An asymmetric and optimized encryption method to protect the confidentiality of 3D mesh model
暂无分享,去创建一个
Fazhi He | Haoran Li | Yaqian Liang | Fazhi He | Haoran Li | Yaqian Liang
[1] Yiteng Pan,et al. A novel region-based active contour model via local patch similarity measure for image segmentation , 2018, Multimedia Tools and Applications.
[2] Yuan Cheng,et al. Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems , 2019, Future Gener. Comput. Syst..
[3] G. Lokeshwari,et al. A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa Algorithm , 2015 .
[4] Xin Jin,et al. 3D Point Cloud Encryption Through Chaotic Mapping , 2016, PCM.
[5] Michele Germani,et al. A design for disassembly tool oriented to mechatronic product de-manufacturing and recycling , 2019, Adv. Eng. Informatics.
[6] Fazhi He,et al. A survey on partitioning models, solution algorithms and algorithm parallelization for hardware/software co-design , 2019, Des. Autom. Embed. Syst..
[7] Haibin Zhu,et al. Maximizing Group Performance While Minimizing Budget , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[8] Fazhi He,et al. Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment , 2015 .
[9] Xia Li,et al. A new hybrid memetic multi-objective optimization algorithm for multi-objective optimization , 2018, Inf. Sci..
[10] Angelo Corallo,et al. Cybersecurity for Industry 4.0 in the current literature: A reference framework , 2018, Comput. Ind..
[11] Fei Peng,et al. Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting , 2014, Comput. Aided Des..
[12] Yi Zhou,et al. Parallel ant colony optimization on multi-core SIMD CPUs , 2018, Future Gener. Comput. Syst..
[13] Fazhi He,et al. IBEA-SVM: An Indicator-based Evolutionary Algorithm Based on Pre-selection with Classification Guided by SVM , 2019, Applied Mathematics-A Journal of Chinese Universities.
[14] A. Ben Hamza,et al. Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..
[15] Jun Peng,et al. A Novel Digital Image Encryption Algorithm Based on Hyperchaos by Controlling Lorenz System , 2009, 2009 Fifth International Conference on Natural Computation.
[16] Zhiliang Ma,et al. A review of 3D reconstruction techniques in civil engineering and their applications , 2018, Adv. Eng. Informatics.
[17] Chih-Hsing Chu,et al. 3D parametric human face modeling for personalized product design: Eyeglasses frame design case , 2017, Adv. Eng. Informatics.
[18] Suk-Hwan Lee,et al. Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain , 2017 .
[19] Ventola Cl. Medical Applications for 3D Printing: Current and Projected Uses. , 2014 .
[20] Manolis I. A. Lourakis,et al. Automated as-built 3D reconstruction of civil infrastructure using computer vision: Achievements, opportunities, and challenges , 2015, Adv. Eng. Informatics.
[21] Christine Guillemot,et al. 3D Scene Modeling from Dense Video Light Fields , 2018, 2018 International Conference on 3D Immersion (IC3D).
[22] Yang Liu,et al. Secure and robust digital image watermarking scheme using logistic and RSA encryption , 2018, Expert Syst. Appl..
[23] Yong Zhang,et al. The unified image encryption algorithm based on chaos and cubic S-Box , 2018, Inf. Sci..
[24] Milan Curkovic,et al. 3D shape acquisition and integral compact representation using optical scanning and enhanced shape parameterization , 2014, Adv. Eng. Informatics.
[25] Mikhail J. Atallah,et al. Security in Cyber-Enabled Design and Manufacturing: A Survey , 2018, J. Comput. Inf. Sci. Eng..
[26] Kang Li,et al. Robust Visual Tracking Based on Convolutional Features with Illumination and Occlusion Handing , 2018, Journal of Computer Science and Technology.
[27] Haibin Zhu,et al. Avoiding Critical Members in a Team by Redundant Assignment , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[28] Yiteng Pan,et al. A novel segmentation model for medical images with intensity inhomogeneity based on adaptive perturbation , 2018, Multimedia Tools and Applications.
[29] Mikhail J. Atallah,et al. Strategic information revelation in collaborative design , 2018, Adv. Eng. Informatics.
[30] Richard H. Stern. Napster: A Walking Copyright Infringement? , 2000, IEEE Micro.
[31] Li Wang,et al. Rapid Reconstruction of a Three-Dimensional Mesh Model Based on Oblique Images in the Internet of Things , 2018, IEEE Access.
[32] Jian Yao,et al. Joint learning of image detail and transmission map for single image dehazing , 2018, The Visual Computer.
[33] Ming Li,et al. An ontology-based semantic retrieval approach for heterogeneous 3D CAD models , 2016, Adv. Eng. Informatics.
[34] Harvey J. Miller,et al. Big data for healthy cities: Using location-aware technologies, open data and 3D urban models to design healthier built environments , 2016 .
[35] Shilong Ma,et al. Remote-sensing image encryption in hybrid domains , 2012 .
[36] M.E.E. Abashar,et al. On the chaotic behaviour of forced fluidized bed catalytic reactors , 1995 .
[37] Xiao Chen,et al. A matting method based on full feature coverage , 2018, Multimedia Tools and Applications.
[38] Seung Ki Moon,et al. Application of 3D printing technology for designing light-weight unmanned aerial vehicle wing structures , 2014, International Journal of Precision Engineering and Manufacturing-Green Technology.
[39] Constantinos S. Hilas,et al. 3D geospatial visualizations: Animation and motion effects on spatial objects , 2018, Comput. Geosci..
[40] Yiteng Pan,et al. A novel Enhanced Collaborative Autoencoder with knowledge distillation for top-N recommender systems , 2019, Neurocomputing.
[41] X.T. Cai,et al. An encryption approach for product assembly models , 2017, Adv. Eng. Informatics.
[42] Yuan Cheng,et al. An optimized RGA supporting selective undo for collaborative text editing systems , 2019, J. Parallel Distributed Comput..
[43] Marc Eluard,et al. Geometry-preserving Encryption for 3D Meshes , 2013 .
[44] Xin Lu,et al. Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development , 2017 .
[45] Fazhi He,et al. A Novel Hardware/Software Partitioning Method Based on Position Disturbed Particle Swarm Optimization with Invasive Weed Optimization , 2017, Journal of Computer Science and Technology.
[46] Yanru Zhong,et al. Selecting a semantic similarity measure for concepts in two different CAD model data ontologies , 2016, Adv. Eng. Informatics.
[47] Baochang Zhang,et al. A 3D Reconstruction System for Large Scene Based on RGB-D Image , 2018, IScIDE.
[48] JungHyun Han,et al. Role-based viewing envelopes for information protection in collaborative modeling , 2004, Comput. Aided Des..
[49] Hamid Bessalah,et al. RSA based encryption decryption of medical images , 2010, 2010 7th International Multi- Conference on Systems, Signals and Devices.
[50] Hyunseung Choo,et al. Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.
[51] Hirokazu Kato,et al. Augmented Reality versus Virtual Reality for 3D Object Manipulation , 2018, IEEE Transactions on Visualization and Computer Graphics.
[52] Soonhung Han,et al. An efficient approach to directly compute the exact Hausdorff distance for 3D point sets , 2017, Integr. Comput. Aided Eng..
[53] Qing Zhang,et al. Video Background Completion Using Motion-Guided Pixel Assignment Optimization , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[54] Yuan Cheng,et al. Supporting selective undo of string-wise operations for collaborative editing systems , 2018, Future Gener. Comput. Syst..
[55] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[56] Ali Khaloo,et al. Robust normal estimation and region growing segmentation of infrastructure 3D point cloud models , 2017, Adv. Eng. Informatics.
[57] Fazhi He,et al. A correlative classifiers approach based on particle filter and sample set for tracking occluded target , 2017 .
[58] Wen Feng Lu,et al. A 3D simplification algorithm for distributed visualization , 2007, Comput. Ind..
[59] Dazhong Wu,et al. Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation , 2015, Comput. Aided Des..
[60] Fazhi He,et al. An efficient and robust bat algorithm with fusion of opposition-based learning and whale optimization algorithm , 2020, Intell. Data Anal..
[61] Lukumon O. Oyedele,et al. Big Data in the construction industry: A review of present status, opportunities, and future trends , 2016, Adv. Eng. Informatics.
[62] Fazhi He,et al. Service-Oriented Feature-Based Data Exchange for Cloud-Based Design and Manufacturing , 2018, IEEE Transactions on Services Computing.
[63] Abdellah Ezzati,et al. Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing , 2019, J. Ambient Intell. Humaniz. Comput..
[64] Xiao Chen,et al. A parallel and robust object tracking approach synthesizing adaptive Bayesian learning and improved incremental subspace learning , 2019, Frontiers of Computer Science.