Skip navigation

Items where Author is "Zhou, Xiaoyi"

Items where Author is "Zhou, Xiaoyi"

Up a level
Export as [feed] RSS
Group by: Item Type | Uncontrolled Keywords | No Grouping
Number of items: 60.

Anti-counterfeiting

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

asymmetric

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

big data

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

bisectional

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

bisectional multivariate quadratic equation

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

black-box

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

blind watermarking scheme

Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)

blockchain

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

complexity theory

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

copyright enforcement scheme

Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)

copyright protection

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

counterfeit

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

cryptanalysis

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

cryptography

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

Zhou, Xiaoyi (2012) Information security based on temporal order and ergodic matrix. PhD thesis, University of Greenwich.

data mining

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

Differential Privacy

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

diffusion

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

e-Pedigree

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

entropy

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

entropy-based support vector machine

Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)

ergodic matrix

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

finite field

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

fixing variables

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

Galois fields

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

gaussian elimination

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

hybrid-key

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

information hiding technology

Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)

information security systems

Zhou, Xiaoyi (2012) Information security based on temporal order and ergodic matrix. PhD thesis, University of Greenwich.

linear equation

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

Mel spectrogram

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

Multiparty Security

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

multivariate quadratic

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

news video retrieval

Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)

Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)

NP-hard

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

optimal temporal common subsequence

Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)

Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)

optimized quantum genetic algorithm

Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)

polynomials

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

public key cryptography

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

public key cryptosystems

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

relinearization

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

RFID

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

security applications

Zhou, Xiaoyi (2012) Information security based on temporal order and ergodic matrix. PhD thesis, University of Greenwich.

state-sequence matching

Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)

Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)

statistical databases

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

Supply Chain

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

symmetric

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

temporal logic

Zhou, Xiaoyi (2012) Information security based on temporal order and ergodic matrix. PhD thesis, University of Greenwich.

Temporal Relation

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

utility

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

voiceprint recognition model

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

watermarking

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

This list was generated on Thu Nov 21 21:12:37 2024 UTC.