Showing 1 - 6 results of 6 for search 'Changgen PENG', query time: 0.01s
Refine Results
-
1
An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method by Zhen Li, Changgen Peng, Weijie Tan, Liangrong Li
Published 2021-01-01
Article -
2
Privacy risk adaptive access control model via evolutionary game by Hongfa DING, Changgen PENG, Youliang TIAN, Shuwen XIANG
Published 2019-12-01
Article -
3
PCA-based membership inference attack for machine learning models by Changgen PENG, Ting GAO, Huilan LIU, Hongfa DING
Published 2022-01-01
Article -
4
Efficient signcryption scheme based on Cocks’ identity cryptosystem by Changgen PENG, Xiaoyu ZHANG, Hongfa DING, Shanhui YANG
Published 2020-12-01
Article -
5
Attribute-based revocable collaborative access control scheme by Changgen PENG, Zongfeng PENG, Hongfa DING, Youliang TIAN, Rongfei LIU
Published 2021-05-01
Article -
6
Secure and verifiable multi-keyword searchable encryption scheme in cloud by Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG
Published 2021-04-01
Article