Follow
Yanli Ren
Title
Cited by
Cited by
Year
Efficient reversible data hiding in encrypted images
X Zhang, Z Qian, G Feng, Y Ren
Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014
1782014
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
X Zhang, Z Qian, Y Ren, G Feng
IEEE Transactions on Information Forensics and Security 6 (4), 1223-1232, 2011
1782011
Scalable coding of encrypted images
X Zhang, G Feng, Y Ren, Z Qian
IEEE transactions on image processing 21 (6), 3108-3114, 2012
1232012
Compressing encrypted image using compressive sensing
X Zhang, Y Ren, G Feng, Z Qian
2011 seventh international conference on intelligent information hiding and …, 2011
732011
Compressing encrypted images with auxiliary information
X Zhang, Y Ren, L Shen, Z Qian, G Feng
IEEE transactions on multimedia 16 (5), 1327-1336, 2014
712014
Security of quantum digital signatures for classical messages
TY Wang, XQ Cai, YL Ren, RL Zhang
Scientific reports 5 (1), 9231, 2015
682015
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
Internet and Distributed Computing Systems: 5th International Conference …, 2012
662012
Fully CCA2 secure identity based broadcast encryption without random oracles
Y Ren, D Gu
Information Processing Letters 109 (11), 527-533, 2009
612009
On cloud storage optimization of blockchain with a clustering-based genetic algorithm
M Xu, G Feng, Y Ren, X Zhang
IEEE Internet of Things Journal 7 (9), 8547-8558, 2020
522020
Block cipher based separable reversible data hiding in encrypted images
Z Qian, X Zhang, Y Ren, G Feng
Multimedia Tools and Applications 75, 13749-13763, 2016
462016
Diversity-based cascade filters for JPEG steganalysis
G Feng, X Zhang, Y Ren, Z Qian, S Li
IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019
432019
Privacy-preserving batch verification signature scheme based on blockchain for vehicular ad-hoc networks
Y Ren, X Li, SF Sun, X Yuan, X Zhang
Journal of Information Security and Applications 58, 102698, 2021
362021
Fully anonymous identity-based broadcast encryption without random oracles.
Y Ren, Z Niu, X Zhang
Int. J. Netw. Secur. 16 (4), 256-264, 2014
322014
Verifiable outsourcing algorithms for modular exponentiations with improved checkability
Y Ren, N Ding, X Zhang, H Lu, D Gu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
272016
Privacy-protected deletable blockchain
X Cai, Y Ren, X Zhang
IEEE Access 8, 6060-6070, 2019
252019
New fuzzy identity-based encryption in the standard model
Y Ren, D Gu, S Wang, X Zhang
Informatica 21 (3), 393-407, 2010
252010
Feature extraction optimization of JPEG steganalysis based on residual images
Z Jin, G Feng, Y Ren, X Zhang
Signal Processing 170, 107455, 2020
222020
Efficient anonymous identity-based broadcast encryption without random oracles
X Li, R Yanli
International Journal of Digital Crime and Forensics (IJDCF) 6 (2), 40-51, 2014
222014
Efficient identity based signature/signcryption scheme in the standard model
R Yanli, G Dawu
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE …, 2007
222007
Efficient algorithm for secure outsourcing of modular exponentiation with single server
Y Ren, M Dong, Z Qian, X Zhang, G Feng
IEEE Transactions on Cloud Computing 9 (1), 145-154, 2018
212018
The system can't perform the operation now. Try again later.
Articles 1–20