Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Elena Vildjiounaite
J. M. Pardo
Hao Mao
Peter Malec
Mateus Beck Rutzig
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
SHANYU TANG
Author Info
Open Visualization
Name
Affiliation
Papers
SHANYU TANG
School of Computer Science, China University of Geosciences, Wuhan City, P. R. China
37
Collaborators
Citations
PageRank
54
213
17.47
Referers
Referees
References
419
699
367
Search Limit
100
699
Publications (37 rows)
Collaborators (54 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography
0
0.34
2021
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication
0
0.34
2021
Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates
0
0.34
2018
Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement.
12
0.49
2018
Secure and robust digital image watermarking scheme using logistic and RSA encryption.
6
0.46
2018
An efficient and secure VoIP communication system with chaotic mapping and message digest.
0
0.34
2018
Steganalysis of LSB Speech with Low Embedding Rates based on Joint Probability.
0
0.34
2017
Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme.
13
0.64
2017
Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions.
0
0.34
2017
Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking.
0
0.34
2017
Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol.
3
0.37
2017
An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks
7
0.43
2016
Universal steganography model for low bit‐rate speech codec
6
0.47
2016
A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP
3
0.39
2016
Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography
3
0.37
2015
Negative Survey-Based Privacy Protection of Cloud Data
0
0.34
2015
Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards.
8
0.46
2014
Audio steganography with AES for real-time covert voice over internet protocol communications.
15
0.50
2014
Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications
9
0.79
2014
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card
23
0.82
2014
Dynamic Knowledge Repository-Based Security Auxiliary System of User Behavior
0
0.34
2013
An Information- Theoretical Model for Streaming Media Based Stegosystems.
0
0.34
2013
Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography
0
0.34
2013
De Bruijn Graph-Based Whole-Genomic Sequence Assembly Algorithms and Applications
0
0.34
2013
Research on a New Mathematic Description for Fingerprint Identification.
0
0.34
2013
Improving Performance of E-Government System from the User Perspective
0
0.34
2013
A Hybrid Model for Simulating Crowd Evacuation.
6
0.60
2013
ECC-Based Authenticated Key Agreement Protocol with Privacy Protection for VoIP Communications
0
0.34
2013
Establishment of Security Levels in Trusted Cloud Computing Platforms.
0
0.34
2013
Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids.
0
0.34
2013
Steganography Integration Into a Low-Bit Rate Speech Codec
8
0.51
2012
Network service registration based on role-goal-process-service meta-model in a P2P network.
1
0.37
2012
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec
41
1.45
2011
Steganalysis of compressed speech to detect covert voice over Internet protocol channels.
17
0.74
2011
Simulation of Web Data Traffic Patterns Using Fractal Statistical Modelling.
1
0.39
2011
Performance of Database Driven Network Applications from the User Perspective
1
0.35
2009
An approach to information hiding in low bit-rate speech stream
30
1.12
2008
1