Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhengxin Fu
@article{DBLP:journals/jvcir/FuFHY22, author = {Zhengxin Fu and Liguo Fang and Hangying Huang and Bin Yu}, title = {Distributed three-level {QR} codes based on visual cryptography scheme}, journal = {J. Vis. Commun. Image Represent.}, volume = {87}, pages = {103567}, year = {2022}, url = {https://doi.org/10.1016/j.jvcir.2022.103567}, doi = {10.1016/J.JVCIR.2022.103567}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/FuFHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuangFY21, author = {Hangying Huang and Zhengxin Fu and Bin Yu}, title = {Probabilistic Grayscale Visual Cryptography Scheme Using Multi-Pixel Encoding}, booktitle = {17th International Conference on Computational Intelligence and Security {CIS} 2021, Chengdu, China, November 19-22, 2021}, pages = {459--463}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CIS54983.2021.00101}, doi = {10.1109/CIS54983.2021.00101}, timestamp = {Wed, 16 Feb 2022 17:26:48 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuangFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunFY20, author = {Rui Sun and Zhengxin Fu and Bin Yu}, title = {Size-Invariant Visual Cryptography With Improved Perceptual Quality for Grayscale Image}, journal = {{IEEE} Access}, volume = {8}, pages = {163394--163404}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3021522}, doi = {10.1109/ACCESS.2020.3021522}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SunFY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/FangFYZ20, author = {Liguo Fang and Zhengxin Fu and Cheng Yi and Yong Zhang}, title = {A map traceability management scheme for security control}, journal = {Enterp. Inf. Syst.}, volume = {14}, number = {3}, pages = {388--401}, year = {2020}, url = {https://doi.org/10.1080/17517575.2019.1669830}, doi = {10.1080/17517575.2019.1669830}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eis/FangFYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FuLSFY20, author = {Zhengxin Fu and Sijia Liu and Rui Sun and Liguo Fang and Bin Yu}, title = {Distributed color {QR} code with high-capability and fast decoding}, journal = {Multim. Tools Appl.}, volume = {79}, number = {43-44}, pages = {32471--32485}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-09469-2}, doi = {10.1007/S11042-020-09469-2}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/FuLSFY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aipr2/SunF0H20, author = {Rui Sun and Zhengxin Fu and Bin Yu and Hangying Huang}, title = {A Novel Color Multi-Secret Visual Cryptography Scheme}, booktitle = {{AIPR} 2020: 3rd International Conference on Artificial Intelligence and Pattern Recognition, Xiamen, China, June 26-28, 2020}, pages = {140--144}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3430199.3430235}, doi = {10.1145/3430199.3430235}, timestamp = {Wed, 20 Jan 2021 15:11:55 +0100}, biburl = {https://dblp.org/rec/conf/aipr2/SunF0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuFY19a, author = {Sijia Liu and Zhengxin Fu and Bin Yu}, title = {Rich {QR} Codes With Three-Layer Information Using Hamming Code}, journal = {{IEEE} Access}, volume = {7}, pages = {78640--78651}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2922259}, doi = {10.1109/ACCESS.2019.2922259}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuFY19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ChengFYS19, author = {Yuqiao Cheng and Zhengxin Fu and Bin Yu and Gang Shen}, title = {General Construction for Extended Visual Cryptography Scheme Using {QR} Codes}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {1}, pages = {1--17}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019010101}, doi = {10.4018/IJDCF.2019010101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/ChengFYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FuCY19, author = {Zhengxin Fu and Yuqiao Cheng and Bin Yu}, title = {Perfect recovery of XOR-based visual cryptography scheme}, journal = {Multim. Tools Appl.}, volume = {78}, number = {2}, pages = {2367--2384}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6364-z}, doi = {10.1007/S11042-018-6364-Z}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/FuCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/0005SLF019, author = {Hao Hu and Gang Shen and Yuling Liu and Zhengxin Fu and Bin Yu}, title = {Improved schemes for visual secret sharing based on random grids}, journal = {Multim. Tools Appl.}, volume = {78}, number = {9}, pages = {12055--12082}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6738-2}, doi = {10.1007/S11042-018-6738-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/0005SLF019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FuCY19a, author = {Zhengxin Fu and Yuqiao Cheng and Bin Yu}, title = {Rich {QR} code with three-layer information using visual secret sharing scheme}, journal = {Multim. Tools Appl.}, volume = {78}, number = {14}, pages = {19861--19875}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7333-x}, doi = {10.1007/S11042-019-7333-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/FuCY19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuFY19, author = {Sijia Liu and Zhengxin Fu and Bin Yu}, title = {A two-level {QR} code scheme based on polynomial secret sharing}, journal = {Multim. Tools Appl.}, volume = {78}, number = {15}, pages = {21291--21308}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7455-1}, doi = {10.1007/S11042-019-7455-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuFY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuFL19, author = {Bin Yu and Zhengxin Fu and Sijia Liu}, title = {A Novel Three-Layer {QR} Code Based on Secret Sharing Scheme and Liner Code}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7937816:1--7937816:13}, year = {2019}, url = {https://doi.org/10.1155/2019/7937816}, doi = {10.1155/2019/7937816}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FuCY18, author = {Zhengxin Fu and Yuqiao Cheng and Bin Yu}, title = {Visual Cryptography Scheme With Meaningful Shares Based on {QR} Codes}, journal = {{IEEE} Access}, volume = {6}, pages = {59567--59574}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2874527}, doi = {10.1109/ACCESS.2018.2874527}, timestamp = {Sat, 01 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/FuCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HuSFY18, author = {Hao Hu and Gang Shen and Zhengxin Fu and Bin Yu}, title = {Improved Contrast for Threshold Random-grid-based Visual Cryptography}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {7}, pages = {3401--3420}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.07.022}, doi = {10.3837/TIIS.2018.07.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HuSFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShenLFY18, author = {Gang Shen and Feng Liu and Zhengxin Fu and Bin Yu}, title = {Visual cryptograms of random grids via linear algebra}, journal = {Multim. Tools Appl.}, volume = {77}, number = {10}, pages = {12871--12899}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4921-5}, doi = {10.1007/S11042-017-4921-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShenLFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChengFYS18, author = {Yuqiao Cheng and Zhengxin Fu and Bin Yu and Gang Shen}, title = {A new two-level {QR} code with visual cryptography scheme}, journal = {Multim. Tools Appl.}, volume = {77}, number = {16}, pages = {20629--20649}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5465-4}, doi = {10.1007/S11042-017-5465-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChengFYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengFY18, author = {Yuqiao Cheng and Zhengxin Fu and Bin Yu}, title = {Improved Visual Secret Sharing Scheme for {QR} Code Applications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2393--2403}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819125}, doi = {10.1109/TIFS.2018.2819125}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FuLXY18, author = {Zhengxin Fu and Sijia Liu and Kun Xia and Bin Yu}, title = {Improved Extended Polynomial-Based Secret Image Sharing Scheme Using {QR} Code}, booktitle = {14th International Conference on Computational Intelligence and Security, {CIS} 2018, Hangzhou, China, November 16-19, 2018}, pages = {233--237}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIS2018.2018.00058}, doi = {10.1109/CIS2018.2018.00058}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/FuLXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShenLFY17, author = {Gang Shen and Feng Liu and Zhengxin Fu and Bin Yu}, title = {Perfect contrast XOR-based visual cryptography schemes via linear algebra}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {15--37}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0285-5}, doi = {10.1007/S10623-016-0285-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShenLFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShenLFY17, author = {Gang Shen and Feng Liu and Zhengxin Fu and Bin Yu}, title = {New insight into linear algebraic technique to construct visual cryptography scheme for general access structure}, journal = {Multim. Tools Appl.}, volume = {76}, number = {12}, pages = {14511--14533}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3867-3}, doi = {10.1007/S11042-016-3867-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShenLFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuSFYW16, author = {Hao Hu and Gang Shen and Zhengxin Fu and Bin Yu and Jingjing Wang}, title = {General construction for XOR-based visual cryptography and its extended capability}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13883--13911}, year = {2016}, url = {https://doi.org/10.1007/s11042-016-3250-4}, doi = {10.1007/S11042-016-3250-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuSFYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ShenLFYW16, author = {Gang Shen and Feng Liu and Zhengxin Fu and Bin Yu and Wen Wang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Feng Liu}, title = {Halftone Visual Cryptography with Complementary Cover Images}, booktitle = {Digital Forensics and Watermarking - 15th International Workshop, {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10082}, pages = {223--237}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53465-7\_17}, doi = {10.1007/978-3-319-53465-7\_17}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ShenLFYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FuY14, author = {Zhengxin Fu and Bin Yu}, title = {Optimal pixel expansion of deterministic visual cryptography scheme}, journal = {Multim. Tools Appl.}, volume = {73}, number = {3}, pages = {1177--1193}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1625-3}, doi = {10.1007/S11042-013-1625-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/FuY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdhms/FuY14, author = {Zhengxin Fu and Bin Yu}, title = {Ideal Secure Multi-Secret Visual Cryptography Scheme with Ring Shares}, journal = {Trans. Data Hiding Multim. Secur.}, volume = {9}, pages = {42--56}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55046-1\_3}, doi = {10.1007/978-3-642-55046-1\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdhms/FuY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/FuY13, author = {Zhengxin Fu and Bin Yu}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Visual Cryptography and Random Grids Schemes}, booktitle = {Digital-Forensics and Watermarking - 12th International Workshop, {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8389}, pages = {109--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43886-2\_8}, doi = {10.1007/978-3-662-43886-2\_8}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/FuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/FuY12, author = {Zhengxin Fu and Bin Yu}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {On the Security of Multi-secret Visual Cryptography Scheme with Ring Shares}, booktitle = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW} 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7809}, pages = {485--494}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40099-5\_39}, doi = {10.1007/978-3-642-40099-5\_39}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/FuY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YuFF08, author = {Bin Yu and Zhengxin Fu and Liguo Fang}, title = {A Modified Multi-Secret Sharing Visual Cryptography Scheme}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers}, pages = {351--354}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.120}, doi = {10.1109/CIS.2008.120}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YuFF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.