Yanli Ren
TitleCited byYear
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
X Zhang, Z Qian, Y Ren, G Feng
IEEE Transactions on Information Forensics and Security 6 (4), 1223-1232, 2011
1352011
Efficient reversible data hiding in encrypted images
X Zhang, Z Qian, G Feng, Y Ren
Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014
1022014
Scalable coding of encrypted images
X Zhang, G Feng, Y Ren, Z Qian
IEEE Transactions on Image Processing 21 (6), 3108-3114, 2012
812012
Compressing encrypted image using compressive sensing
X Zhang, Y Ren, G Feng, Z Qian
2011 Seventh International Conference on Intelligent Information Hiding and …, 2011
522011
Fully CCA2 secure identity based broadcast encryption without random oracles
Y Ren, D Gu
Information Processing Letters 109 (11), 527-533, 2009
522009
Security of quantum digital signatures for classical messages
TY Wang, XQ Cai, YL Ren, RL Zhang
Scientific reports 5, 9231, 2015
432015
Compressing encrypted images with auxiliary information
X Zhang, Y Ren, L Shen, Z Qian, G Feng
IEEE transactions on multimedia 16 (5), 1327-1336, 2014
382014
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
International Conference on Internet and Distributed Computing Systems, 146-159, 2012
362012
Efficient identity based signature/signcryption scheme in the standard model
R Yanli, G Dawu
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE …, 2007
212007
Block cipher based separable reversible data hiding in encrypted images
Z Qian, X Zhang, Y Ren, G Feng
Multimedia Tools and Applications 75 (21), 13749-13763, 2016
202016
Fully Anonymous Identity-based Broadcast Encryption without Random Oracles.
Y Ren, Z Niu, X Zhang
IJ Network Security 16 (4), 256-264, 2014
182014
Verifiable outsourcing algorithms for modular exponentiations with improved checkability
Y Ren, N Ding, X Zhang, H Lu, D Gu
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
162016
New fuzzy identity-based encryption in the standard model
Y Ren, D Gu, S Wang, X Zhang
Informatica 21 (3), 393-407, 2010
162010
JPEG encryption for image rescaling in the encrypted domain
Z Qian, X Zhang, Y Ren
Journal of Visual Communication and Image Representation 26, 9-13, 2015
122015
Secure hierarchical identity based encryption scheme in the standard model
Y Ren, D Gu
International Conference on Cryptology in India, 104-115, 2008
112008
Unbalanced JPEG image steganalysis via multiview data match
A Wu, G Feng, X Zhang, Y Ren
Journal of visual communication and image representation 34, 103-107, 2016
102016
Non-interactive dynamic identity-based broadcast encryption without random oracles
Y Ren, S Wang, X Zhang
International Conference on Information and Communications Security, 479-487, 2012
102012
Efficient hierarchical identity based encryption scheme in the standard model
Y Ren, D Gu
Informatica 32 (2), 2008
102008
New algorithms for verifiable outsourcing of bilinear pairings
Y Ren, N Ding, T Wang, H Lu, D Gu
Science China Information Sciences 59 (9), 99103, 2016
92016
Economic/Academic Importance of Brassica rapa
R Sun
The Brassica rapa Genome, 1-15, 2015
8*2015
The system can't perform the operation now. Try again later.
Articles 1–20