Name
Affiliation
Papers
YANLI REN
School of Communication and Information Engineering, Shanghai University, Shanghai, China
56
Collaborators
Citations 
PageRank 
56
247
24.83
Referers 
Referees 
References 
571
692
505
Search Limit
100692
Title
Citations
PageRank
Year
Low-Complexity Fake Face Detection Based On Forensic Similarity00.342021
Efficient Noninteractive Outsourcing Of Large-Scale Qr And Lu Factorizations00.342021
Non-Interactive And Secure Outsourcing Of Pca-Based Face Recognition00.342021
Multichannel Steganography in Digital Images for Multiple Receivers00.342021
Embedding Probability Guided Network For Image Steganalysis00.342021
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server10.362021
Efficient Outsourced Extraction Of Histogram Features Over Encrypted Images In Cloud00.342021
Privacy-Preserving Redactable Blockchain For Internet Of Things00.342021
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks00.342021
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm20.382020
Privacy-Protected Deletable Blockchain.00.342020
Diversity-Based Cascade Filters for JPEG Steganalysis.20.352020
How to Extract Image Features based on Co-occurrence Matrix Securely and Efficiently in Cloud Computing10.372020
Feature Extraction Optimization of JPEG Steganalysis Based on Residual Images10.342020
Key Based Artificial Fingerprint Generation for Privacy Protection00.342020
Iris Segmentation Based On Improved U-Net Network Model00.342019
Jpeg Steganalysis Based On Multi-Projection Ensemble Discriminant Clustering00.342019
Fully Verifiable Algorithm For Outsourcing Multiple Modular Exponentiations With Single Cloud Server00.342018
Unsupervised steganalysis over social networks based on multi-reference sub-image sets.10.352018
Efficient steganographer detection over social networks with sampling reconstruction.20.362018
Analysis Of The K-Error Linear Complexity And Error Sequence For 2p(N)-Periodic Binary Sequence00.342018
Verifiable outsourced attribute-based signature scheme.30.412018
Efficient and secure outsourcing of bilinear pairings with single server.10.362018
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability.10.412017
PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin.00.342017
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing.00.342017
Verifiable Outsourcing Computation of Modular Exponentiations with Single Server.30.392017
Output Feedback Polytopic Lpv Tube-Rmpc Control For Air-Breathing Hypersonic Vehicles10.342017
Jpeg Image Steganalysis From Imbalanced Data00.342017
Learning AC0 Under k-Dependent Distributions.00.342017
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.60.462016
New algorithms for verifiable outsourcing of bilinear pairings.60.512016
Identity-Based Encryption with Verifiable Outsourced Revocation.30.412016
Block cipher based separable reversible data hiding in encrypted images100.482016
Unbalanced JPEG image steganalysis via multiview data match.50.472016
JPEG encryption for image rescaling in the encrypted domain.60.542015
Towards Efficient, Secure, And Fine-Grained Access Control System In Msns With Flexible Revocations10.352015
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures.10.352015
Compressing Encrypted Images With Auxiliary Information130.642014
Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles30.372014
Efficient reversible data hiding in encrypted images170.722014
Practical parallel key-insulated encryption with multiple helper keys.10.352013
Non-interactive dynamic identity-based broadcast encryption without random oracles10.352012
Scalable coding of encrypted images.221.152012
Efficient ciphertext-policy attribute based encryption with hidden policy130.542012
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups.00.342012
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction481.392011
Compressing Encrypted Image Using Compressive Sensing180.942011
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles40.422010
Fragile watermarking for color image recovery based on color filter array interpolation20.392010
  • 1
  • 2