I welcome all kinds of academic exchanges!
Here is Yiting Lin(林一挺/ JatTing Lam). I am currently a research assistant at BNU-HKBU United International College (Hong Kong Baptist University), advised by A.P. Donglong CHEN, within Embedded System Lab for AI and Security. I am also a researcher in Prof. Wenbin Cheng’s postgraduate research team at University of Electronic Science and Technology of China, Zhongshan Institute. My research interests include Cryptography, Blockchain, Multimedia Security, Image Processing, Nonlinear Systems and Applications, and AI Security.
If you are interested in any aspect of me, I am always open to discussions and collaborations. Feel free to reach out to me at - YitingLin [at] ieee.org
Research Interests
- Cryptography
- Blockchain
- Information Security
- Multimedia Security
- Artificial Intelligence (ML/DL)
My current research focuses on the practical problems faced by the intersection of cryptography and other disciplines in real-life applications. My interests are blockchain and fully homomorphic encryption and their applications in industrial IoT and life. My research also involves some areas of artificial intelligence. In short, advanced technologies such as cryptography, artificial intelligence, and the Internet have a positive impact on everyone’s life. I hope to devote my talents to this meaningful cause and bring benefits to society.
Masterpiece
- Representative Publications
- [ESI Hot Paper][ESI Highly Cited Paper] Lin Y, Xie Z, Chen T, Cheng X, Wen H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Systems with Applications. 2024;257:124891.
- [ESI Highly Cited Paper] Wen H, Lin Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems with Applications. 2024;237:121514.
- [ESI Highly Cited Paper] Wen H, Lin Y, Yang L, Chen R. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Expert Systems with Applications. 2024;250:123748.
- [ESI Highly Cited Paper] Wen H, Lin Y, Feng Z. Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. Engineering Science and Technology, an International Journal. 2024;51:101634.
- [ESI Highly Cited Paper] Wen H, Lin Y, Kang S, Zhang X, Zou K. Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion. iScience. 2024;27(1):108610.
- [ESI Highly Cited Paper] Wen H, Lin Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. Journal of King Saud University - Computer and Information Sciences. 2023;35(7):101612.
- [ESI Highly Cited Paper] Wen H, Lin Y, Xie Z, Liu T. Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci Rep. 2023;13(1). (Corresponding author)
- [ESI Highly Cited Paper] Wen H, Kang S, Wu Z, Lin Y, Huang Y. Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure. Mathematics. 2023;11(14):3133. (Corresponding author)
- Read More
Academic and Social Service
- Reviewer of the following journals
- ACM Transactions on Multimedia Computing, Communications, and Applications
- Ain Shams Engineering Journal
- Alexandria Engineering Journal
- Applied soft computing
- Computers & security
- Computer vision and image understanding
- Digital signal processing
- Expert systems with applications
- Information Sciences
- IET information security
- International journal of bifurcation and chaos in applied sciences and engineering
- iScience
- Journal of King Saud University Computer and Information Sciences
- Journal of visual communication and image representation
- Physica scripta (IOP Trusted Reviewer)
- The European physical journal plus
- Read More
- Associate Editor of the following journals/conferences
- Mathematics: Nonlinear Dynamics for Image Encryption (Guest Editor: Invited)
- Symmetry: Applications of Image Processing with Symmetry/Asymmetry (Guest Editor: Invited)
- Mathematics: Modern Trends in Cryptography Algorithms and Models (Guest Editor: Invited)
- Mathematics: Application of Distributed Encryption Technology in Enhancing Security and Privacy (Guest Editor: Invited)
Awards and Honors
- College Students’ Innovative Entrepreneurial Training Plan Program (SIETP)-National-Level Project-2024
- The 2024 Special Fund for the Cultivation of Guangdong College Students’ Scientific and Technological Innovation (“Climbing Program” Special Funds)-Provincial-Level Key Project-2024
- Computer Academy of Guangdong Outstanding Research Papers-Third Prize-2023
- Guangdong Cyberspace Security Outstanding Research Papers-Third Prize-2023
- The Guangdong Province Cybersecurity Industry Science and Technology Award-Second Prize-2022