default search action
Shuqin Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Jingbo Sun, Weiming Peng, Tianbao Song, Haitao Liu, Shuqin Zhu, Jihua Song:
Enhanced cross-prompt trait scoring via syntactic feature fusion and contrastive learning. J. Supercomput. 80(4): 5390-5407 (2024) - [c6]Hamed Alimohammadzadeh, Shuqin Zhu, Jiadong Bai, Shahram Ghandeharizadeh:
Reliability Groups with Standby Flying Light Specks. MMSys 2024: 1-11 - 2023
- [j18]Shuqin Zhu, Congxu Zhu, Hanyu Yan:
Cryptanalyzing and Improving an Image Encryption Algorithm Based on Chaotic Dual Scrambling of Pixel Position and Bit. Entropy 25(3): 400 (2023) - [j17]Shuqin Zhu, Congxu Zhu, Xiujuan Li:
An efficient chosen-plaintext attack and improvement on an image encryption algorithm based on cyclicshift and multiple chaotic map. Multim. Tools Appl. 82(15): 22835-22852 (2023) - [i1]Hamed Alimohammadzadeh, Rohit Bernard, Yang Chen, Trung Phan, Prashant Singh, Shuqin Zhu, Heather Culbertson, Shahram Ghandeharizadeh:
Dronevision: An Experimental 3D Testbed for Flying Light Specks. CoRR abs/2308.10121 (2023) - 2022
- [j16]Chenxin Qu, Xiaoping Che, Siqi Ma, Shuqin Zhu:
Bio-physiological-signals-based VR cybersickness detection. CCF Trans. Pervasive Comput. Interact. 4(3): 268-284 (2022) - [c5]Shuqin Zhu, Xiaoping Che, Chenxin Qu, Haohang Li, Siyuan Wang:
Which User Guidance Works Better in VR? A User Guidance Learning Effect Study in Virtual Environment. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1178-1183 - 2021
- [j15]Shuqin Zhu, Congxu Zhu:
Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos. Entropy 23(5): 505 (2021) - [j14]Shuqin Zhu, Congxu Zhu:
An Efficient Chosen-Plaintext Attack on an Image Fusion Encryption Algorithm Based on DNA Operation and Hyperchaos. Entropy 23(7): 804 (2021) - 2020
- [j13]Shuqin Zhu, Congxu Zhu:
Secure Image Encryption Algorithm Based on Hyperchaos and Dynamic DNA Coding. Entropy 22(7): 772 (2020) - [j12]Shuqin Zhu, Congxu Zhu, Yu Fu, Weimeng Zhang, Xiaoting Wu:
A secure image encryption scheme with compression-confusion-diffusion structure. Multim. Tools Appl. 79(43-44): 31957-31980 (2020)
2010 – 2019
- 2019
- [j11]Shuqin Zhu, Congxu Zhu, Huanqing Cui, Wenhong Wang:
A Class of Quadratic Polynomial Chaotic Maps and its Application in Cryptography. IEEE Access 7: 34141-34152 (2019) - [j10]Shuqin Zhu, Congxu Zhu:
Plaintext-Related Image Encryption Algorithm Based on Block Structure and Five-Dimensional Chaotic Map. IEEE Access 7: 147106-147118 (2019) - [j9]Shuqin Zhu, Congxu Zhu:
A new image compression-encryption scheme based on compressive sensing and cyclic shift. Multim. Tools Appl. 78(15): 20855-20875 (2019) - [c4]Shuqin Zhu, Jihua Song, Weiming Peng, Dongdong Guo, Gu Wu:
Text Readability Assessment for Chinese Second Language Teaching. CLSW 2019: 393-405 - 2018
- [j8]Shuqin Zhu, Congxu Zhu, Wenhong Wang:
A Novel Image Compression-Encryption Scheme Based on Chaos and Compression Sensing. IEEE Access 6: 67095-67107 (2018) - [j7]Shuqin Zhu, Congxu Zhu, Wenhong Wang:
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256. Entropy 20(9): 716 (2018) - [j6]Shuqin Zhu, Wenhong Wang, Junqing Li:
针对基于感知器模型的混沌图像加密算法的选择明文攻击 (Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model). 计算机科学 45(4): 178-181 (2018) - [j5]Shuqin Zhu, Congxu Zhu:
Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system. Multim. Tools Appl. 77(21): 29119-29142 (2018) - [c3]Shuqin Zhu, Jihua Song, Weiming Peng, Jingbo Sun:
Sense Group Segmentation for Chinese Second Language Reading Based on Conditional Random Fields. CLSW 2018: 559-569 - 2017
- [j4]Shuqin Zhu, Junqing Li, Guangying Ge:
基于一个新的四维离散混沌映射的图像加密新算法 (New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map). 计算机科学 44(1): 188-193 (2017) - [j3]Shuqin Zhu, Wenhong Wang, Zhonggui Sun:
对一种基于比特置乱的超混沌图像加密算法的选择明文攻击 (Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos). 计算机科学 44(11): 273-278 (2017) - [j2]Shuqin Zhu, Junqing Li:
参数扰动下的混沌的图像加密方案 (Image Encryption Scheme Based on Chaos with Parameter Perturbation). 计算机科学 44(Z6): 356-360 (2017) - 2016
- [j1]Shuqin Zhu, Junqing Li, Guangying Ge:
基于一个新的五维离散混沌的快速图像加密算法 (Fast Image Encryption Algorithm Based on Novel Five Dimensional Discrete Chaos). 计算机科学 43(Z11): 411-416 (2016) - [c2]Dongdong Guo, Shuqin Zhu, Weiming Peng, Jihua Song, Yinbing Zhang:
Construction of the Dynamic Word Structural Mode Knowledge Base for the International Chinese Teaching. CLSW 2016: 251-260 - [c1]Shuqin Zhu, Yinxia Zhang, Weiming Peng, Jihua Song:
Construction of the basic sentence-pattern instance database based on the international Chinese textbook Treebank. IALP 2016: 266-270
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint