Follow
Yanli Ren
Title
Cited by
Cited by
Year
Efficient reversible data hiding in encrypted images
X Zhang, Z Qian, G Feng, Y Ren
Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014
1832014
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
X Zhang, Z Qian, Y Ren, G Feng
IEEE Transactions on Information Forensics and Security 6 (4), 1223-1232, 2011
1802011
Scalable coding of encrypted images
X Zhang, G Feng, Y Ren, Z Qian
IEEE transactions on image processing 21 (6), 3108-3114, 2012
1262012
Compressing encrypted images with auxiliary information
X Zhang, Y Ren, L Shen, Z Qian, G Feng
IEEE transactions on multimedia 16 (5), 1327-1336, 2014
752014
Compressing encrypted image using compressive sensing
X Zhang, Y Ren, G Feng, Z Qian
2011 seventh international conference on intelligent information hiding and …, 2011
752011
Security of quantum digital signatures for classical messages
TY Wang, XQ Cai, YL Ren, RL Zhang
Scientific reports 5 (1), 9231, 2015
722015
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
Internet and Distributed Computing Systems: 5th International Conference …, 2012
682012
On cloud storage optimization of blockchain with a clustering-based genetic algorithm
M Xu, G Feng, Y Ren, X Zhang
IEEE Internet of Things Journal 7 (9), 8547-8558, 2020
632020
Fully CCA2 secure identity based broadcast encryption without random oracles
Y Ren, D Gu
Information Processing Letters 109 (11), 527-533, 2009
622009
Diversity-based cascade filters for JPEG steganalysis
G Feng, X Zhang, Y Ren, Z Qian, S Li
IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019
562019
Block cipher based separable reversible data hiding in encrypted images
Z Qian, X Zhang, Y Ren, G Feng
Multimedia Tools and Applications 75, 13749-13763, 2016
482016
Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks
Y Ren, X Li, SF Sun, X Yuan, X Zhang
Journal of Information Security and Applications 58, 102698, 2021
462021
Consistency-induced multiview subspace clustering
Y Qin, G Feng, Y Ren, X Zhang
IEEE Transactions on Cybernetics 53 (2), 832-844, 2022
352022
Privacy-enhanced and verification-traceable aggregation for federated learning
Y Ren, Y Li, G Feng, X Zhang
IEEE Internet of Things Journal 9 (24), 24933-24948, 2022
322022
Fully anonymous identity-based broadcast encryption without random oracles.
Y Ren, Z Niu, X Zhang
Int. J. Netw. Secur. 16 (4), 256-264, 2014
322014
Privacy-protected deletable blockchain
X Cai, Y Ren, X Zhang
IEEE Access 8, 6060-6070, 2019
282019
Verifiable outsourcing algorithms for modular exponentiations with improved checkability
Y Ren, N Ding, X Zhang, H Lu, D Gu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
282016
Feature extraction optimization of JPEG steganalysis based on residual images
Z Jin, G Feng, Y Ren, X Zhang
Signal Processing 170, 107455, 2020
272020
New fuzzy identity-based encryption in the standard model
Y Ren, D Gu, S Wang, X Zhang
Informatica 21 (3), 393-407, 2010
262010
Efficient algorithm for secure outsourcing of modular exponentiation with single server
Y Ren, M Dong, Z Qian, X Zhang, G Feng
IEEE Transactions on Cloud Computing 9 (1), 145-154, 2018
242018
The system can't perform the operation now. Try again later.
Articles 1–20