Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalyzing a chaos-based image encryption algorithm using alternate structure, , , , and . CoRR, (2011)Breaking an image compression and encryption scheme based on Chinese Remainder Theorem., , , and . CoRR, (2013)Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation, , , and . CoRR, (2012)Cryptanalyzing an image encryption algorithm based on scrambling and Veginere cipher., , , , and . CoRR, (2014)A differentially private nonnegative matrix factorization for recommender system., , , and . Inf. Sci., (2022)Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers., , , , and . Int. J. Bifurc. Chaos, 27 (10): 1750155:1-1750155:13 (2017)Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing., , , , , , and . IEEE Internet Things J., 11 (5): 8401-8413 (2024)A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle., , , , , and . IEEE Internet Things J., 7 (2): 1061-1071 (2020)From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice., , , , , and . IEEE Trans. Cybern., 53 (2): 1324-1334 (2023)Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training., , , , , , , and . CoRR, (2023)