default search action
Heping Wen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Heping Wen, Yiting Lin:
Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 237(Part B): 121514 (2024) - [j15]Heping Wen, Yiting Lin, Lincheng Yang, Ruiting Chen:
Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Expert Syst. Appl. 250: 123748 (2024) - [j14]Yiting Lin, Zhiyu Xie, Tingting Chen, Xiyuan Cheng, Heping Wen:
Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl. 257: 124891 (2024) - [j13]Ugur Erkan, Abdurrahim Toktas, Samet Memis, Feyza Toktas, Qiang Lai, Heping Wen, Suo Gao:
OSMRD-IE: Octal-Based Shuffling and Multilayer Rotational Diffusing Image Encryption Using 2-D Hybrid Michalewicz-Ackley Map. IEEE Internet Things J. 11(21): 35113-35123 (2024) - [j12]Heping Wen, Zhiyu Xie, Zhuxi Wu, Yiting Lin, Wei Feng:
Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101871 (2024) - [j11]Heping Wen, Ruiting Chen, Jieyi Yang, Tianle Zheng, Jiahao Wu, Wenxing Lin, Huilin Jian, Yiting Lin, Linchao Ma, Zhen Liu, Chongfu Zhang:
Security analysis of a color image encryption based on bit-level and chaotic map. Multim. Tools Appl. 83(2): 4133-4149 (2024) - 2023
- [j10]Heping Wen, Yiting Lin:
Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud Univ. Comput. Inf. Sci. 35(7): 101612 (2023) - [j9]Heping Wen, Yiming Huang, Yiting Lin:
High-quality color image compression-encryption using chaos and block permutation. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101660 (2023) - 2022
- [j8]Heping Wen, Zefeng Chen, Jiehong Zheng, Yiming Huang, Shuwei Li, Linchao Ma, Yiting Lin, Zhen Liu, Rui Li, Linhao Liu, Wenxing Lin, Jieyi Yang, Chongfu Zhang, Huaide Yang:
Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM. Entropy 24(10): 1332 (2022) - 2021
- [j7]Mengwei Cui, Chongfu Zhang, Yuhang Chen, Zhi Zhang, Tingwei Wu, Heping Wen:
Multilayer Dynamic Encryption for Security OFDM-PON Using DNA-Reconstructed Chaotic Sequences Under Cryptanalysis. IEEE Access 9: 18052-18060 (2021) - [j6]Heping Wen, Chongfu Zhang, Ping Chen, Ruiting Chen, Jiajun Xu, Yunlong Liao, Zhonghao Liang, Danze Shen, LiMengNan Zhou, Juxin Ke:
A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication. IEEE Access 9: 20481-20492 (2021) - [j5]Heping Wen, Chongfu Zhang, Lan Huang, Juxin Ke, Dongqing Xiong:
Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos. Entropy 23(2): 258 (2021) - [j4]Heping Wen, Jiajun Xu, Yunlong Liao, Ruiting Chen, Danze Shen, Lifei Wen, Yulin Shi, Qin Lin, Zhonghao Liang, Sihang Zhang, Yuxuan Liu, Ailin Huo, Tong Li, Chang Cai, Jiaqian Wen, Chongfu Zhang:
A Security-Enhanced Image Communication Scheme Using Cellular Neural Network. Entropy 23(8): 1000 (2021) - [j3]Zirui Zhang, Ping Chen, Weijun Li, Xiaoming Xiong, Qianxue Wang, Heping Wen, Songbin Liu, Shuting Cai:
Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy 23(11): 1431 (2021) - 2020
- [j2]Tingwei Wu, Chongfu Zhang, Huan Huang, Zhi Zhang, Hanhan Wei, Heping Wen, Kun Qiu:
Security Improvement for OFDM-PON via DNA Extension Code and Chaotic Systems. IEEE Access 8: 75119-75126 (2020)
2010 – 2019
- 2019
- [j1]Heping Wen, Simin Yu, Jinhu Lü:
Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos. Entropy 21(3): 246 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint