Follow
Leo Yu ZHANG
Leo Yu ZHANG
Other namesLeo Zhang
Snr. Lecturer, School of ICT, Griffith University
Verified email at griffith.edu.au - Homepage
Title
Cited by
Cited by
Year
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials, 2018
3242018
A Review of Compressive Sensing in Information Security Field
Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He
IEEE Access, 2016
2012016
On the security of a class of diffusion mechanisms for image encryption
LY Zhang, Y Liu, F Pareschi, Y Zhang, KW Wong, R Rovatti, G Setti
IEEE Transactions on Cybernetics 48 (4), 1163 - 1175, 2018
1342018
Embedding cryptographic features in compressive sensing
Y Zhang, KW Wong, D Xiao, LY Zhang, M Li
Neurocomputing 40 (12), 472-480, 2016
1292016
Breaking a novel colour image encryption algorithm based on chaos
C Li, LY Zhang, R Ou, KW Wong, S Shu
Nonlinear dynamics, 1-6, 2012
1252012
A chaotic image encryption scheme owning temp-value feedback
LY Zhang, X Hu, Y Liu, KW Wong, J Gan
Communications in Nonlinear Science and Numerical Simulation, 2013
1242013
Low-cost and confidentiality-preserving data acquisition for internet of multimedia things
Y Zhang, Q He, Y Xiang, LY Zhang, B Liu, J Chen, Y Xie
IEEE Internet of Things Journal 5 (5), 3442-3451, 2017
1102017
Breaking a chaotic image encryption algorithm based on perceptron model
LY Zhang, C Li, Q Li, D Zhang, S Shu
Nonlinear Dynamics 69 (3), 1091-1096, 2012
1082012
Bi-level Protected Compressive Sampling
LY Zhang, KW WONG, Y ZHANG, J Zhou
IEEE Transactions on Multimedia 18 (9), 1720 - 1732, 2016
101*2016
A genetic algorithm for constructing bijective substitution boxes with high nonlinearity
Y Wang, Z Zhang, LY Zhang, J Feng, G Gao, L Peng
Information Sciences 523, 152-166, 2020
952020
Compressive Sensing
Y Zhang, Y Xiang, LY Zhang
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT, 1-9, 2019
89*2019
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer
S Hu, X Liu, Y Zhang, M Li, LY Zhang, H Jin, L Wu
CVPR, 15014-15023, 2022
802022
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Y Liu, LY Zhang, J Wang, Y Zhang, K Wong
Nonlinear Dynamics 84 (4), 2241-2250, 2015
712015
Secure wireless communications based on compressive sensing: a survey
Y Zhang, Y Xiang, LY Zhang, Y Rong, S Guo
IEEE Communications Surveys & Tutorials 21 (2), 1093-1111, 2018
682018
Improved known-plaintext attack to permutation-only multimedia ciphers
LY Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen
Information Sciences 430, 228-239, 2018
682018
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
LY Zhang, C Li, KW Wong, S Shu, G Chen
Journal of Systems and Software 85 (9), 2077-2085, 2012
672012
Medical image cipher using hierarchical diffusion and non-sequential encryption
J Chen, L Chen, LY Zhang, Z Zhu
Nonlinear Dynamics 96, 301-322, 2019
642019
Breaking a chaotic image encryption algorithm based on modulo addition and xor operation
C Li, Y Liu, LY Zhang, MZQ Chen
International Journal of Bifurcation and Chaos 23 (04), 1350075, 2013
622013
Challenges and approaches for mitigating byzantine attacks in federated learning
J Shi, J Lu, S Hu, LY Zhang
TrustCom (arXiv preprint arXiv:2112.14468), 2022
582022
Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps
Q Zhong, LY Zhang, J Zhang, L Gao, Y Xiang
The Pacific-Asia Conference on Knowledge Discovery and Data Mining, 462-474, 2020
482020
The system can't perform the operation now. Try again later.
Articles 1–20