Yanli Ren

ORCID: 0000-0003-4510-7883
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Complexity and Algorithms in Graphs
  • Advanced Topics in Algebra
  • Rings, Modules, and Algebras
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Cryptography and Residue Arithmetic
  • Phytochemical compounds biological activities
  • Advanced Control Systems Optimization
  • IoT and Edge/Fog Computing
  • Algebraic structures and combinatorial models
  • Adversarial Robustness in Machine Learning
  • Plant Virus Research Studies
  • Building Energy and Comfort Optimization
  • Face recognition and analysis
  • Face and Expression Recognition
  • Plant and Fungal Interactions Research
  • Phytochemistry and Bioactivity Studies
  • Biometric Identification and Security

Shanghai University
2016-2025

Chinese Academy of Tropical Agricultural Sciences
2025

First Affiliated Hospital Zhejiang University
2022-2024

Yili Normal University
2022-2023

Henan Institute of Technology
2023

Hangzhou Normal University
2022-2023

Panzhihua University
2023

Dalian University of Technology
2023

Chongqing Medical University
2022

Second Affiliated Hospital of Chongqing Medical University
2022

10.1016/j.jvcir.2013.11.001 article EN Journal of Visual Communication and Image Representation 2013-11-09

This paper proposes a novel watermarking scheme with flexible self-recovery quality. The embedded watermark data for content recovery are calculated from the original discrete cosine transform (DCT) coefficients of host image and do not contain any additional redundancy. When part watermarked is tampered, in area without modification still can be extracted. If amount extracted large, we reconstruct tampered according to constraints given by data. Otherwise, may employ compressive sensing...

10.1109/tifs.2011.2159208 article EN IEEE Transactions on Information Forensics and Security 2011-06-17

Abstract Quantum digital signatures can be used to authenticate classical messages in an information-theoretically secure way. Previously, a novel quantum signature for has been proposed and gave experimental demonstration of distributing from one sender two receivers. Some improvement versions were subsequently presented, which made it more feasible with present technology. These proposals are basic building blocks only deal the problem sending single bit while no-forging non-repudiation...

10.1038/srep09231 article EN cc-by Scientific Reports 2015-03-18

With the rise of cryptocurrencies, blockchain, which is underlying technology them, has gained more attention and been used in Internet Things (IoT) other fields. However, there are bottlenecks that hinder its application, such as storage capacity. Due to large number IoT devices always act data generators many systems, transactions will be generated at a high rate. The problem serious IoT. In this article, expand capacity for each peer, we select old blocks created previously less likely...

10.1109/jiot.2020.2993030 article EN IEEE Internet of Things Journal 2020-05-07

Multiview clustering has received great attention and numerous subspace algorithms for multiview data have been presented. However, most of these do not effectively handle high-dimensional fail to exploit consistency the number connected components in similarity matrices different views. In this article, we propose a novel consistency-induced (CiMSC) tackle issues, which is mainly composed structural (SC) sample assignment (SAC). To be specific, SC aims learn matrix each single view wherein...

10.1109/tcyb.2022.3165550 article EN IEEE Transactions on Cybernetics 2022-04-27

This paper proposes a novel scheme of compressing encrypted images with auxiliary information. The content owner encrypts the original uncompressed and also generates some information, which will be used for data compression image reconstruction. Then, channel provider who cannot access may compress by quantization method optimal parameters that are derived from part information ratio-distortion criteria, transmit compressed data, include an sub-image, quantized another At receiver side,...

10.1109/tmm.2014.2315974 article EN IEEE Transactions on Multimedia 2014-04-07

Steganalysis is a technique for detecting the existence of secret information hidden in digital media. In this paper, we propose novel scheme JPEG steganalysis. scheme, first design diverse base filters which are able to obtain image residuals from various directions. Then, cascade filter generation strategy construct set high order filters. We further select with maximum diversity. The selected convolved decompressed capture subtle embedding traces. residuals, termed as diversity residual,...

10.1109/tcsvt.2019.2891778 article EN IEEE Transactions on Circuits and Systems for Video Technology 2019-01-09

Federated learning (FL) is a distributed machine framework, which allows multiple users to collaboratively train and obtain global model with high accuracy. Currently, FL paid more attention by researchers growing number of protocols are proposed. This article first analyzes the security vulnerabilities VerifyNet VeriFL protocols, proposes new aggregation protocol for FL. We use additive homomorphic encryption double masking simultaneously protect user's local aggregated while most existing...

10.1109/jiot.2022.3194930 article EN IEEE Internet of Things Journal 2022-08-05

10.1109/tcsvt.2025.3531958 article EN IEEE Transactions on Circuits and Systems for Video Technology 2025-01-01

RNA decay is a pervasive process in eukaryotic cells. Viruses utilize the host cell's intracellular machinery to gain access essential molecules and subcellular structures required for infection during pathogenesis process. The study demonstrates that turnip crinkle virus (TCV) enhances expression of Arabidopsis Dcp1 (AtDcp1), which negatively regulates accumulation TCV RNA, indicating its involvement antiviral defense. Nevertheless, circumvents defense based on decay, as indicated by capsid...

10.1111/tpj.70075 article EN The Plant Journal 2025-03-01

ABSTRACT RNA silencing and autophagy play crucial roles in maintaining cellular homeostasis defending against viral infections diverse eukaryotic hosts. In response to defenses, the majority of plant viruses have evolved suppressors (VSRs). Cassava mosaic geminiviruses (CMGs) are a group bipartite begomoviruses that cause significant losses staple food crop cassava ( Manihot esculenta Crantz). The AC4 protein, encoded by CMGs, is well‐characterized VSR; however, precise mechanism underlying...

10.1111/pce.15511 article EN Plant Cell & Environment 2025-04-03

This work proposes a novel scheme of compressing and decompressing encrypted image based on compressive sensing. An original is as set coefficients by secret orthogonal transform. Since the has sparse representation in conventional transform domain can be recovered from small quantity measurements, data are compressed into series measurement data. Using signal recovery method sensing, receiver reconstruct principal content image. way, quality reconstructed dependent compression rate...

10.1109/iihmsp.2011.12 article EN 2011-10-01

10.1007/s12555-018-0594-8 article EN International Journal of Control Automation and Systems 2019-05-06

Cipadonoid A ( 1), a novel limonoid with an unprecedented skeleton, was isolated from the leaves of Cipadessa cinerasecns. Its structure and relative configuration were determined by spectroscopic analysis computer modeling. 1 represents new type limonoid, characterized rearranged tetrahydropyranyl ring B incorporating usually exocyclic C-30. possible biosynthetic pathway also proposed.

10.1021/ol800415n article EN Organic Letters 2008-04-23
Coming Soon ...