Efficient reversible data hiding in encrypted images X Zhang, Z Qian, G Feng, Y Ren Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014 | 183 | 2014 |
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction X Zhang, Z Qian, Y Ren, G Feng IEEE Transactions on Information Forensics and Security 6 (4), 1223-1232, 2011 | 180 | 2011 |
Scalable coding of encrypted images X Zhang, G Feng, Y Ren, Z Qian IEEE transactions on image processing 21 (6), 3108-3114, 2012 | 123 | 2012 |
Compressing encrypted images with auxiliary information X Zhang, Y Ren, L Shen, Z Qian, G Feng IEEE transactions on multimedia 16 (5), 1327-1336, 2014 | 74 | 2014 |
Compressing encrypted image using compressive sensing X Zhang, Y Ren, G Feng, Z Qian 2011 seventh international conference on intelligent information hiding and …, 2011 | 73 | 2011 |
Security of quantum digital signatures for classical messages TY Wang, XQ Cai, YL Ren, RL Zhang Scientific reports 5 (1), 9231, 2015 | 70 | 2015 |
Efficient ciphertext-policy attribute based encryption with hidden policy X Li, D Gu, Y Ren, N Ding, K Yuan Internet and Distributed Computing Systems: 5th International Conference …, 2012 | 68 | 2012 |
On cloud storage optimization of blockchain with a clustering-based genetic algorithm M Xu, G Feng, Y Ren, X Zhang IEEE Internet of Things Journal 7 (9), 8547-8558, 2020 | 62 | 2020 |
Fully CCA2 secure identity based broadcast encryption without random oracles Y Ren, D Gu Information Processing Letters 109 (11), 527-533, 2009 | 61 | 2009 |
Diversity-based cascade filters for JPEG steganalysis G Feng, X Zhang, Y Ren, Z Qian, S Li IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019 | 50 | 2019 |
Block cipher based separable reversible data hiding in encrypted images Z Qian, X Zhang, Y Ren, G Feng Multimedia Tools and Applications 75, 13749-13763, 2016 | 46 | 2016 |
Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks Y Ren, X Li, SF Sun, X Yuan, X Zhang Journal of Information Security and Applications 58, 102698, 2021 | 43 | 2021 |
Fully anonymous identity-based broadcast encryption without random oracles. Y Ren, Z Niu, X Zhang Int. J. Netw. Secur. 16 (4), 256-264, 2014 | 32 | 2014 |
Privacy-protected deletable blockchain X Cai, Y Ren, X Zhang IEEE Access 8, 6060-6070, 2019 | 28 | 2019 |
Verifiable outsourcing algorithms for modular exponentiations with improved checkability Y Ren, N Ding, X Zhang, H Lu, D Gu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 27 | 2016 |
Consistency-induced multiview subspace clustering Y Qin, G Feng, Y Ren, X Zhang IEEE Transactions on Cybernetics 53 (2), 832-844, 2022 | 26 | 2022 |
Feature extraction optimization of JPEG steganalysis based on residual images Z Jin, G Feng, Y Ren, X Zhang Signal Processing 170, 107455, 2020 | 25 | 2020 |
New fuzzy identity-based encryption in the standard model Y Ren, D Gu, S Wang, X Zhang Informatica 21 (3), 393-407, 2010 | 25 | 2010 |
Privacy-enhanced and verification-traceable aggregation for federated learning Y Ren, Y Li, G Feng, X Zhang IEEE Internet of Things Journal 9 (24), 24933-24948, 2022 | 22 | 2022 |
Efficient anonymous identity-based broadcast encryption without random oracles X Li, R Yanli International Journal of Digital Crime and Forensics (IJDCF) 6 (2), 40-51, 2014 | 22 | 2014 |