相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Virtual Network Recognition and Optimization in SDN-Enabled Cloud Environment
He Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)
DC coefficient recovery for JPEG images in ubiquitous communication systems
Han Qiu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Improving Cloud-Based IoT Services Through Virtual Network Embedding in Elastic Optical Inter-DC Networks
Wenting Wei et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
Liwei Kuang et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2018)
Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers
Keke Gai et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks
Jun Wu et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)
Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things
Keke Gai et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks
Jun Wu et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2018)
A glimpse of 21st century care
Steve Hambleton
AUSTRALIAN JOURNAL OF GENERAL PRACTICE (2018)
Intelligent cryptography approach for secure distributed big data storage in cloud computing
Yibin Li et al.
INFORMATION SCIENCES (2017)
Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks
Keke Gai et al.
IEEE TRANSACTIONS ON SMART GRID (2017)
Efficient selective image encryption
Ahmed M. Ayoup et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
Privacy Protection for Preventing Data Over-Collection in Smart City
Yibin Li et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Outsourcing chaotic selective image encryption to the cloud with steganography
Tao Xiang et al.
DIGITAL SIGNAL PROCESSING (2015)
Fast filter bank convolution for three-dimensional wavelet transform by shared memory on mobile GPU computing
Di Zhao
JOURNAL OF SUPERCOMPUTING (2015)
A Survey of Methods for Analyzing and Improving GPU Energy Efficiency
Sparsh Mittal et al.
ACM COMPUTING SURVEYS (2015)
Comb to Pipeline: Fast Software Encryption Revisited
Andrey Bogdanov et al.
FAST SOFTWARE ENCRYPTION, FSE 2015 (2015)
Fast Selective Encryption Methods for Bitmap Images
Han Qiu et al.
INTERNATIONAL JOURNAL OF MULTIMEDIA DATA ENGINEERING & MANAGEMENT (2015)
Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings
Zafar Shahid et al.
IEEE TRANSACTIONS ON MULTIMEDIA (2014)
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks
Tao Xiang et al.
SIGNAL PROCESSING-IMAGE COMMUNICATION (2014)
Selective image encryption in fractional wavelet domain
Nidhi Taneja et al.
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS (2011)
A novel image encryption method based on total shuffling scheme
Guoji Zhang et al.
OPTICS COMMUNICATIONS (2011)
Real-Time Parallel Hashing on the GPU
Dan A. Alcantara et al.
ACM TRANSACTIONS ON GRAPHICS (2009)
Scope of validity of PSNR in image/video quality assessment
Q. Huynh-Thu et al.
ELECTRONICS LETTERS (2008)
Overview on Selective Encryption of Image and Video: Challenges and Perspectives
A. Massoudi et al.
EURASIP JOURNAL ON INFORMATION SECURITY (2008)
Chaos-based image encryption algorithm
ZH Guan et al.
PHYSICS LETTERS A (2005)
Selective encryption of wavelet-packet encoded image data: efficiency and security
A Pommer et al.
MULTIMEDIA SYSTEMS (2003)
A proposal for supporting selective encryption in JPSEC
W Sadourny et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2003)
Overview of fine granularity scalability in MPEG-4 video standard
WP Li
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2001)