


default search action
Qianxue Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Shufeng Huang
, Qianxue Wang
, Xiaoming Xiong
, Shuting Cai
, Christophe Guyeux
:
Designing higher-dimensional digital chaotic systems via reverse derivation of iterative function from strongly connected graph and its application. Expert Syst. Appl. 255: 124638 (2024) - [j14]Minzhi Xie
, Qianxue Wang
, Simin Yu
:
Time Series Prediction of ESN Based on Chebyshev Mapping and Strongly Connected Topology. Neural Process. Lett. 56(1): 30 (2024) - 2023
- [j13]Qinmao Jiang
, Simin Yu
, Qianxue Wang
:
Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map. Entropy 25(3): 395 (2023) - [j12]Xin Chen
, Qianxue Wang
, Linfeng Fan, Simin Yu
:
A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection. Entropy 25(3): 476 (2023) - [j11]Xin Chen, Simin Yu, Qianxue Wang
, Christophe Guyeux, Mengjie Wang:
On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding. Multim. Tools Appl. 82(27): 42717-42737 (2023) - 2022
- [j10]Guanwen Shi
, Simin Yu
, Qianxue Wang
:
Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map. Entropy 24(8): 1023 (2022) - 2021
- [j9]Zirui Zhang
, Ping Chen, Weijun Li
, Xiaoming Xiong, Qianxue Wang
, Heping Wen
, Songbin Liu, Shuting Cai
:
Design and ARM-Based Implementation of Bitstream-Oriented Chaotic Encryption Scheme for H.264/AVC Video. Entropy 23(11): 1431 (2021) - [j8]Qianxue Wang
, Simin Yu
, Christophe Guyeux
, Wei Wang:
Constructing Higher-Dimensional Digital Chaotic Systems via Loop-State Contraction Algorithm. IEEE Trans. Circuits Syst. I Regul. Pap. 68(9): 3794-3807 (2021)
2010 – 2019
- 2019
- [j7]Zhuosheng Lin, Christophe Guyeux
, Simin Yu, Qianxue Wang, Shuting Cai:
On the use of chaotic iterations to design keyed hash function. Clust. Comput. 22(Suppl 1): 905-919 (2019) - 2017
- [c5]Zhuosheng Lin, Christophe Guyeux
, Simin Yu, Qianxue Wang
:
Design and Evaluation of Chaotic Iterations Based Keyed Hash Function. ICISA 2017: 404-414 - [i15]Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang:
Design and evaluation of chaotic iterations based keyed hash function. CoRR abs/1706.08101 (2017) - [i14]Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers. CoRR abs/1706.08923 (2017) - [i13]Zhuosheng Lin, Christophe Guyeux, Qianxue Wang, Simin Yu:
Diffusion and confusion of chaotic iteration based hash functions. CoRR abs/1708.02793 (2017) - [i12]Christophe Guyeux, Qianxue Wang, Xiaole Fang, Jacques M. Bahi:
Introducing the truly chaotic finite state machines and their applications in security field. CoRR abs/1708.04963 (2017) - 2016
- [j6]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout
, Christophe Guyeux
:
Proving Chaotic Behavior of CBC Mode of Operation. Int. J. Bifurc. Chaos 26(7): 1650113:1-1650113:10 (2016) - [j5]Zhuosheng Lin, Simin Yu, Chengqing Li
, Jinhu Lü
, Qianxue Wang
:
Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission. Int. J. Bifurc. Chaos 26(9): 1650158:1-1650158:8 (2016) - [j4]Qianxue Wang
, Simin Yu, Chengqing Li
, Jinhu Lu
, Xiaole Fang, Christophe Guyeux
, Jacques M. Bahi:
Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 63-I(3): 401-412 (2016) - [c4]Abdessalem Abidi, Qianxue Wang
, Belgacem Bouallegue, Mohsen Machhout
, Christophe Guyeux
:
Quantitative evaluation of chaotic CBC mode of operation. ATSIP 2016: 88-92 - [c3]Zhuosheng Lin, Christophe Guyeux, Qianxue Wang, Simin Yu:
Diffusion and Confusion of Chaotic Iteration Based Hash Functions. CSE/EUC/DCABES 2016: 444-447 - [i11]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Quantitative Evaluation of Chaotic CBC Mode of Operation. CoRR abs/1601.08139 (2016) - [i10]Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux:
Proving chaotic behaviour of CBC mode of operation. CoRR abs/1608.05838 (2016) - [i9]Qianxue Wang, Simin Yu, Christophe Guyeux, Jacques M. Bahi, Xiaole Fang:
Theoretical design and circuit implementation of integer domain chaotic systems. CoRR abs/1608.05945 (2016) - [i8]Xiaole Fang, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Randomness and disorder of chaotic iterations. Applications in information security field. CoRR abs/1611.08422 (2016) - 2014
- [j3]Qianxue Wang
, Simin Yu
, Christophe Guyeux
, Jacques M. Bahi, Xiaole Fang:
Theoretical Design and Circuit Implementation of Integer Domain Chaotic Systems. Int. J. Bifurc. Chaos 24(10) (2014) - [j2]Xiaole Fang
, Qianxue Wang
, Christophe Guyeux
, Jacques M. Bahi:
FPGA acceleration of a pseudorandom number generator based on chaotic iterations. J. Inf. Secur. Appl. 19(1): 78-87 (2014) - [j1]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux
, Qianxue Wang
:
Suitability of chaotic iterations schemes using XORshift for security applications. J. Netw. Comput. Appl. 37: 282-292 (2014) - [c2]Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Pseudorandom Number Generators with Balanced Gray Codes. SECRYPT 2014: 469-475 - 2011
- [i7]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:
Randomness Quality of CI Chaotic Generators: Applications to Internet Security. CoRR abs/1112.0941 (2011) - [i6]Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Qianxue Wang:
Class of Trustworthy Pseudo-Random Number Generators. CoRR abs/1112.0950 (2011) - [i5]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:
On the design of a family of CI pseudo-random number generators. CoRR abs/1112.0958 (2011) - [i4]Jacques M. Bahi, Xiaole Fang, Christophe Guyeux, Qianxue Wang:
Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding. CoRR abs/1112.1201 (2011) - 2010
- [c1]Christophe Guyeux
, Qianxue Wang, Jacques M. Bahi:
A Pseudo Random Numbers Generator Based on Chaotic Iterations: Application to Watermarking. WISM 2010: 202-211 - [i3]Qianxue Wang, Christophe Guyeux, Jacques M. Bahi:
A novel pseudo-random number generator based on discrete chaotic iterations. CoRR abs/1004.2374 (2010) - [i2]Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Improving random number generators by chaotic iterations. Application in data hiding. CoRR abs/1012.4620 (2010) - [i1]Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application to Watermarking. CoRR abs/1012.4626 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint