default search action
BibTeX records: Chuying Yu
@article{DBLP:journals/remotesensing/WuHLLYXD24, author = {Jinfeng Wu and Kesheng Huang and Youhao Luo and Xiaoze Long and Chuying Yu and Hong Xiong and Jianhui Du}, title = {Identification of Dominant Species and Their Distributions on an Uninhabited Island Based on Unmanned Aerial Vehicles (UAVs) and Machine Learning Models}, journal = {Remote. Sens.}, volume = {16}, number = {10}, pages = {1652}, year = {2024}, url = {https://doi.org/10.3390/rs16101652}, doi = {10.3390/RS16101652}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/WuHLLYXD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LiYG22, author = {Xiaowu Li and Chuying Yu and Junfeng Guo}, title = {Multi-Image Encryption Method via Computational Integral Imaging Algorithm}, journal = {Entropy}, volume = {24}, number = {7}, pages = {996}, year = {2022}, url = {https://doi.org/10.3390/e24070996}, doi = {10.3390/E24070996}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/LiYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/GuoCCY22, author = {Cai Guo and Xinan Chen and Yanhua Chen and Chuying Yu}, title = {Multi-Stage Attentive Network for Motion Deblurring via Binary Cross-Entropy Loss}, journal = {Entropy}, volume = {24}, number = {10}, pages = {1414}, year = {2022}, url = {https://doi.org/10.3390/e24101414}, doi = {10.3390/E24101414}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/GuoCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/WangCLY22, author = {Meng Wang and Mengli Chen and Jianzhong Li and Chuying Yu}, title = {3D Copyright Protection Based on Binarized Computational Ghost Imaging Encryption and Cellular Automata Transform}, journal = {Symmetry}, volume = {14}, number = {3}, pages = {595}, year = {2022}, url = {https://doi.org/10.3390/sym14030595}, doi = {10.3390/SYM14030595}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/WangCLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/YuLXL21, author = {Chuying Yu and Xiaowei Li and Shaoyuan Xu and Jianzhong Li}, title = {Computer generated hologram-based image cryptosystem with multiple chaotic systems}, journal = {Wirel. Networks}, volume = {27}, number = {5}, pages = {3507--3521}, year = {2021}, url = {https://doi.org/10.1007/s11276-019-02223-z}, doi = {10.1007/S11276-019-02223-Z}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/YuLXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/YuLCL19, author = {Chuying Yu and Xiaowei Li and Xinan Chen and Jianzhong Li}, title = {An Adaptive and Secure Holographic Image Watermarking Scheme}, journal = {Entropy}, volume = {21}, number = {5}, pages = {460}, year = {2019}, url = {https://doi.org/10.3390/e21050460}, doi = {10.3390/E21050460}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/YuLCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/simutools/YuL19, author = {Chuying Yu and Jianzhong Li}, editor = {Houbing Song and Dingde Jiang}, title = {Computer Generated Hologram-Based Image Cryptosystem with Multiple Chaotic Systems}, booktitle = {Simulation Tools and Techniques - 11th International Conference, SIMUtools 2019, Chengdu, China, July 8-10, 2019, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {295}, pages = {528--538}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32216-8\_51}, doi = {10.1007/978-3-030-32216-8\_51}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/simutools/YuL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiYGR18, author = {Jianzhong Li and Chuying Yu and Brij B. Gupta and Xuechang Ren}, title = {Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition}, journal = {Multim. Tools Appl.}, volume = {77}, number = {4}, pages = {4545--4561}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4452-0}, doi = {10.1007/S11042-017-4452-0}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LiYGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YuLLRG18, author = {Chuying Yu and Jianzhong Li and Xuan Li and Xuechang Ren and Brij B. Gupta}, title = {Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram}, journal = {Multim. Tools Appl.}, volume = {77}, number = {4}, pages = {4585--4608}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4637-6}, doi = {10.1007/S11042-017-4637-6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/YuLLRG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiLYRL18, author = {Jianzhong Li and Qun Lin and Chuying Yu and Xuechang Ren and Ping Li}, title = {A {QDCT-} and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram}, journal = {Soft Comput.}, volume = {22}, number = {1}, pages = {47--65}, year = {2018}, url = {https://doi.org/10.1007/s00500-016-2320-x}, doi = {10.1007/S00500-016-2320-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiLYRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.