Items where Author is "Ren, Yizhi"
Journal Article
Wang, Qiuhua and Li, Chuangchuang and Yuan, Lifeng and Wang, Dong and Wang, Yeru and Ren, Yizhi and Meng, Weizhi (2026) An XSS Attack Detection Model Based on Two-Stage AST Analysis. IEEE Transactions on Dependable and Secure Computing, 23 (2). pp. 4071-4084. ISSN 1545-5971
Wang, Qiuhua and Shen, Haojie and Li, Yijia and Hu, Yi and Ren, Yizhi and Pan, Gaoning and Cheng, Yanyu and Hu, Mingde and Meng, Weizhi (2026) WBA : Weather Backdoor Attack on Semantic Segmentation in the Internet of Things. ACM Transactions on Internet of Things. ISSN 2691-1914
Lyu, Qiuyun and Liang, Xiwen and Cheng, Shaopeng and Li, Fu and Ren, Yizhi and Xu, Chengli and Meng, Weizhi and Ma, Duohe (2025) AATM : An Anonymous Authentication Protocol for Time Span of Membership with Self-blindness and Accountability. IEEE Internet of Things Journal, 12 (14). pp. 27671-27685. ISSN 2327-4662
Wang, Ke and Yao, Ye and Shen, Yanzhao and Xiao, Fengjun and Ren, Yizhi and Meng, Weizhi (2025) High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Dynamic Prediction and Virtual Connection. IEEE Transactions on Dependable and Secure Computing, 22 (3). pp. 2996-3010. ISSN 1545-5971
Yin, Weifeng and Yuan, Lifeng and Ren, Yizhi and Meng, Weizhi and Wang, Dong and Wang, Qiuhua (2024) Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Transactions on Information Forensics and Security, 19. pp. 6665-6678.
Yao, Ye and Wang, Chen and Wang, Hui and Wang, Ke and Ren, Yizhi and Meng, Weizhi (2024) Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style Transfer. IEEE Transactions on Information Forensics and Security, 19. pp. 4406-4419.
Up a level