Author of the publication

N-phase logistic chaotic sequence and its application for image encryption.

, , , and . IET Signal Processing, 10 (9): 1096-1104 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method of Security Measurement of the Network Data Transmission., , , and . IPDPS, IEEE Computer Society, (2005)Chaos synchronization and parameters estimation of chaotic Lur'e systems with full unknown parameters via sampled-data control., and . IMA J. Math. Control & Information, 35 (4): 1251-1262 (2018)An analogue-digital mixed method for solving the dynamical degradation of digital chaotic systems., , and . IMA J. Math. Control & Information, 32 (4): 703-716 (2015)Improved NSGA-II Algorithm for Optimization of Constrained Functions., , and . MVHI, page 673-675. IEEE Computer Soceity, (2010)Data restoration based on Gaussian noisy and motion-blurred snapshots in multimedia big data., , and . Multimedia Tools Appl., 77 (8): 9959-9977 (2018)A general hybrid model for chaos robust synchronization and degradation reduction., , , , and . Inf. Sci., (2015)Analysis and Design of Digital Chaotic Systems With Desirable Performance via Feedback Control., , , , and . IEEE Trans. Systems, Man, and Cybernetics: Systems, 45 (8): 1187-1200 (2015)A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks., , , and . Sensors, 17 (3): 553 (2017)Two Novel Packet Marking Schemes for IP Traceback., , , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 459-466. Springer, (2006)Pseudorandom sequence generator based on the Chen chaotic system., , and . Comput. Phys. Commun., 184 (3): 765-768 (2013)