Search the dblp DataBase
Lee-Ming Cheng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
W. P. Choi , Lee-Ming Cheng Modelling the Crypto-Processor from Design to Synthesis. [Citation Graph (0, 0)][DBLP ] CHES, 1999, pp:25-36 [Conf ] Choi-Kuen Chan , Chi-Kwong Chan , Lee-Ming Cheng Encryption System Based on Neutral Network. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2001, pp:- [Conf ] Donghui Guo , Lee-Ming Cheng , L. L. Cheng A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. [Citation Graph (0, 0)][DBLP ] Appl. Intell., 1999, v:10, n:1, pp:71-84 [Journal ] Chi-Kwong Chan , Lee-Ming Cheng Cryptanalysis of a Timestamp-Based Password Authentication Scheme. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:1, pp:74-76 [Journal ] Chi-Kwong Chan , Lee-Ming Cheng Security of Lin's image watermarking system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2002, v:62, n:3, pp:211-215 [Journal ] Chi-Kwong Chan , Lee-Ming Cheng Hiding data in images by simple LSB substitution. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 2004, v:37, n:3, pp:469-474 [Journal ] Lee-Ming Cheng , L. L. Cheng , Wei Sun On commutativity of duality operator and propagation operator of linear codes generated from algebraic curves. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:1, pp:258-261 [Journal ] Multipurpose watermarking based on curvelet transform. [Citation Graph (, )][DBLP ] Image hiding based on block difference. [Citation Graph (, )][DBLP ] Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs