A chaos-based image encryption algorithm with variable control parameters Y Wang, KW Wong, X Liao, T Xiang, G Chen Chaos, Solitons & Fractals 41 (4), 1773-1783, 2009 | 348 | 2009 |
A chaos-based image encryption algorithm with variable control parameters Y Wang, KW Wong, X Liao, T Xiang, G Chen Chaos, Solitons & Fractals 41 (4), 1773-1783, 2009 | 348 | 2009 |
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map T Xiang, X Liao, K Wong Applied Mathematics and Computation 190 (2), 1637-1645, 2007 | 272 | 2007 |
A novel block cryptosystem based on iterating a chaotic map T Xiang, X Liao, G Tang, Y Chen, K Wong Physics Letters A 349 (1-4), 109-115, 2006 | 265 | 2006 |
Selective image encryption using a spatiotemporal chaotic system T Xiang, K Wong, X Liao Chaos: An Interdisciplinary Journal of Nonlinear Science 17 (2), 023115, 2007 | 227 | 2007 |
A training-integrity privacy-preserving federated learning scheme with trusted execution environment Y Chen, F Luo, T Li, T Xiang, Z Liu, J Li Information Sciences 522, 69-79, 2020 | 179 | 2020 |
A block cipher with dynamic S-boxes based on tent map Y Wang, KW Wong, X Liao, T Xiang Communications in Nonlinear Science and Numerical Simulation 14 (7), 3089-3099, 2009 | 173 | 2009 |
Secure and efficient data communication protocol for wireless body area networks C Hu, H Li, Y Huo, T Xiang, X Liao IEEE Transactions on Multi-Scale Computing Systems 2 (2), 94-107, 2016 | 163 | 2016 |
Secure cloud storage meets with secure network coding F Chen, T Xiang, Y Yang, SSM Chow IEEE Transactions on Computers 65 (6), 1936-1948, 2016 | 141 | 2016 |
Secure cloud storage meets with secure network coding F Chen, T Xiang, Y Yang, C S. M. Sherman INFOCOM, 2014 Proceedings IEEE, 673-681, 2014 | 141 | 2014 |
Parallel image encryption algorithm based on discretized chaotic map Q Zhou, K Wong, X Liao, T Xiang, Y Hu Chaos, Solitons & Fractals 38 (4), 1081-1092, 2008 | 136 | 2008 |
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications G Hu, D Xiao, Y Wang, T Xiang Journal of Visual Communication and Image Representation 44, 116-127, 2017 | 123 | 2017 |
Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map Y Wang, X Liao, T Xiang, KW Wong, D Yang Physics Letters A 363 (4), 277-281, 2007 | 95 | 2007 |
Highly efficient linear regression outsourcing to a cloud F Chen, T Xiang, X Lei, J Chen IEEE Transactions on Cloud Computing 2 (4), 499-508, 2014 | 88 | 2014 |
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud F Chen, T Xiang, Y Yang Journal of Parallel and Distributed Computing 74 (3), 2141-2151, 2014 | 85 | 2014 |
An efficient blockchain-based privacy preserving scheme for vehicular social networks Y Pu, T Xiang, C Hu, A Alrawais, H Yan Information Sciences 540, 308-324, 2020 | 79 | 2020 |
A new chaotic cryptosystem J Wei, X Liao, K Wong, T Xiang Chaos, Solitons & Fractals 30 (5), 1143-1152, 2006 | 79 | 2006 |
Secure and efficient data collection and storage of IoT in smart ocean C Hu, Y Pu, F Yang, R Zhao, A Alrawais, T Xiang IEEE Internet of Things Journal 7 (10), 9980-9994, 2020 | 72 | 2020 |
Privacy masking stochastic subgradient-push algorithm for distributed online optimization Q Lü, X Liao, T Xiang, H Li, T Huang IEEE transactions on cybernetics 51 (6), 3224-3237, 2020 | 64 | 2020 |
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud G Hu, D Xiao, T Xiang, S Bai, Y Zhang Information Sciences 387, 132-145, 2017 | 63 | 2017 |