En Zhang

ORCID: 0000-0003-4106-6877
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Crystallization and Solubility Studies
  • X-ray Diffraction in Crystallography
  • Complexity and Algorithms in Graphs
  • Cloud Data Security Solutions
  • Microwave Engineering and Waveguides
  • EEG and Brain-Computer Interfaces
  • Blockchain Technology Applications and Security
  • Visual perception and processing mechanisms
  • Advanced Vision and Imaging
  • Opportunistic and Delay-Tolerant Networks
  • Epilepsy research and treatment
  • Antenna Design and Analysis
  • Generative Adversarial Networks and Image Synthesis
  • Complex Network Analysis Techniques
  • Opinion Dynamics and Social Influence
  • Neural and Behavioral Psychology Studies
  • Language, Metaphor, and Cognition
  • Advanced Graph Neural Networks
  • Air Quality and Health Impacts
  • Image Enhancement Techniques

Beijing Normal University
2010-2024

Chinese Institute for Brain Research
2020-2024

Henan Normal University
2011-2023

Beijing Institute of Technology
2019-2023

Zhuhai Institute of Advanced Technology
2019-2023

Peking University
2021

Shanghai Jiao Tong University
2019

Beijing University of Technology
2011-2013

Traditional steganography methods often hide secret data by establishing a mapping relationship between and cover image or directly in noisy area, but has low embedding capacity. Based on the thought of deep learning, this paper, we propose new scheme based U-Net structure. First, form paired training, trained neural network includes hiding an extraction network; then, sender uses to embed into another full-size without any modification sends it receiver. Finally, receiver reconstruct...

10.1109/access.2019.2891247 article EN cc-by-nc-nd IEEE Access 2019-01-01

Private set intersection (PSI) enables parties to compute the of their inputs without leaking any additional information. Recently, there have been significant advances in two-party settings with malicious security, making PSI truly practical even compared naive insecure method. However, efficient solutions more general case (multi-party) are only known for semi-honest setting. How construct a multi-party solution (especially large inputs) setting remains an important open question this...

10.1145/3338466.3358927 article EN 2019-11-11

File fragment classification is an important step in digital forensics. The most popular method based on traditional machine learning by extracting features like N-gram, Shannon entropy or Hamming weights. However, these are far from enough to classify file fragments. In this paper, we propose a novel scheme fragment-to-grayscale image conversion and deep extract more hidden therefore improve the accuracy of classification. Benefit multi-layered feature maps, our convolution neural network...

10.1109/spw.2018.00029 article EN 2018-05-01

10.1007/s11554-018-0826-4 article EN Journal of Real-Time Image Processing 2018-09-27

Repetitive experience with the same visual stimulus and task can remarkably improve behavioral performance on task. This well-known perceptual-learning phenomenon is usually specific to trained retinal- or visual-field location, which taken as an indication of plastic changes in retinotopic areas. In previous studies perceptual learning, however, a change location retina accompanied by positional nonretinotopic frames reference, such relative head other objects. It unclear, therefore,...

10.1073/pnas.1003547107 article EN Proceedings of the National Academy of Sciences 2010-08-23

The effects of air pollution on adolescents need further consideration. Although there is evidence that maternal exposure to may affect the cognitive function offspring, relevant studies remain limited and inconsistent, with a lack assessing causal from developing countries. Using data Chinese Family Panel Studies, representative nationwide cohort study, OLS combined instrumental variable + two-stage least square (IV+2SLS) was used explore PM2.5 concentrations during pregnancy offspring when...

10.1016/j.envpol.2021.118560 article EN cc-by-nc-nd Environmental Pollution 2021-11-19

Electric Vehicle Routing Problem (EVRP) is considerably challenging due to the capacity and electricity constraints of electric vehicles (EVs). Most existing studies on EVRP consider no limits charging times when optimizing routes EVs. However, long time charging, EVs are usually limited urgent service demands customers. To simulate this practical problem, paper first formulates with both (EVRP-CC). tackle new optimization further devises a two-stage solution construction method for ant...

10.1109/smc53654.2022.9945248 article EN 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2022-10-09

Secret sharing is an important component of cryptography protocols and has a wide range practical applications. However, the existing secret schemes cannot apply to computationally weak devices efficiently guarantee fairness. In this study, novel outsourcing scheme proposed. setting sharing, clients only need small amount decryption verification operations, while expensive reconstruction computation verifiable can be outsourced cloud service providers (CSP). The does not require complex...

10.1049/iet-ifs.2017.0026 article EN IET Information Security 2017-09-19

The quality of underwater images is often marred by noticeable color casts and blurring, resulting from complex phenomena such as differential light attenuation based on wavelength, veiling scattering, scattering plankton suspended particles in water. In this paper, we propose an effective image enhancement method called Optimal Contrast Attenuation Difference (OCAD) to tackle these issues. OCAD employs a two-step approach. First, it estimates coarse transmission map optimizing contrast...

10.1109/access.2023.3292275 article EN cc-by-nc-nd IEEE Access 2023-01-01

Threshold private set intersection (TPSI) allows multiple parties to learn the of their input sets only if size is greater than a certain threshold. This task has been demonstrated useful with practical applications, and thus many active research conducted. However, current solutions for TPSI are still slow large e.g., n=2^20 size, potentially candidates secure against semi-honest adversaries. For basic PSI, there have efficient scalable solutions, even in malicious settings. It interesting...

10.1145/3576915.3623158 article EN cc-by Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

Abstract Visual processing takes place in both retinotopic and spatiotopic frames of reference. Whereas visual perceptual learning is usually specific to the trained location, our recent study has shown specificity motion direction discrimination. To explore mechanisms underlying learning, examine whether similar also exist form processing, we human subjects discriminate an orientation difference between two successively displayed stimuli, with a gaze shift manipulate their positional...

10.1111/ejn.12379 article EN European Journal of Neuroscience 2013-10-01

Deploying deep learning models on edge servers can effectively alleviate the pressure cloud data centers in computing, communication, and energy, etc. In this study, we attempt to extend deployment scheme from mobile terminals further save spectrum resources, utilize communication provide intelligent applications. Unfortunately, model experiences a slow convergence speed, terminal consumes much energy if is only trained local devices with weak computing power. Therefore, deploy algorithms...

10.1109/jsyst.2022.3203727 article EN IEEE Systems Journal 2022-09-12

Using the educational knowledge graph to express logical characteristics of knowledge, this paper takes project-driven learning in teaching “Information Technology Secondary Schools” as an example and studies group cooperative mode based on graph. The relationship between points subject courses is described form a graph, activities coordinating cooperation each are completed through integration process use classroom can not only build collaborative system teachers students but also help...

10.4018/ijicte.321120 article EN International Journal of Information and Communication Technology Education 2023-04-07

Threshold private set intersection (TPSI) allows a receiver to obtain the when cardinality of is greater or equal threshold, which has wide range applications such as fingerprint matching, online dating and ridesharing. Existing TPSI protocols are inefficient because almost all them rely on lots expensive public-key techniques require an exponential number possible combinations among shares. In this work, we design efficient protocol, achieves computational security in semi-honest model. To...

10.1109/access.2020.3048743 article EN cc-by IEEE Access 2021-01-01

With the wide application of Internet Things (IoT), a huge number data are collected from IoT networks and required to be processed, such as mining. Although it is popular outsource storage computation cloud, may invade privacy participants’ information. Cryptography‐based privacy‐preserving mining has been proposed protect participating parties’ for this process. However, still an open problem handle with multiparticipant’s ciphertext analysis. And these algorithms rely on semihonest...

10.1155/2018/2385150 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret schemes, fairness vital desirable property. To achieve fairness, existing schemes either require trusted third party or execution of multiround protocol, are impractical. Moreover, classic scheme requires expensive computing verification phase. In this work, we provide an outsourcing hierarchical threshold (HTSS) protocol based on reputation. scheme, participants...

10.1155/2019/6989383 article EN cc-by Security and Communication Networks 2019-10-10

Rational secret sharing was first introduced by Halpern and Teague (STOC, 2004). Since then, a series of works have focused on designing rational protocols. However, most existing solutions can share only one at process. To multiple secrets such as m secrets, the dealer must redistribute shares for times. In addition, previous assume existence broadcast channel which is not realistic. Motivated those problems, this paper proposes multi-secret scheme, combines scheme with game theory....

10.1142/s012905411350024x article EN International Journal of Foundations of Computer Science 2013-09-01

The first joint fingerprinting and decryption (JFD) for vector quantization (VQ) images addressed the problem that decrypted multimedia data may be redistributed from authorized customers to unauthorized customers. scheme also caused conventional JFD methods equipped with a special ability resist noise interference. Till now, some existing schemes related have been proposed protect content distribution, but these failed tackle several problems in original based on VQ image, including high...

10.1155/2018/4313769 article EN cc-by Security and Communication Networks 2018-08-06

Steganalysis technology judges whether there is secret information in the carrier by monitoring abnormality of data, so traditional hiding has reached bottleneck. Therefore, this paper proposed coverless based on improved training Wasserstein GANs (WGAN-GP) model. The sender trains WGAN-GP with a natural image and image. generated are visually identical, parameters generator saved to form codebook. uploads (disguise image) cloud disk. receiver downloads camouflage from disk obtains...

10.4018/ijdcf.20210701.oa5 article EN International Journal of Digital Crime and Forensics 2021-06-07
Coming Soon ...