Yong Wang

ORCID: 0000-0002-5247-043X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Recommender Systems and Techniques
  • Cryptographic Implementations and Security
  • Advanced Computational Techniques and Applications
  • Advanced Steganography and Watermarking Techniques
  • Coding theory and cryptography
  • Cellular Automata and Applications
  • Error Correcting Code Techniques
  • Advanced Wireless Communication Techniques
  • Chaos control and synchronization
  • Higher Education and Teaching Methods
  • Web Data Mining and Analysis
  • Digital Marketing and Social Media
  • Sparse and Compressive Sensing Techniques
  • Mathematical Dynamics and Fractals
  • Algorithms and Data Compression
  • Data Management and Algorithms
  • Metaheuristic Optimization Algorithms Research
  • Advanced Decision-Making Techniques
  • Image Retrieval and Classification Techniques
  • Caching and Content Delivery
  • Digital Media Forensic Detection
  • Sentiment Analysis and Opinion Mining
  • Rough Sets and Fuzzy Logic
  • Privacy-Preserving Technologies in Data

Soochow University
2025

First Hospital of China Medical University
2025

China Medical University
2025

Chongqing University of Posts and Telecommunications
2015-2024

Beijing University of Technology
2024

Southwest University of Political Science & Law
2024

China Southern Power Grid (China)
2023

Liaocheng University
2016-2023

Anhui Polytechnic University
2006-2023

Institute of Information Engineering
2017-2022

10.1016/j.cnsns.2008.12.005 article EN Communications in Nonlinear Science and Numerical Simulation 2008-12-17

Summary In this study, we present a novel teaching‐learning‐based optimization (TLBO) algorithm for solving the optimal chiller loading problem. The proposed uses integer‐based encoding and decoding mechanism that is efficient easy to implement. teaching phase can improve quality of learning process thus enhance exploitation ability. addition, well‐designed procedure developed between one another in population. A exploration self‐learning procedures are embedded TLBO algorithm, which...

10.1002/oca.2334 article EN Optimal Control Applications and Methods 2017-06-06

For real-world time dependent road networks (TDRNs), answering shortest path-based route queries and plans in real-time is highly desirable by many industrial applications. Unfortunately, traditional ( Dijkstra - or A *-like) algorithms are computationally expensive for such tasks on TDRNs. Naturally, indexes needed to meet the constraint required real In this paper, we propose a novel height-balanced tree-structured index, called TD-G-tree, which supports fast over The key idea use...

10.14778/3342263.3342265 article EN Proceedings of the VLDB Endowment 2019-07-01

A blind audio information bit hiding algorithm with effective synchronization is proposed in this paper. The embeds signals the time domain to resist attacks such as cropping while keeping computation for resynchronization lower. watermark placed blockwise DCT coefficients of original exploiting HAS (Human Audio System) features. To lower error rate extraction, error-correcting coding applied. experimental results show that hidden imperceptible robust caused by additive noise, MP3 coding,...

10.1109/iscas.2002.1010302 article EN 2003-06-25

A recently proposed asymmetric cryptosystem based on coherent superposition and equal modulus decomposition has shown to be robust against a specific attack. In this paper, we have that it is vulnerable newly designed With attack, an intruder able access the exact private key obtain precise attack results using phase retrieval algorithm. addition, also security-enhanced random technique 4f optical system. system, employed create effective trapdoor one-way function. As result, avoid various...

10.1364/ao.55.000679 article EN Applied Optics 2016-01-19
Coming Soon ...