min Long, Fei Peng
, Yin Zhu:
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU. Multim. Tools Appl. 78(1): 489-506 (2019) - [j38]Fei Peng
, Qin Long, Zi-Xing Lin
, Min Long:
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multim. Tools Appl. 78(19): 26885-26905 (2019) - [j37]Fei Peng
, Wang Ming, Xiang Zhang
, Min Long:
A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion. Signal Process. Image Commun. 78: 426-436 (2019) - [j36]Fei Peng
, Zi-Xing Lin
, Xiang Zhang
, Min Long:
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers. IEEE Trans. Inf. Forensics Secur. 14(9): 2400-2411 (2019) - [j35]Fei Peng
, Jing Yang
, Min Long:
3-D Printed Object Authentication Based on Printing Noise and Digital Signature. IEEE Trans. Reliab. 68(1): 342-353 (2019) - 2018
- [j34]Min Long
, Fenfang Li:
A Formula Adaptive Pixel Pair Matching Steganography Algorithm. Adv. Multim. 2018: 7682098:1-7682098:8 (2018) - [j33]Wenbin Jiang
, Min Long, Laurence T. Yang, Xiaobai Liu, Hai Jin, Alan L. Yuille
, Ye Chi:
FIPIP: A novel fine-grained parallel partition based intra-frame prediction on heterogeneous many-core systems. Future Gener. Comput. Syst. 78: 316-329 (2018) - [j32]Min Long, Fei Peng
, Xiaoqing Gong:
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network. Int. J. Digit. Crime Forensics 10(2): 23-39 (2018) - [j31]Fei Peng
, Shuai-ping Wang, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling. Int. J. Digit. Crime Forensics 10(4): 80-89 (2018) - [j30]Min Long, Fei Peng
, Han-yun Li:
Separable reversible data hiding and encryption for HEVC video. J. Real Time Image Process. 14(1): 171-182 (2018) - [j29]Le-Bing Zhang, Fei Peng
, Le Qin, Min Long:
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. J. Vis. Commun. Image Represent. 51: 56-69 (2018) - [j28]Fei Peng
, Le Qin, Min Long:
Face presentation attack detection using guided scale texture. Multim. Tools Appl. 77(7): 8883-8909 (2018) - [j27]Min Long
, Xiong Xiao:
Outage performance of double-relay cooperative transmission network with energy harvesting. Phys. Commun. 29: 261-267 (2018) - [j26]Zi-Xing Lin
, Fei Peng
, Min Long:
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Trans. Inf. Forensics Secur. 13(9): 2372-2382 (2018) - [j25]Xiang Zhang
, Fei Peng
, Min Long:
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. IEEE Trans. Multim. 20(12): 3223-3238 (2018) - [c20]Fei Peng
, Le Qin, Min Long:
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection. ICCCN 2018: 1-9 - [c19]Le-Bing Zhang, Fei Peng
, Min Long:
Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise. ICME 2018: 1-6 - [i1]Fei Peng, Le-Bing Zhang, Min Long:
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image. CoRR abs/1811.07665 (2018) - 2017
- [j24]Min Long, You Li, Fei Peng
:
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos. Int. J. Bifurc. Chaos 27(4): 1750054:1-1750054:12 (2017) - [j23]Juan Chen, Fei Peng
, Jie Li, Min Long:
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping. Int. J. Digit. Crime Forensics 9(2): 25-37 (2017) - [j22]Le-Bing Zhang, Fei Peng
, Min Long:
Identifying source camera using guided image estimation and block weighted average. J. Vis. Commun. Image Represent. 48: 471-479 (2017) - [j21]Fei Peng
, Xiaoqing Gong, Min Long, Xingming Sun:
A selective encryption scheme for protecting H.264/AVC video in multimedia social network. Multim. Tools Appl. 76(3): 3235-3253 (2017) - [j20]Zi-Xing Lin
, Fei Peng
, Min Long:
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web. Signal Process. Image Commun. 57: 134-146 (2017) - [c18]Le Qin, Le-Bing Zhang, Fei Peng
, Min Long:
Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern. CCBR 2017: 118-126 - [c17]Zinelabdine Boulkenafet, Jukka Komulainen
, Zahid Akhtar
, Azeddine Benlamoudi
, Djamel Samai
, Salah Eddine Bekhouche
, Abdelkrim Ouafi, Fadi Dornaika, Abdelmalik Taleb-Ahmed, Le Qin, Fei Peng, L. B. Zhang, Min Long, Shruti Bhilare, Vivek Kanhangad, Artur Costa-Pazo, Esteban Vázquez-Fernández
, Daniel Pérez-Cabo, J. J. Moreira-Perez, Daniel González-Jiménez, Amir Mohammadi
, Sushil Bhattacharjee, Sébastien Marcel, Svetlana Volkova
, Y. Tang, N. Abe, L. Li, X. Feng, Z. Xia, X. Jiang, S. Liu, Rui Shao, Pong C. Yuen, Waldir R. de Almeida, Fernanda A. Andaló
, Rafael Padilha, Gabriel Bertocco, William Dias, Jacques Wainer, Ricardo da Silva Torres, Anderson Rocha, Marcus A. Angeloni, Guilherme Folego, Alan Godoy, Abdenour Hadid:
A competition on generalized software-based face presentation attack detection in mobile scenarios. IJCB 2017: 688-696 - [c16]Fei Peng
, Shuai-ping Wang, Gang Luo, Min Long:
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling. ICCCS (1) 2017: 3-15 - [c15]Juan Chen, Fei Peng
, Min Long:
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression. ICCCS (2) 2017: 396-407 - [c14]Fei Peng
, Zhen-Jie Yan, Min Long:
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping. SpaCCS Workshops 2017: 147-158 - [c13]Fei Peng
, Xiao-hua Hu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces. SpaCCS 2017: 368-380 - 2016
- [j19]Qiuwei Yang, Fei Peng
, Jiao-Ting Li, Min Long:
Image tamper detection based on noise estimation and lacunarity texture. Multim. Tools Appl. 75(17): 10201-10211 (2016) - [c12]Rui Shi, Yunfei Chen
, Min Long, Wei Feng, Ning Ge
, Jianhua Lu:
Evaluation of SNR estimation errors on amplify-and-forward relaying performance. ICT 2016: 1-5 - [c11]Le-Bing Zhang, Fei Peng
, Min Long:
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average. IWDW 2016: 106-118 - [c10]Fei Peng
, Le Qin, Min Long:
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. SecureComm 2016: 774-777 - [c9]Wenbin Jiang
, Pengcheng Wang, Min Long, Hai Jin:
A novel parallelized motion estimation algorithm for GPU based video encoding. WoWMoM 2016: 1-8 - 2015
- [j18]Min Long, Yan Liu, Fei Peng
:
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization. Int. J. Digit. Crime Forensics 7(3): 1-18 (2015) - [c8]Fei Peng
, Yin Zhu, Min Long:
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU. ICA3PP (2) 2015: 213-226 - 2014
- [j17]Fei Peng
, Yan Liu, Min Long:
Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting. Comput. Aided Des. 49: 42-50 (2014) - [j16]Min Long, Rui Shi, Yunfei Chen
:
Evaluation of generalised relay selection in the presence of feedback delay for multi-hop relaying. IET Commun. 8(15): 2633-2641 (2014) - [j15]Min Long, Yunfei Chen
, Marco Di Renzo:
Performance Analysis of Relay Selection in the Presence of on-off Relay Traffic. IEEE Trans. Veh. Technol. 63(6): 2959-2964 (2014) - [c7]Fei Peng
, Jiaoling Shi, Min Long:
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU. ICME 2014: 1-6 - [c6]Wenbin Jiang, Min Long, Hai Jin, Pengcheng Wang:
Fine-grained CUDA-based Parallel Intra Prediction for H.264/AVC. NOSSDAV 2014: 97 - 2013
- [j14]Ning Cao, Fei Wang, Yunfei Chen
, Xiaowen Hu, Min Long:
Estimation of the Average Fading Powers for AF Relay System. IEEE Commun. Lett. 17(1): 135-138 (2013) - [j13]Yunfei Chen
, Liang Tang, Min Long:
Analysis of collaborative spectrum sensing without dedicated sensing period. IET Commun. 7(15): 1617-1627 (2013) - [j12]Min Long, Hao Wang:
Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters. Int. J. Digit. Crime Forensics 5(2): 23-34 (2013) - [j11]Fei Peng
, Xiao-wen Zhu, Min Long:
An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System. Int. J. Digit. Crime Forensics 5(2): 35-49 (2013) - [j10]Qingni Shen, Yahui Yang, Zhonghai Wu, Dandan Wang, Min Long:
Securing data services: a security architecture design for private storage cloud based on HDFS. Int. J. Grid Util. Comput. 4(4): 242-254 (2013) - [j9]Fei Peng, Chen Li, Min Long:
A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Secur. Commun. Networks 6(9): 1117-1125 (2013) - [j8]Fei Peng
, Xiao-wen Zhu, Min Long:
An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos. IEEE Trans. Inf. Forensics Secur. 8(10): 1688-1699 (2013) - [j7]Yunfei Chen
, Rui Shi, Min Long:
Performance Analysis of Amplify-and-Forward Relaying With Correlated Links. IEEE Trans. Veh. Technol. 62(5): 2344-2349 (2013) - 2012
- [j6]Min Long, Yunfei Chen
, Fei Peng
:
Bit error rate improvement for chaos shift keying chaotic communication systems. IET Commun. 6(16): 2639-2644 (2012) - [j5]Fei Peng
, Juan Liu, Min Long:
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features. Int. J. Digit. Crime Forensics 4(1): 1-16 (2012) - [j4]Tiejun Zhou, Min Wang, Min Long:
Existence and Exponential Stability of Multiple Periodic Solutions for a Multidirectional Associative Memory Neural Network. Neural Process. Lett. 35(2): 187-202 (2012) - [c5]Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenming Lao, Dandan Wang, Min Long:
SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. AINA Workshops 2012: 1292-1297 - 2011
- [j3]Fei Peng
, Yu-Zhou Lei, Min Long, Xingming Sun:
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput. Aided Des. 43(8): 1018-1024 (2011) - [j2]Min Long, Yunfei Chen
, Fei Peng
:
Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication. IEEE Commun. Lett. 15(11): 1175-1177 (2011) - 2010
- [j1]Fei Peng
, Re-Si Guo, Chang-Tsun Li
, Min Long:
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput. Aided Des. 42(12): 1207-1216 (2010)
2000 – 2009
- 2009
- [c4]Fei Peng
, Re-Si Guo, Chang-Tsun Li
, Min Long:
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. ISDF 2009: 11-18 - 2008
- [c3]Fei Peng
, Tao Deng, Min Long:
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling. ICYCS 2008: 2809-2813 - 2007
- [c2]Chibing Gong, Yan Li, Ming Li, Jun Luo, Hong Cao, Min Long:
B-cell Epitope Mapping of Helicobacter pylori Neutrophil-Activating Protein. FBIT 2007: 261-264 - 2006
- [c1]Shenghua Bao, Lei Zhang, Erdong Chen, Min Long, Rui Li, Yong Yu:
LSM: Language Sense Model for Information Retrieval. WAIM 2006: 97-108
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint