


default search action
Nanrun Zhou
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j53]Zheyi Zhang
, Yinghong Cao, Nanrun Zhou, Xianying Xu, Jun Mou
:
Novel discrete initial-boosted Tabu learning neuron: dynamical analysis, DSP implementation, and batch medical image encryption. Appl. Intell. 55(1): 61 (2025) - [j52]Jun Mou
, Zheyi Zhang
, Nanrun Zhou
, Yushu Zhang
, Yinghong Cao
:
Mosaic Tracking: Lightweight Batch Video Frame Awareness Multitarget Encryption Scheme Based on a Novel Discrete Tabu Learning Neuron and YoloV5. IEEE Internet Things J. 12(4): 4038-4049 (2025) - [j51]Hong Zhang, Mohamed Meyer Kana Kone, Xiao-Qian Ma, Nan-Run Zhou:
Frequency-domain attention-guided adaptive robust watermarking model. J. Frankl. Inst. 362(3): 107511 (2025) - 2024
- [j50]Nan-Run Zhou
, Long-Long Hu
, Zhi-Wen Huang, Meng-Meng Wang
, Guangsheng Luo
:
Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm. Expert Syst. Appl. 238(Part C): 122052 (2024) - [j49]Chen Gong, Nanrun Zhou, Shuhua Xia, Shuiyuan Huang:
Quantum particle swarm optimization algorithm based on diversity migration strategy. Future Gener. Comput. Syst. 157: 445-458 (2024) - [j48]Zheyi Zhang
, Nanrun Zhou, Bo Sun
, Santo Banerjee
, Jun Mou:
Multimedia healthcare cloud personal archives security system based on compressed sensing and multi-image encryption. J. Frankl. Inst. 361(8): 106844 (2024) - [j47]Jie-Long Hu, Ming-Xuan Chen, Shun Zhou, Nan-Run Zhou
:
Optical image authentication and encryption scheme with computational ghost imaging. J. Frankl. Inst. 361(17): 107203 (2024) - [j46]Nanrun Zhou, Jibin Deng
, Meng Pang
:
Recovering a clean background: A parallel deep network architecture for single-image deraining. Pattern Recognit. Lett. 178: 153-159 (2024) - [j45]Jun Mou
, Hongli Cao
, Nanrun Zhou
, Yinghong Cao
:
An FHN-HR Neuron Network Coupled With a Novel Locally Active Memristor and Its DSP Implementation. IEEE Trans. Cybern. 54(12): 7333-7342 (2024) - [j44]Yuping Lai
, Yiying Yu
, Wenbo Guan
, Lijuan Luo
, Jing Fan, Nanrun Zhou, Yuan Ping
:
A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference. IEEE Trans. Netw. Serv. Manag. 21(4): 4701-4712 (2024) - [c5]Meng Pang, Binghui Wang, Nanrun Zhou, Yintao Zhou, Wei Huang:
Reconstructing Prototype From Contaminated Face With Variations Across Heterogeneous Domains. ICME 2024: 1-6 - 2023
- [j43]Yan Ma, Nan-Run Zhou
:
Quantum color image compression and encryption algorithm based on Fibonacci transform. Quantum Inf. Process. 22(1): 39 (2023) - [j42]Jing-Yi Dai, Nan-Run Zhou:
Optimal quantum image encryption algorithm with the QPSO-BP neural network-based pseudo random number generator. Quantum Inf. Process. 22(8): 318 (2023) - [j41]Nan-Run Zhou
, Liang-Jia Tong, Wei Ping Zou:
Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation. Signal Process. 211: 109107 (2023) - [j40]Nan-Run Zhou
, Tian-Feng Zhang, Xin-Wen Xie
, Jun-Yun Wu:
Hybrid quantum-classical generative adversarial networks for image generation via learning discrete distribution. Signal Process. Image Commun. 110: 116891 (2023) - 2022
- [j39]Meng-Meng Wang, Nan-Run Zhou, Lu Li, Mantao Xu:
A novel image encryption scheme based on chaotic apertured fractional Mellin transform and its filter bank. Expert Syst. Appl. 207: 118067 (2022) - [j38]Nan-Run Zhou, Shuhua Xia, Yan Ma, Ye Zhang:
Quantum particle swarm optimization algorithm with the truncated mean stabilization strategy. Quantum Inf. Process. 21(2): 42 (2022) - 2021
- [j37]Dayong Yang
, Mo Zhang, Biao Wan, Nanrun Zhou:
Secrecy rate optimization for SWIPT in two-way relay networks with multiple untrusted relays and channel estimation errors. IET Commun. 15(20): 2564-2574 (2021) - [j36]Li-Hua Gong, Cheng Tian, Wei Ping Zou, Nan-Run Zhou
:
Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multim. Tools Appl. 80(1): 439-461 (2021) - [j35]Nan-Run Zhou, Qiang-Da Xu, Nisuo Du, Li-Hua Gong:
Semi-quantum private comparison protocol of size relation with d-dimensional Bell states. Quantum Inf. Process. 20(3): 124 (2021) - [j34]Jing-Yi Dai, Yan Ma, Nan-Run Zhou:
Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map. Quantum Inf. Process. 20(7): 1-24 (2021) - [j33]Li-Hua Gong, Jin Du, Jing Wan, Nan-Run Zhou
:
Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation. Secur. Commun. Networks 2021: 6627005:1-6627005:16 (2021) - [j32]Liang-Jia Tong, Nan-Run Zhou
, Zhi-Jing Huang, Xin-Wen Xie
, Ya-Ru Liang:
Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences. Secur. Commun. Networks 2021: 6650515:1-6650515:18 (2021) - 2020
- [j31]Nanrun Zhou, Biao Wan, Lihua Gong:
Secrecy rate maximisation for non-linear energy harvesting relay networks with cooperative jamming and imperfect channel state information. IET Commun. 14(6): 923-929 (2020) - [j30]Lihua Gong, Rouqing Wu, Nanrun Zhou
:
A New 4D Chaotic System with Coexisting Hidden Chaotic Attractors. Int. J. Bifurc. Chaos 30(10): 2050142:1-2050142:14 (2020) - [j29]An Wei Luo, Li-Hua Gong, Nan-Run Zhou
, Wei Ping Zou:
Adaptive and blind watermarking scheme based on optimal SVD blocks selection. Multim. Tools Appl. 79(1-2): 243-261 (2020) - [j28]Nan-Run Zhou
, Lang-Xin Huang, Li-Hua Gong, Qing-Wei Zeng:
Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map. Quantum Inf. Process. 19(9): 284 (2020) - [j27]Huo-Sheng Ye, Nan-Run Zhou
, Li-Hua Gong:
Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process. 175: 107652 (2020)
2010 – 2019
- 2019
- [j26]Nan Run Zhou, An Wei Luo, Wei Ping Zou:
Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multim. Tools Appl. 78(2): 2507-2523 (2019) - [j25]Nan-Run Zhou, Kong-Ni Zhu, Wei Bi, Lihua Gong:
Semi-quantum identification. Quantum Inf. Process. 18(6): 197 (2019) - [j24]Xingyu Yan, Nan-Run Zhou, Lihua Gong, Yun-Qian Wang, Xiao-Jun Wen:
High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform. Quantum Inf. Process. 18(9): 271 (2019) - [j23]Xinwen Xie, Philippe Carré, Clency Perrine, Yannis Pousset, Nanrun Zhou, Jianhua Wu:
Reduced-reference image quality metric based on statistic model in complex wavelet transform domain. Signal Process. Image Commun. 74: 218-230 (2019) - 2018
- [j22]Lihua Gong, Xiaoxiu Ding, Qibiao Zhu
, Nanrun Zhou
:
Cooperative Interference and Power Allocation in a Bidirectional Untrusted Relay Network With Channel Estimation Errors. IEEE Access 6: 50950-50958 (2018) - [j21]Nan Run Zhou, Wei Ming Xia Hou, Ru Hong Wen, Wei Ping Zou:
Imperceptible digital watermarking scheme in multiple transform domains. Multim. Tools Appl. 77(23): 30251-30267 (2018) - [j20]Nanrun Zhou, Weiwei Chen, Xinyu Yan, Yunqian Wang:
Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quantum Inf. Process. 17(6): 137 (2018) - [j19]Nanrun Zhou, Xingyu Yan, Hao-Ran Liang, Xiang-Yang Tao, Guangyong Li
:
Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf. Process. 17(12): 338 (2018) - [c4]Xinwen Xie, Philippe Carré, Clency Perrine, Yannis Pousset, Jianhua Wu, Nanrun Zhou:
A Global Decoding Strategy with a Reduced-Reference Metric Designed for the Wireless Transmission of JPWL. ACIVS 2018: 496-505 - 2017
- [j18]Shu Min Pan, Ru Hong Wen, Zhihong Zhou, Nan Run Zhou:
Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multim. Tools Appl. 76(2): 2933-2953 (2017) - [j17]Nan-Run Zhou, Jianfu Li, Zhen-Bo Yu, Lihua Gong, Ahmed Farouk
:
New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states. Quantum Inf. Process. 16(1): 4 (2017) - [j16]Nanrun Zhou, Yiqun Hu, Lihua Gong, Guangyong Li
:
Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations. Quantum Inf. Process. 16(6): 164 (2017) - [j15]Mohamed Elhoseny
, Ahmed Farouk
, Nanrun Zhou, Mingming Wang, Soliman Abdalla, Josep Batle
:
Dynamic Multi-hop Clustering in a Wireless Sensor Network: Performance Improvement. Wirel. Pers. Commun. 95(4): 3733-3753 (2017) - 2016
- [j14]Yaru Liang, Guoping Liu, Nanrun Zhou, Jianhua Wu:
Color image encryption combining a reality-preserving fractional DCT with chaotic mapping in HSI space. Multim. Tools Appl. 75(11): 6605-6620 (2016) - [j13]Hao-Ran Liang, Xiang-Yang Tao, Nan-Run Zhou:
Quantum image encryption based on generalized affine transform and logistic map. Quantum Inf. Process. 15(7): 2701-2724 (2016) - [j12]Nan Run Zhou, Xiao Rong Liang, Zhihong Zhou, Ahmed Farouk
:
Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise. Secur. Commun. Networks 9(11): 1398-1404 (2016) - [j11]Nan Run Zhou, Xiao Rong Liang, Zhi Juan Kang, Lihua Gong, Zhi Xue:
Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System. Wirel. Pers. Commun. 90(4): 1635-1645 (2016) - 2015
- [j10]Qibiao Zhu
, Tao Jiang, Daiming Qu, Da Chen, Nanrun Zhou:
Radio Vortex-Multiple-Input Multiple-Output Communication Systems With High Capacity. IEEE Access 3: 2456-2464 (2015) - [j9]Nan-Run Zhou, Tian Xiang Hua, Lihua Gong, Dong Ju Pei, Qing Hong Liao:
Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf. Process. 14(4): 1193-1213 (2015) - [j8]Qibiao Zhu
, Tao Jiang, Yang Cao, Kai Luo, Nanrun Zhou:
Radio vortex for future wireless broadband communications with high capacity. IEEE Wirel. Commun. 22(6): 98-104 (2015) - [j7]Nan Run Zhou, Zhi Juan Kang, Xiao Rong Liang:
Secure Cooperative Communication via Artificial Noise for Wireless Two-Hop Relaying Networks. Wirel. Pers. Commun. 82(3): 1759-1771 (2015) - 2014
- [j6]Nan-Run Zhou, Hu-Lai Cheng, Xiang-Yang Tao, Lihua Gong:
Three-party remote state preparation schemes based on entanglement. Quantum Inf. Process. 13(2): 513-526 (2014) - [j5]Bin Luo, Shichuang Wu, Nanrun Zhou:
Flexible Design Method for Multi-Repeater Wireless Power Transfer System Based on Coupled Resonator Bandpass Filter Model. IEEE Trans. Circuits Syst. I Regul. Pap. 61-I(11): 3288-3297 (2014) - [j4]Nanrun Zhou, Xun Chen, Chisheng Li, Zhi Xue:
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay. Wirel. Pers. Commun. 75(1): 119-129 (2014) - 2013
- [j3]Jianhua Wu, Fangfang Guo, Nanrun Zhou:
Single-Channel Color Image Encryption Using the Reality-Preserving Fractional Discrete Cosine Transform in YCbCr Space. J. Comput. 8(11): 2816-2822 (2013) - [j2]Jianni Xushuai, Zhihong Zhou, Wen Qin, Qiongxi Jiang, Nanrun Zhou:
Multi-Party Concurrent Signature Scheme Based on Designated Verifiers. J. Comput. 8(11): 2823-2830 (2013) - [j1]Aidi Zhang, Nanrun Zhou, Lihua Gong:
Color Image Encryption Algorithm Combining Compressive Sensing with Arnold Transform. J. Comput. 8(11): 2857-2863 (2013) - 2012
- [c3]Jianhua Mo
, Xiawen Xiao, Meixia Tao, Nanrun Zhou:
Hash function mapping design utilizing probability distribution for pre-image resistance. GLOBECOM 2012: 862-867
2000 – 2009
- 2009
- [c2]Lin Zhang, Jianhua Wu, Nanrun Zhou
:
Image Encryption with Discrete Fractional Cosine Transform and Chaos. IAS 2009: 61-64 - [c1]Nanrun Zhou, Binyang Zeng, Lihua Gong:
Quantum CSMA/CD Synchronous Communication Protocol with Entanglement. WISM 2009: 355-362
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint