Follow
Yunpeng Zhang
Title
Cited by
Cited by
Year
A deep learning approach on short-term spatiotemporal distribution forecasting of dockless bike-sharing system
Y Ai, Z Li, M Gan, Y Zhang, D Yu, W Chen, Y Ju
Neural Computing and Applications, 1-13, 2018
1772018
Digital image encryption algorithm based on chaos and improved DES
Z Yun-Peng, L Wei, C Shui-Ping, Z Zheng-Jun, N Xuan, D Wei-di
2009 IEEE International Conference on Systems, Man and Cybernetics, 474-479, 2009
1722009
Decentralized, BlockChain Based Access Control Framework for the Heterogeneous Internet of Things
C Dukkipati, Y Zhang, LC Cheng
Proceedings of the Third ACM Workshop on Attribute-Based Access Control, 61-69, 2018
1002018
Index-based symmetric DNA encryption algorithm
Z Yunpeng, Z Yu, W Zhong, RO Sinnott
2011 4th International Congress on Image and Signal Processing 5, 2290-2294, 2011
702011
A new image encryption algorithm based on multiple chaos system
Y Zhang, F Zuo, Z Zhai, C Xiaobin
2008 International symposium on Electronic Commerce and Security, 347-350, 2008
582008
Blockchain-Based Real Estate Market: One Method for Applying Blockchain Technology in Commercial Real Estate Market
S Latifi, Y Zhang, LC Cheng
2019 IEEE International Conference on Blockchain (Blockchain), 528-535, 2019
572019
DNA cryptography based on DNA Fragment assembly
Y Zhang, B Fu, X Zhang
2012 8th International Conference on Information Science and Digital Content …, 2012
542012
Access Control in Internet of Things: A Survey
Y Zhang, X Wu
arXiv preprint arXiv:1610.01065, 2016
512016
A chaos-based image encryption algorithm using wavelet transform
Z Yu, Z Zhe, Y Haibing, P Wenjie, Z Yunpeng
2010 2nd International Conference on Advanced Computer Control 2, 217-222, 2010
412010
Research on DNA Cryptography
Y Zhang, LHB Fu
382012
DNA based random key generation and management for OTP encryption
Y Zhang, X Liu, M Sun
Biosystems 159, 51-63, 2017
322017
基于认知心理学知识的人机界面设计
张云鹏
计算机工程与应用 30 (1052107), 139, 2005
252005
Specification and Analysis of Attribute-Based Access Control Policies: An Overview
YZ Dianxiang Xu
Proc. of the International Workshop on Information Assurance, in conjunction …, 2014
24*2014
An optimized DNA based encryption scheme with enforced secure key distribution
Y Zhang, X Liu, Y Ma, LC Cheng
Cluster Computing 20 (4), 3119-3130, 2017
202017
Testing BPEL with Stream X-machine
C Ma, J Wu, T Zhang, Y Zhang, X Cai
2008 International Symposium on Information Science and Engineering 1, 578-582, 2008
192008
A block encryption scheme based on 3D chaotic Arnold maps
Z Zhe, Y Haibing, Z Yu, P Wenjie, Z Yunpeng
2009 International Asia Symposium on Intelligent Interaction and Affective …, 2009
182009
A DNA‐Based Encryption Method Based on Two Biological Axioms of DNA Chip and Polymerase Chain Reaction (PCR) Amplification Techniques
Y Zhang, Z Wang, Z Wang, X Liu, X Yuan
Chemistry–A European Journal 23 (54), 13387-13403, 2017
17*2017
Research of image encryption algorithm based on chaotic magic square
YP Zhang, P Xu, LZ Xiang
Advances in Electronic Commerce, Web Application and Communication, 103-109, 2012
172012
Human-Computer Interface Design Based on Knowledge of Cognitive Psychology [J]
Z Yunpeng
Computer Engineering and Applications 30, 034, 2005
16*2005
盐酸酸洗咪唑啉型缓蚀剂 IM 的研究
颜红侠, 张秋禹, 马晓燕, 张云鹏
应用化工 30 (3), 21-22, 2001
152001
The system can't perform the operation now. Try again later.
Articles 1–20