default search action
Yun Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j36]Xuyu Xiang, Yang Tan, Jiaohua Qin, Yun Tan:
Advancements and challenges in coverless image steganography: A survey. Signal Process. 228: 109761 (2025) - [j35]Jianting Peng, Xuyu Xiang, Jiaohua Qin, Yun Tan:
Dual-branch networks for privacy-preserving cross-modal retrieval in cloud computing. J. Supercomput. 81(1): 127 (2025) - 2024
- [j34]Yu Ren, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Reversible data hiding in encrypted images based on secret sharing and hierarchical embedding. Comput. Electr. Eng. 119: 109567 (2024) - [j33]Youyuan Xue, Yun Tan, Ling Tan, Jiaohua Qin, Xuyu Xiang:
Generating radiology reports via auxiliary signal guidance and a memory-driven network. Expert Syst. Appl. 237(Part B): 121260 (2024) - [j32]Yun Tan, Chunzhi Li, Jiaohua Qin, Youyuan Xue, Xuyu Xiang:
Medical Image Description Based on Multimodal Auxiliary Signals and Transformer. Int. J. Intell. Syst. 2024: 1-12 (2024) - [j31]Yang Tan, Xuyu Xiang, Jiaohua Qin, Yun Tan:
Robust coverless image steganography based on human pose estimation. Knowl. Based Syst. 296: 111873 (2024) - [j30]Bowen Zhang, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Learning continuation: Integrating past knowledge for contrastive distillation. Knowl. Based Syst. 304: 112573 (2024) - 2023
- [j29]Yun Tan, Dafang Zhao, Mehmet Zeki Sarikaya:
Hermite-Hadamard-type Inequalities for $\hbar$-preinvex Interval-Valued Functions via Fractional Integral. Int. J. Comput. Intell. Syst. 16(1): 120 (2023) - [j28]Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Privacy-Preserving Image Retrieval Based on Disordered Local Histograms and Vision Transformer in Cloud Computing. Int. J. Intell. Syst. 2023: 1-16 (2023) - [j27]Wentao Ma, Tongqing Zhou, Jiaohua Qin, Xuyu Xiang, Yun Tan, Zhiping Cai:
Adaptive multi-feature fusion via cross-entropy normalization for effective image retrieval. Inf. Process. Manag. 60(1): 103119 (2023) - [j26]Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan, Jia Peng:
A privacy-preserving cross-media retrieval on encrypted data in cloud computing. J. Inf. Secur. Appl. 73: 103440 (2023) - [j25]Nan Li, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Robust coverless video steganography based on inter-frame keypoint matching. J. Inf. Secur. Appl. 79: 103653 (2023) - [j24]Tao Hu, Xuyu Xiang, Jiaohua Qin, Yun Tan:
Audio-text retrieval based on contrastive learning and collaborative attention mechanism. Multim. Syst. 29(6): 3625-3638 (2023) - 2022
- [j23]Wentao Ma, Tongqing Zhou, Jiaohua Qin, Xuyu Xiang, Yun Tan, Zhiping Cai:
A privacy-preserving content-based image retrieval method based on deep learning in cloud computing. Expert Syst. Appl. 203: 117508 (2022) - [j22]Qingyang Zhou, Jiaohua Qin, Xuyu Xiang, Yun Tan, Yu Ren:
MOLS-Net: Multi-organ and lesion segmentation network based on sequence feature pyramid and attention mechanism for aortic dissection diagnosis. Knowl. Based Syst. 239: 107853 (2022) - [j21]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
A Robust Coverless Steganography Scheme Using Camouflage Image. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4038-4051 (2022) - 2021
- [j20]Jiaohua Qin, Zhuo Zhou, Yun Tan, Xuyu Xiang, Zhibin He:
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF. Int. J. Digit. Crime Forensics 13(4): 40-56 (2021) - [j19]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. KSII Trans. Internet Inf. Syst. 15(3): 1078-1099 (2021) - [j18]Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan:
A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing. Multim. Syst. 27(3): 403-415 (2021) - [j17]Yun Tan, Jiaohua Qin, Xuyu Xiang, Chunhu Zhang, Zhangdong Wang:
Coverless Steganography Based on Motion Analysis of Video. Secur. Commun. Networks 2021: 5554058:1-5554058:16 (2021) - [j16]Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan:
Coverless Image Steganography Based on Multi-Object Recognition. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2779-2791 (2021) - 2020
- [j15]Jiaohua Qin, Wenyan Pan, Xuyu Xiang, Yun Tan, Guimin Hou:
A biological image classification method based on improved CNN. Ecol. Informatics 58: 101093 (2020) - [j14]Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang, Guimin Hou:
A video coverless information hiding algorithm based on semantic segmentation. EURASIP J. Image Video Process. 2020(1): 23 (2020) - [j13]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Yao Qiu:
Coverless image steganography based on DenseNet feature mapping. EURASIP J. Image Video Process. 2020(1): 39 (2020) - [j12]Jianhua Chen, Jiaohua Qin, Xuyu Xiang, Yun Tan:
A new encrypted image retrieval method based on feature fusion in cloud computing. Int. J. Comput. Sci. Eng. 22(1): 114-123 (2020) - [j11]Yun Tan, Jiaohua Qin, Xuyu Xiang, Wentao Ma:
A sparse system identification algorithm based on fractional order LMS. Int. J. Embed. Syst. 13(3): 255-263 (2020) - [j10]Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan, Qiang Liu, Lingyun Xiang:
Coverless real-time image information hiding based on image block matching and dense convolutional network. J. Real Time Image Process. 17(1): 125-135 (2020) - [j9]Jiaohua Qin, Jianhua Chen, Xuyu Xiang, Yun Tan, Wentao Ma, Jing Wang:
A privacy-preserving image retrieval method based on deep learning and adaptive weighted fusion. J. Real Time Image Process. 17(1): 161-173 (2020) - [j8]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Junshan Tan, Yuanjing Luo:
Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. Knowl. Based Syst. 192: 105375 (2020)
2010 – 2019
- 2019
- [j7]Jiaohua Qin, Hao Li, Xuyu Xiang, Yun Tan, Wenyan Pan, Wentao Ma, Neal N. Xiong:
An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing. IEEE Access 7: 24626-24633 (2019) - [j6]Yun Tan, Jiaohua Qin, Xuyu Xiang, Wentao Ma, Wenyan Pan, Neal N. Xiong:
A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding. IEEE Access 7: 25026-25036 (2019) - [j5]Wenyan Pan, Jiaohua Qin, Xuyu Xiang, Yan Wu, Yun Tan, Lingyun Xiang:
A Smart Mobile Diagnosis System for Citrus Diseases Based on Densely Connected Convolutional Networks. IEEE Access 7: 87534-87542 (2019) - [j4]Jiaohua Qin, Yuanjing Luo, Xuyu Xiang, Yun Tan, Huajun Huang:
Coverless Image Steganography: A Survey. IEEE Access 7: 171372-171394 (2019) - [j3]Yun Tan, Lulu Jiang, Kankan Wang, Hai Fang:
I3: A Self-organising Learning Workflow for Intuitive Integrative Interpretation of Complex Genetic Data. Genom. Proteom. Bioinform. 17(5): 503-510 (2019) - 2018
- [c3]Yun Tan, Jiaohua Qin, Ling Tan, Hao Tang, Xuyu Xiang:
A Survey on the New Development of Medical Image Security Algorithms. ICCCS (3) 2018: 458-467 - 2015
- [j2]Yun Tan, Zhiqiang He, Baoyu Tian:
A Novel Generalization of Modified LMS Algorithm to Fractional Order. IEEE Signal Process. Lett. 22(9): 1244-1248 (2015) - [c2]Yun Tan, Shuhua Zhu:
Efficient Name Lookup Scheme Based on Hash and Character Trie in Named Data Networking. IEEE WISA 2015: 130-135 - [c1]Yun Tan, Xingsong Hou, Xueming Qian:
A fine-grain nonlocal weighted average method for image CS reconstruction. ICIMCS 2015: 70:1-70:4
2000 – 2009
- 2007
- [j1]Xiaoping Qiu, Ning Tao, Yun Tan, Xinxing Wu:
Constructing of the risk classification model of cervical cancer by artificial neural network. Expert Syst. Appl. 32(4): 1094-1099 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint