Yiting Lin’s Homepage
Here is Yiting Lin(林一挺). I am currently a research assistant at Beijing Normal-Hong Kong Baptist University (BNBU), advised by A.P. Donglong CHEN, within Guangdong Provincial/Zhuhai Key Laboratory of Interdisciplinary Research and Application for Data Science. I am also a PI (Teaching and Research Position/Research Assistant) in Prof. Wenbin Cheng’s postgraduate research team at University of Electronic Science and Technology of China, Zhongshan Institute.
I have published over 30 papers since 2022, including 3 papers from the first quartile journals of the Chinese Academy of Sciences. I have authored 10 highly cited papers according to the Essential Science Indicators (ESI), and 3 hot paper according to the ESI. I have served as a peer reviewer for prestigious journals including IEEE TIFS, IEEE TDSC, IEEE TMM, IEEE TIP, IEEE TCSVT, IEEE TCYB, IEEE TSMC-S, IEEE TCAS-I, IEEE TCAS-II, IEEE TBD, IEEE TII, IEEE TCE, IEEE TIE, ACM TOMM, etc., as well as for publications by academic publishers such as Elsevier, Springer Nature, Wiley, IOP Publishing, Taylor&Francis, MDPI, etc.
If you are interested in any aspect of me, I am always open to discussions and collaborations. Feel free to reach out to me at - YitingLin [at] ieee.org
Real-time data:
🔥 ESI Hot Paper: 3 🏆 ESI Highly Cited Paper: 10
🔍 Masterpiece
- 👍 Main Representative Publications
- [NEW]Lin, Y.; Wei, Y.; Chen, D.; Li, Y.; Erkan, U.; Toktas, A.; Gao, S.; Zhang, Y. Cryptanalysis and Improvement of a Video Cryptosystem via Chaos and S-Box. ACM Transactions on Multimedia Computing, Communications and Applications. 2026, Early Access.🌏
- [NEW]Lin, Y.; Liao, Y.; Zeng, W.; Wei, Y.; Chen, D.; Yuan, X.; Li, Y.; Erkan, U.; Toktas, A.; Zhang, C.; Zhang, Y.; Gao, S. 3D Non-Degenerate Hyperchaos: Design, Analysis, and Application in Image Encryption. IEEE Transactions on Consumer Electronics. 2026, Early Access.🌏
- 🔥 ESI Hot Paper🏆 ESI Highly Cited Paper👉 Lin Y, Xie Z, Chen T, Cheng X, Wen H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Systems with Applications. 2024;257:124891. 🔯 (Computer Academy of Guangdong Outstanding Research Papers-Third Prize-2025) 📖
- 📌 Other Representative Publications
- 🔥 ESI Hot Paper🏆 ESI Highly Cited Paper👉 Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems with Applications. 📖
- 🔥 ESI Hot Paper🏆 ESI Highly Cited Paper👉 Cryptanalyzing an image cipher using multiple chaos and DNA operations. Journal of King Saud University - Computer and Information Sciences. 📖
- 🏆 ESI Highly Cited Paper👉 Intrusion Detection-Embedded Chaotic Encryption via Hybrid Modulation for Data Center Interconnects. Optics Letters. 📖
- 🏆 ESI Highly Cited Paper👉 Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Expert Systems with Applications. 📖
- 🏆 ESI Highly Cited Paper👉 Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. Engineering Science and Technology, an International Journal. 📖
- 🏆 ESI Highly Cited Paper👉 Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion. iScience. 📖
- 🏆 ESI Highly Cited Paper👉 Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci Rep. 📖
- Read More
Academic and Social Service
- Reviewer of the following journals
- IEEE Transactions on Dependable and Secure Computing
- IEEE Transactions on Information Forensics and Security
- IEEE Transactions on Big Data
- IEEE Transactions on Circuits and Systems for Video Technology
- IEEE Transactions on Industrial Informatics
- IEEE Transactions on Systems, Man, and Cybernetics: Systems
- IEEE Transactions on Multimedia
- IEEE Transactions on Industrial Electronics
- IEEE Transactions on Circuits and Systems I: Regular Papers
- IEEE Transactions on Circuits and Systems II: Express Briefs
- IEEE Transactions on Cybernetics
- IEEE Transactions on Consumer Electronics
- IEEE Internet of Things Journal
- IEEE MultiMedia
- ACM Computing Surveys
- ACM Transactions on Privacy and Security
- ACM Transactions on Multimedia Computing, Communications, and Applications
- Read More
- Associate Editor of the following journals/conferences
- N/A
- Guest Editor
🏆 Awards and Honors
- Computer Academy of Guangdong Outstanding Research Papers-Third Prize-2025 🌟 Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Systems with Applications.📖
- Computer Academy of Guangdong Outstanding Research Papers-Third Prize-2025 🌟 Cryptanalyzing an image cipher using multiple chaos and DNA operations. Journal of King Saud University - Computer and Information Sciences.📖
- Computer Academy of Guangdong Outstanding Research Papers-Third Prize-2023 🌟 Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Systems with Applications.📖
- Guangdong Cyberspace Security Outstanding Research Papers-Third Prize-2023 🌟 Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key. Mathematics.📖
Read More
👨🎓 Student Supervision
Alumni (University of Electronic Science and Technology of China):
- Lei Zhang, Mphil 2022.9-2025.8, Jobs at Beijing Kuaishou Technology Co., Ltd.. (Under Prof. Wenbin Cheng)
- Jiahe Shen, Mphil 2022.9-2025.8, Jobs at The 21st Research Institute of China Electronics Technology Group Corporation (CETC). (Under Prof. Wenbin Cheng)
- Xinyu Yang, Mphil 2023.9-2026.8, Jobs at Beijing Kuaishou Technology Co., Ltd.. (Under Prof. Wenbin Cheng)
📢 NEWS
[37] Jie Zhang; Wenjie Zhou; Mingxu Wang; Yiting Lin. 3D-TCM-Driven Bit-Level Image Encryption via S-Box Feedback Algorithm. Entropy 2026, 28 (5), 535. https://doi.org/10.3390/e28050535.
[36] Yunan Wei; Shengnan Zhao; Chuan Zhao; Yiting Lin; Donglong Chen; Minghao Zhao. Less Is More: Clustering with Adaptive Probability for Heterogeneous Federated Learning. Knowledge-Based Systems 2026, 116127. https://doi.org/10.1016/j.knosys.2026.116127.
[35] Shuqin Zhu; Wenjun Zeng; Congxu Zhu; Yiting Lin. Visual Meaningful Image Encryption Algorithm Based on 3D Discrete Hyperchaotic Map and Compressive Sensing. Results in Engineering 2026, 110766. https://doi.org/10.1016/j.rineng.2026.110766.
[34] Yiting Lin; Yunan Wei; Donglong Chen; Yupeng Li; Ugur Erkan; Abdurrahim Toktas; Suo Gao; Yong Zhang. Cryptanalysis and Improvement of a Video Cryptosystem via Chaos and S-Box. ACM Transactions on Multimedia Computing, Communications and Applications. 2026, Early Access. https://doi.org/10.1145/3808699.
[33] Zeyu Zhang; Wenqiang Zhang; Mingxu Wang; Na Ren; Peizhen Zhang; Yiting Lin. Robust Image Encryption Exploiting 2D Hyper-Chaos, Fractal Sierpiński Carpet Confusion, and Cascaded Diffusion. Symmetry 2026, 18 (4), 643. https://doi.org/10.3390/sym18040643.
[32] Yiting Lin; Yunlong Liao; Wenjun Zeng; Yunan Wei; Donglong Chen; Xiaochen Yuan; Yupeng Li; Ugur Erkan; Abdurrahim Toktas; Chongfu Zhang; Yong Zhang; Suo Gao. 3D Non-Degenerate Hyperchaos: Design, Analysis, and Application in Image Encryption. IEEE Transactions on Consumer Electronics. 2026, 10.1145/3808699. https://doi.org/10.1109/tce.2026.3672135.
[31] Uğur Erkan; Feyza Toktas; Abdurrahim Toktas; Qiang Lai; Shuang Zhou; Yiting Lin; Suo Gao. Multi-Layer and Multi-Directional Image Encryption Algorithm Based on Hyperchaotic 3D Xin-She Yang Map. Expert Systems with Applications 2026, 304, 130808. https://doi.org/10.1016/j.eswa.2025.130808.
[30] Yiting Lin; Yunlong Liao; Yunan Wei; Wenjun Zeng; Ugur Erkan; Abdurrahim Toktas; Yong Zhang; Donglong Chen. Lightweight image encryption via four-dimensional Hénon memristor map and fast block permutation. Nonlinear Science and Control Engineering 2025, 1(2), 025390012. https://doi.org/10.36922/NSCE025390012
[29] Siqi Ding; Ke Meng; Minghui Zhang; Yiting Lin; Chunpeng Wang; Qi Li; Suo Gao; Jun Mou. Three-Dimensional Discrete Echo-Memristor Map: Dynamic Analysis and DSP Implementation. Mathematics 2025, 13 (21), 3442. https://doi.org/10.3390/math13213442.
[28] Yunlong Liao; Yiting Lin; Zheng Xing; Qiutong Li; Guoheng Huang; Donglong Chen; Xiaochen Yuan. Using 3D-LMM-Based Encryption to Secure Digital Images With 3-D S-Box and Fibonacci Q-Matrix. IEEE Internet Things J. 2025, 12 (24), 55182–55195. https://doi.org/10.1109/jiot.2025.3624032.
[27] Lei Zhang; Xinyu Yang; Xiyuan Cheng; Wenbin Cheng; Yiting Lin. Few-Shot Image Classification Algorithm Based on Global–Local Feature Fusion. AI 2025, 6 (10), 265. https://doi.org/10.3390/ai6100265.
[26] Jiahe Shen; Xiyuan Cheng; Xinyu Yang; Lei Zhang; Wenbin Cheng; Yiting Lin. Efficient CNN Accelerator Based on Low-End FPGA with Optimized Depthwise Separable Convolutions and Squeeze-and-Excite Modules. AI 2025, 6 (10), 244. https://doi.org/10.3390/ai6100244.
[25] Xiyuan Cheng; Tiancong Cheng; Xinyu Yang; Wenbin Cheng; Yiting Lin. A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. Cryptography 2025, 9 (3), 57. https://doi.org/10.3390/cryptography9030057.
[24] Xiangyu Zhang; Heping Wen; Wei Feng; Shenghao Kang; Zhiyu Xie; Xuexi Zhang; Yiting Lin. Weighted Color Image Encryption Algorithm Based on RNA Extended Dynamic Coding and Quantum Chaotic System. Entropy 2025, 27 (8), 852. https://doi.org/10.3390/e27080852.
[23] Zhiyu Xie; Weihong Xie; Xiyuan Cheng; Zhengqin Yuan; Wenbin Cheng; Yiting Lin. Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos. Entropy 2025, 27 (8), 790. https://doi.org/10.3390/e27080790.
[22] Yunlong Liao; Yiting Lin; Zheng Xing; Xiaochen Yuan. Privacy Image Secrecy Scheme Based on Chaos-Driven Fractal Sorting Matrix and Fibonacci Q-Matrix. Vis Comput 2025, 41 (9), 6931–6941. https://doi.org/10.1007/s00371-025-04014-4.
[21] Yunlong Liao; Yiting Lin; Qiutong Li; Zheng Xing; Xiaochen Yuan. Lightweight Image Encryption Algorithm Using 4D-NDS: Compound Dynamic Diffusion and Single-Round Efficiency. IEEE Access 2025, 13, 74656–74666. https://doi.org/10.1109/access.2025.3560686.
[20] Uğur Erkan; Abdurrahim Toktas; Feyza Toktas; Yiting Lin; Suo Gao. Hybridization of benchmark functions for a high-performance 1D chaotic map and image encryption application. Nonlinear Science and Control Engineering 2025, 1(2), 025340010. https://doi.org/10.36922/NSCE025340010
[19] Wenjun Zeng; Chongfu Zhang; Xinshuai Liang; Jiebing Xia; Yue Lin; Yiting Lin. Intrusion Detection-Embedded Chaotic Encryption via Hybrid Modulation for Data Center Interconnects. Opt. Lett. 2025, 50 (13), 4450. https://doi.org/10.1364/ol.566608. 🏆 ESI Highly Cited Paper
[18] Yiting Lin; Zhiyu Xie; Tingting Chen; Xiyuan Cheng; Heping Wen. Image Privacy Protection Scheme Based on High-Quality Reconstruction DCT Compression and Nonlinear Dynamics. Expert Systems with Applications 2024, 257, 124891. https://doi.org/10.1016/j.eswa.2024.124891. 🔥 ESI Hot Paper🏆 ESI Highly Cited Paper
[17] Zhiyu Xie; Yiting Lin; Tengyu Liu; Heping Wen. Face Privacy Protection Scheme by Security-Enhanced Encryption Structure and Nonlinear Dynamics. iScience 2024, 27 (9), 110768. https://doi.org/10.1016/j.isci.2024.110768.
[16] Heping Wen; Yiting Lin; Lincheng Yang; Ruiting Chen. Cryptanalysis of an Image Encryption Scheme Using Variant Hill Cipher and Chaos. Expert Systems with Applications 2024, 250, 123748. https://doi.org/10.1016/j.eswa.2024.123748. 🏆 ESI Highly Cited Paper
[15] Lei Zhang; Yiting Lin; Xinyu Yang; Tingting Chen; Xiyuan Cheng; Wenbin Cheng. From Sample Poverty to Rich Feature Learning: A New Metric Learning Method for Few-Shot Classification. IEEE Access 2024, 12, 124990–125002. https://doi.org/10.1109/access.2024.3444483.
[14] Heping Wen; Zhaoyang Feng; Chixin Bai; Yiting Lin; Xiangyu Zhang; Wei Feng. Frequency-Domain Image Encryption Based on IWT and 3D S-Box. Phys. Scr. 2024, 99 (5), 055254. https://doi.org/10.1088/1402-4896/ad30ec.
[13] Heping Wen; Lincheng Yang; Chixin Bai; Yiting Lin; Tengyu Liu; Lei Chen; Yingchun Hu; Daojing He. Exploiting High-Quality Reconstruction Image Encryption Strategy by Optimized Orthogonal Compressive Sensing. Sci Rep 2024, 14 (1). https://doi.org/10.1038/s41598-024-59277-z.
[12] Heping Wen; Yiting Lin; Zhaoyang Feng. Cryptanalyzing a Bit-Level Image Encryption Algorithm Based on Chaotic Maps. Engineering Science and Technology, an International Journal 2024, 51, 101634. https://doi.org/10.1016/j.jestch.2024.101634. 🏆 ESI Highly Cited Paper
[11] Heping Wen; Yiting Lin. Cryptanalysis of an Image Encryption Algorithm Using Quantum Chaotic Map and DNA Coding. Expert Systems with Applications 2024, 237, 121514. https://doi.org/10.1016/j.eswa.2023.121514. 🔥 ESI Hot Paper🏆 ESI Highly Cited Paper
[10] Heping Wen; Yiting Lin; Shenghao Kang; Xiangyu Zhang; Kun Zou. Secure Image Encryption Algorithm Using Chaos-Based Block Permutation and Weighted Bit Planes Chain Diffusion. iScience 2024, 27 (1), 108610. https://doi.org/10.1016/j.isci.2023.108610. 🏆 ESI Highly Cited Paper
[9] Heping Wen; Zhiyu Xie; Zhuxi Wu; Yiting Lin; Wei Feng. Exploring the Future Application of UAVs: Face Image Privacy Protection Scheme Based on Chaos and DNA Cryptography. Journal of King Saud University - Computer and Information Sciences 2024, 36 (1), 101871. https://doi.org/10.1016/j.jksuci.2023.101871.
[8] Heping Wen; Ruiting Chen; Jieyi Yang; Tianle Zheng; Jiahao Wu; Wenxing Lin; Huilin Jian; Yiting Lin; Linchao Ma; Zhen Liu; Chongfu Zhang. Security Analysis of a Color Image Encryption Based on Bit-Level and Chaotic Map. Multimed Tools Appl 2023, 83 (2), 4133–4149. https://doi.org/10.1007/s11042-023-14921-0.
[7] Heping Wen; Yiting Lin; Zhiyu Xie; Tengyu Liu. Chaos-Based Block Permutation and Dynamic Sequence Multiplexing for Video Encryption. Sci Rep 2023, 13 (1). https://doi.org/10.1038/s41598-023-41082-9. 🏆 ESI Highly Cited Paper
[6] Heping Wen; Yiming Huang; Yiting Lin. High-Quality Color Image Compression-Encryption Using Chaos and Block Permutation. Journal of King Saud University - Computer and Information Sciences 2023, 35 (8), 101660. https://doi.org/10.1016/j.jksuci.2023.101660.
[5] Heping Wen; Shenghao Kang; Zhuxi Wu; Yiting Lin; Yiming Huang. Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure. Mathematics 2023, 11 (14), 3133. https://doi.org/10.3390/math11143133. 🏆 ESI Highly Cited Paper
[4] Heping Wen; Yiting Lin. Cryptanalyzing an Image Cipher Using Multiple Chaos and DNA Operations. Journal of King Saud University - Computer and Information Sciences 2023, 35 (7), 101612. https://doi.org/10.1016/j.jksuci.2023.101612. 🔥 ESI Hot Paper🏆 ESI Highly Cited Paper
[3] Heping Wen; Jiahao Wu; Linchao Ma; Zhen Liu; Yiting Lin; Limengnan Zhou; Huilin Jian; Wenxing Lin; Linhao Liu; Tianle Zheng; Chongfu Zhang. Secure Optical Image Communication Using Double Random Transformation and Memristive Chaos. IEEE Photonics J. 2023, 15 (1), 1–11. https://doi.org/10.1109/jphot.2022.3233129. 🏆 ESI Highly Cited Paper
[2] Heping Wen; Zefeng Chen; Jiehong Zheng; Yiming Huang; Shuwei Li; Linchao Ma; Yiting Lin; Zhen Liu; Rui Li; Linhao Liu; Wenxing Lin; Jieyi Yang; Chongfu Zhang; Huaide Yang. Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM. Entropy 2022, 24 (10), 1332. https://doi.org/10.3390/e24101332.
[1] Heping Wen; Zhen Liu; Haowen Lai; Chongfu Zhang; Linhao Liu; Jieyi Yang; Yiting Lin; Yunqi Li; Yunlong Liao; Linchao Ma; Zefeng Chen; Rui Li. Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key. Mathematics 2022, 10 (17), 3180. https://doi.org/10.3390/math10173180.
