Name
Affiliation
Papers
SHANYU TANG
School of Computer Science, China University of Geosciences, Wuhan City, P. R. China
37
Collaborators
Citations 
PageRank 
54
213
17.47
Referers 
Referees 
References 
419
699
367
Search Limit
100699
Title
Citations
PageRank
Year
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography00.342021
Covert Communication Over VoIP Streaming Media With Dynamic Key Distribution and Authentication00.342021
Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates00.342018
Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement.120.492018
Secure and robust digital image watermarking scheme using logistic and RSA encryption.60.462018
An efficient and secure VoIP communication system with chaotic mapping and message digest.00.342018
Steganalysis of LSB Speech with Low Embedding Rates based on Joint Probability.00.342017
Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme.130.642017
Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: Applications and extensions.00.342017
Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking.00.342017
Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol.30.372017
An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks70.432016
Universal steganography model for low bit‐rate speech codec60.472016
A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP30.392016
Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography30.372015
Negative Survey-Based Privacy Protection of Cloud Data00.342015
Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards.80.462014
Audio steganography with AES for real-time covert voice over internet protocol communications.150.502014
Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications90.792014
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card230.822014
Dynamic Knowledge Repository-Based Security Auxiliary System of User Behavior00.342013
An Information- Theoretical Model for Streaming Media Based Stegosystems.00.342013
Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography00.342013
De Bruijn Graph-Based Whole-Genomic Sequence Assembly Algorithms and Applications00.342013
Research on a New Mathematic Description for Fingerprint Identification.00.342013
Improving Performance of E-Government System from the User Perspective00.342013
A Hybrid Model for Simulating Crowd Evacuation.60.602013
ECC-Based Authenticated Key Agreement Protocol with Privacy Protection for VoIP Communications00.342013
Establishment of Security Levels in Trusted Cloud Computing Platforms.00.342013
Robust and Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Smart Grids.00.342013
Steganography Integration Into a Low-Bit Rate Speech Codec80.512012
Network service registration based on role-goal-process-service meta-model in a P2P network.10.372012
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec411.452011
Steganalysis of compressed speech to detect covert voice over Internet protocol channels.170.742011
Simulation of Web Data Traffic Patterns Using Fractal Statistical Modelling.10.392011
Performance of Database Driven Network Applications from the User Perspective10.352009
An approach to information hiding in low bit-rate speech stream301.122008