default search action
Guodong Ye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j31]Guodong Ye, Zhuozhao Chen:
Authenticated reversible image hiding algorithm based on blockchain technology. Clust. Comput. 28(1): 10 (2025) - [j30]Huishan Wu, Yuanju Gan, Guodong Ye:
Reversible image hiding algorithm based on adaptive embedding mechanism. Expert Syst. Appl. 260: 125468 (2025) - 2024
- [j29]Kuan-Wai Wong, Wun-She Yap, Bok-Min Goi, Denis Chee-Keong Wong, Guodong Ye:
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map. J. Inf. Secur. Appl. 81: 103692 (2024) - 2023
- [j28]Xiaoling Huang, Youxia Dong, Guodong Ye, Wun-She Yap, Bok-Min Goi:
Visually meaningful image encryption algorithm based on digital signature. Digit. Commun. Networks 9(1): 159-165 (2023) - [j27]Xiaoling Huang, Youxia Dong, Guodong Ye, Yang Shi:
Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Frontiers Comput. Sci. 17(3): 173804 (2023) - [j26]Guodong Ye, Xin Liu, Siqi Fan, Yuan Tan, Qingguo Zhou, Rui Zhou, Xiaokang Zhou:
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT. Future Gener. Comput. Syst. 148: 201-210 (2023) - [j25]Yingli Zhang, Jiali Ma, Xin Liu, Guodong Ye, Qun Jin, Jianhua Ma, Qingguo Zhou:
An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching. IEEE Internet Things J. 10(24): 21431-21442 (2023) - 2022
- [j24]Guodong Ye, Huishan Wu, Min Liu, Yang Shi:
Image encryption scheme based on blind signature and an improved Lorenz system. Expert Syst. Appl. 205: 117709 (2022) - [c9]Yang Shi, Junqing Liang, Mianhong Li, Tianchen Ma, Guodong Ye, Jiangfeng Li, Qinpei Zhao:
Threshold EdDSA Signature for Blockchain-based Decentralized Finance Applications. RAID 2022: 129-142 - 2021
- [j23]Guodong Ye, Chen Pan, Youxia Dong, Kaixin Jiao, Xiaoling Huang:
A novel multi-image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j22]Youxia Dong, Xiaoling Huang, Guodong Ye:
Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition. Secur. Commun. Networks 2021: 6677325:1-6677325:16 (2021) - [c8]Kaixin Jiao, Guodong Ye, Qixiang Mei:
Image Encryption Scheme Based on Quantum Logistic Map and Cellular Automata. ICCCS 2021: 375-379 - [c7]Junwei Zhou, Delong Shang, Huile Lang, Guodong Ye, Zhe Xia:
Face Template Protection through Residual Learning Based Error-Correcting Codes. ICCCV 2021: 112-118 - [c6]Min Liu, Guodong Ye, Qiuzhen Lin:
Meaningful color image encryption algorithm based on compressive sensing and chaotic map. ISSRE Workshops 2021: 262-265 - 2020
- [j21]Guodong Ye, Kaixin Jiao, Huishan Wu, Chen Pan, Xiaoling Huang:
An Asymmetric Image Encryption Algorithm Based on a Fractional-Order Chaotic System and the RSA Public-Key Cryptosystem. Int. J. Bifurc. Chaos 30(15): 2050233:1-2050233:17 (2020) - [j20]Xiaoling Huang, Youxia Dong, Kaixin Jiao, Guodong Ye:
Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform. Frontiers Inf. Technol. Electron. Eng. 21(12): 1783-1794 (2020) - [j19]Kaixin Jiao, Guodong Ye, Youxia Dong, Xiaoling Huang, Jianqing He:
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm. Secur. Commun. Networks 2020: 9721675:1-9721675:14 (2020) - [j18]Guodong Ye, Chen Pan, Youxia Dong, Yang Shi, Xiaoling Huang:
Image encryption and hiding algorithm based on compressive sensing and random numbers insertion. Signal Process. 172: 107563 (2020)
2010 – 2019
- 2019
- [j17]Chen Pan, Guodong Ye, Xiaoling Huang, Junwei Zhou:
Novel Meaningful Image Encryption Based on Block Compressive Sensing. Secur. Commun. Networks 2019: 6572105:1-6572105:12 (2019) - [c5]Chen Pan, Xiaoling Huang, Guodong Ye, Zhengxia Wang:
An Image Visual Cryptography Using Double Encryption and Hiding Technology. ICAIP 2019: 50-54 - 2018
- [j16]Guodong Ye, Xiaoling Huang:
Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci. China Inf. Sci. 61(5): 058104:1-058104:3 (2018) - [j15]Xiaoling Huang, Guodong Ye:
An Image Encryption Algorithm Based on Time-Delay and Random Insertion. Entropy 20(12): 974 (2018) - [j14]Guodong Ye, Chen Pan, Xiaoling Huang, Zhenyu Zhao, Jianqing He:
A Chaotic Image Encryption Algorithm Based on Information Entropy. Int. J. Bifurc. Chaos 28(1): 1850010:1-1850010:11 (2018) - [j13]Xiaoling Huang, Guodong Ye:
An image encryption algorithm based on irregular wave representation. Multim. Tools Appl. 77(2): 2611-2628 (2018) - [j12]Guodong Ye, Kaixin Jiao, Chen Pan, Xiaoling Huang:
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map. Secur. Commun. Networks 2018: 8402578:1-8402578:11 (2018) - [c4]Guodong Ye, Xiaoling Huang, Chen Pan:
An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map. ICAIP 2018: 78-82 - 2017
- [j11]Guodong Ye, Xiaoling Huang:
An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251: 45-53 (2017) - [c3]Gang Liu, Guodong Ye, Haitao Tang, Ke Liu, Yongzhong Sha:
Simulation Study on the Propagation Law of Sina Micro-blog for Tianjin Event Based on Improved SIR Model. ICIME 2017: 167-171 - 2016
- [j10]Guodong Ye, Xiaoling Huang:
An Image Encryption Algorithm Based on Autoblocking and Electrocardiography. IEEE Multim. 23(2): 64-71 (2016) - [j9]Guodong Ye, Xiaoling Huang:
A novel block chaotic encryption scheme for remote sensing image. Multim. Tools Appl. 75(18): 11433-11446 (2016) - [j8]Guodong Ye, Xiaoling Huang:
A secure image encryption algorithm based on chaotic maps and SHA-3. Secur. Commun. Networks 9(13): 2015-2023 (2016) - 2015
- [j7]Xiaoling Huang, Guodong Ye, Huajin Chai, Ou Xie:
Compression and encryption for remote sensing image using chaotic system. Secur. Commun. Networks 8(18): 3659-3666 (2015) - 2014
- [j6]Guodong Ye, Junwei Zhou:
A block chaotic image encryption scheme based on self-adaptive modelling. Appl. Soft Comput. 22: 351-357 (2014) - [j5]Xiaoling Huang, Guodong Ye:
An efficient self-adaptive model for chaotic image encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(12): 4094-4104 (2014) - [j4]Xiaoling Huang, Guodong Ye:
An image encryption algorithm based on hyper-chaos and DNA sequence. Multim. Tools Appl. 72(1): 57-70 (2014) - 2010
- [j3]Guodong Ye:
Another Constructed Chaotic Image Encryption Scheme Based on Toeplitz Matrix and Hankel Matrix. Fundam. Informaticae 101(4): 321-333 (2010) - [j2]Guodong Ye:
Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit. Lett. 31(5): 347-354 (2010)
2000 – 2009
- 2009
- [j1]Zhongliang Yue, Yuying Jia, Guodong Ye:
An Approach for Multiple Attribute Group Decision Making Based on Intuitionistic Fuzzy Information. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 17(3): 317-332 (2009) - [c2]Guodong Ye, Gui Lin, Changqing Zhu:
A Designed Edge Marking Fill Algorithm for Elongated Polygon. DBTA 2009: 22-24 - 2007
- [c1]Guodong Ye, Xiaoling Huang, Changqing Zhu:
Image Encryption Algorithm of Double Scrambling Based on ASCII Code of Matrix Element. CIS 2007: 843-847
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint