Follow
Tao Xiang
Tao Xiang
Professor of Computer Science, Chongqing University
Verified email at cqu.edu.cn
Title
Cited by
Cited by
Year
A chaos-based image encryption algorithm with variable control parameters
Y Wang, KW Wong, X Liao, T Xiang, G Chen
Chaos, Solitons & Fractals 41 (4), 1773-1783, 2009
3412009
A chaos-based image encryption algorithm with variable control parameters
Y Wang, KW Wong, X Liao, T Xiang, G Chen
Chaos, Solitons & Fractals 41 (4), 1773-1783, 2009
3412009
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map
T Xiang, X Liao, K Wong
Applied Mathematics and Computation 190 (2), 1637-1645, 2007
2662007
A novel block cryptosystem based on iterating a chaotic map
T Xiang, X Liao, G Tang, Y Chen, K Wong
Physics Letters A 349 (1-4), 109-115, 2006
2612006
Selective image encryption using a spatiotemporal chaotic system
T Xiang, K Wong, X Liao
Chaos: An Interdisciplinary Journal of Nonlinear Science 17 (2), 023115, 2007
2232007
A block cipher with dynamic S-boxes based on tent map
Y Wang, KW Wong, X Liao, T Xiang
Communications in Nonlinear Science and Numerical Simulation 14 (7), 3089-3099, 2009
1732009
Secure and efficient data communication protocol for wireless body area networks
C Hu, H Li, Y Huo, T Xiang, X Liao
IEEE Transactions on Multi-Scale Computing Systems 2 (2), 94-107, 2016
1572016
A training-integrity privacy-preserving federated learning scheme with trusted execution environment
Y Chen, F Luo, T Li, T Xiang, Z Liu, J Li
Information Sciences 522, 69-79, 2020
1392020
Parallel image encryption algorithm based on discretized chaotic map
Q Zhou, K Wong, X Liao, T Xiang, Y Hu
Chaos, Solitons & Fractals 38 (4), 1081-1092, 2008
1352008
Secure cloud storage meets with secure network coding
F Chen, T Xiang, Y Yang, SSM Chow
IEEE Transactions on Computers 65 (6), 1936-1948, 2016
1282016
Secure cloud storage meets with secure network coding
F Chen, T Xiang, Y Yang, C S. M. Sherman
INFOCOM, 2014 Proceedings IEEE, 673-681, 2014
1282014
An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications
G Hu, D Xiao, Y Wang, T Xiang
Journal of Visual Communication and Image Representation 44, 116-127, 2017
1162017
Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map
Y Wang, X Liao, T Xiang, KW Wong, D Yang
Physics Letters A 363 (4), 277-281, 2007
942007
Highly efficient linear regression outsourcing to a cloud
F Chen, T Xiang, X Lei, J Chen
IEEE Transactions on Cloud Computing 2 (4), 499-508, 2014
862014
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
F Chen, T Xiang, Y Yang
Journal of Parallel and Distributed Computing 74 (3), 2141-2151, 2014
832014
A new chaotic cryptosystem
J Wei, X Liao, K Wong, T Xiang
Chaos, Solitons & Fractals 30 (5), 1143-1152, 2006
782006
An efficient blockchain-based privacy preserving scheme for vehicular social networks
Y Pu, T Xiang, C Hu, A Alrawais, H Yan
Information Sciences 540, 308-324, 2020
732020
Secure and efficient data collection and storage of IoT in smart ocean
C Hu, Y Pu, F Yang, R Zhao, A Alrawais, T Xiang
IEEE Internet of Things Journal 7 (10), 9980-9994, 2020
642020
A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud
G Hu, D Xiao, T Xiang, S Bai, Y Zhang
Information Sciences 387, 132-145, 2017
602017
Cryptanalysis of a password authentication scheme over insecure networks
T Xiang, K Wong, X Liao
Journal of Computer and system Sciences 74 (5), 657-661, 2008
602008
The system can't perform the operation now. Try again later.
Articles 1–20