Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

portfolio

publications

Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key

Published in Mathematics, 2022

IF:2.592 SCIE JCR-Q1 中科院3区 (2022)

Recommended citation: Wen, H., Liu, Z., Lai, H., Zhang, C., Liu, L., Yang, J., Lin, Y., Li, Y., Liao, Y., Ma, L., Chen, Z., & Li, R. (2022). Secure DNA-Coding Image Optical Communication Using Non-Degenerate Hyperchaos and Dynamic Secret-Key. In Mathematics (Vol. 10, Issue 17, p. 3180). MDPI AG. https://doi.org/10.3390/math10173180
Download Paper

Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM

Published in Entropy, 2022

IF:2.738 SCIE JCR-Q2 中科院3区 (2022)

Recommended citation: Wen, H., Chen, Z., Zheng, J., Huang, Y., Li, S., Ma, L., Lin, Y., Liu, Z., Li, R., Liu, L., Lin, W., Yang, J., Zhang, C., & Yang, H. (2022). Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM. In Entropy (Vol. 24, Issue 10, p. 1332). MDPI AG. https://doi.org/10.3390/e24101332
Download Paper

[ESI Highly Cited Paper] Secure Optical Image Communication Using Double Random Transformation and Memristive Chaos

Published in IEEE Photonics Journal, 2022

IF:2.25 SCIE JCR-Q2 中科院4区 EI (2022)

Recommended citation: Wen, H., Wu, J., Ma, L., Liu, Z., Lin, Y., Zhou, L., Jian, H., Lin, W., Liu, L., Zheng, T., & Zhang, C. (2023). Secure Optical Image Communication Using Double Random Transformation and Memristive Chaos. In IEEE Photonics Journal (Vol. 15, Issue 1, pp. 1–11). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/jphot.2022.3233129
Download Paper

Security analysis of a color image encryption based on bit-level and chaotic map

Published in Multimedia Tools and Applications , 2023

IF:3.6 SCIE JCR-Q2 中科院4区 EI CCF-C (2023)

Recommended citation: Wen, H., Chen, R., Yang, J., Zheng, T., Wu, J., Lin, W., Jian, H., Lin, Y., Ma, L., Liu, Z., & Zhang, C. (2023). Security analysis of a color image encryption based on bit-level and chaotic map. In Multimedia Tools and Applications (Vol. 83, Issue 2, pp. 4133–4149). Springer Science and Business Media LLC. https://doi.org/10.1007/s11042-023-14921-0
Download Paper

[ESI Highly Cited Paper] Cryptanalyzing an image cipher using multiple chaos and DNA operations

Published in Journal of King Saud University - Computer and Information Sciences, 2023

IF:6.9 SCIE JCR-Q1 中科院2区 (2023)

Recommended citation: Wen, H., & Lin, Y. (2023). Cryptanalyzing an image cipher using multiple chaos and DNA operations. In Journal of King Saud University - Computer and Information Sciences (Vol. 35, Issue 7, p. 101612). Elsevier BV. https://doi.org/10.1016/j.jksuci.2023.101612
Download Paper

[ESI Highly Cited Paper] Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion

Published in iScience, 2023

IF:5.8 SCIE JCR-Q1 中科院2区 (2023)

Recommended citation: Wen, H., Lin, Y., Kang, S., Zhang, X., & Zou, K. (2024). Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion. In iScience (Vol. 27, Issue 1, p. 108610). Elsevier BV. https://doi.org/10.1016/j.isci.2023.108610
Download Paper

Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography

Published in Journal of King Saud University - Computer and Information Sciences, 2023

IF:6.9 SCIE JCR-Q1 中科院2区 (2023)

Recommended citation: Wen, H., Xie, Z., Wu, Z., Lin, Y., & Feng, W. (2024). Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography. In Journal of King Saud University - Computer and Information Sciences (Vol. 36, Issue 1, p. 101871). Elsevier BV. https://doi.org/10.1016/j.jksuci.2023.101871
Download Paper

[ESI Highly Cited Paper] Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps

Published in Engineering Science and Technology, an International Journal, 2024

IF:5.6 SCIE JCR-Q1 中科院2区 (2024)

Recommended citation: Wen, H., Lin, Y., & Feng, Z. (2024). Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. In Engineering Science and Technology, an International Journal (Vol. 51, p. 101634). Elsevier BV. https://doi.org/10.1016/j.jestch.2024.101634
Download Paper

Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing

Published in Scientific Reports, 2024

IF:3.8 SCIE JCR-Q1 中科院2区 (2024)

Recommended citation: Wen, H., Yang, L., Bai, C., Lin, Y., Liu, T., Chen, L., Hu, Y., & He, D. (2024). Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing. In Scientific Reports (Vol. 14, Issue 1). Springer Science and Business Media LLC. https://doi.org/10.1038/s41598-024-59277-z
Download Paper

Frequency-domain image encryption based on IWT and 3D S-box

Published in Physica Scripta, 2024

IF:2.6 SCIE JCR-Q2 中科院3区 (2024)

Recommended citation: Wen, H., Feng, Z., Bai, C., Lin, Y., Zhang, X., & Feng, W. (2024). Frequency-domain image encryption based on IWT and 3D S-box. In Physica Scripta (Vol. 99, Issue 5, p. 055254). IOP Publishing. https://doi.org/10.1088/1402-4896/ad30ec
Download Paper

High-quality color image compression-encryption using chaos and block permutation

Published in Journal of King Saud University - Computer and Information Sciences, 2024

IF:6.9 SCIE JCR-Q1 中科院2区 (2023)

Recommended citation: Wen, H., Huang, Y., & Lin, Y. (2023). High-quality color image compression-encryption using chaos and block permutation. In Journal of King Saud University - Computer and Information Sciences (Vol. 35, Issue 8, p. 101660). Elsevier BV. https://doi.org/10.1016/j.jksuci.2023.101660
Download Paper

[ESI Highly Cited Paper] Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics

Published in Expert Systems with Applications, 2024

IF:7.5 SCIE JCR-Q1 中科院1区 TOP期刊 EI CCF-C (2024)

Recommended citation: Lin, Y., Xie, Z., Chen, T., Cheng, X., & Wen, H. (2024). Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. In Expert Systems with Applications (Vol. 257, p. 124891). Elsevier BV. https://doi.org/10.1016/j.eswa.2024.124891
Download Paper

From Sample Poverty to Rich Feature Learning: A New Metric Learning Method for Few-Shot Classification

Published in IEEE Access, 2024

IF:3.4 SCIE JCR-Q2 中科院3区 EI (2024)

Recommended citation: Zhang, L., Lin, Y., Yang, X., Chen, T., Cheng, X., & Cheng, W. (2024). From Sample Poverty to Rich Feature Learning: A New Metric Learning Method for Few-Shot Classification. In IEEE Access (Vol. 12, pp. 124990–125002). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/access.2024.3444483
Download Paper

talks

teaching

Teaching Assistant Experience 1

Teaching Assistant, University of Electronic Science and Technology of China, Zhongshan Institute, 2020

  • Involved in the development of new teaching materials and distributed instructional materials for four courses, such as Chaotic Image Encryption Technology, and Nationalized Confidential Communication System.

Volunteering Experience 2

Programming Teacher, Zhongshan Zhiyuan Technology Training Center Co., Ltd., 2023

  • Responsible for the C++ and Python teaching of children’s programming courses, aiming to cultivate students’ programming thinking and problem-solving skills, and stimulate students’ potential through personalized guidance and competition participation, so as to cultivate talents for the future science and technology field.

Volunteering Experience 4

Teacher, Xianyou Fengiang Junior High School, 2024

  • Gave courses and relevant guidance for students at the Information Technology Training Team during their winter vacation as a substitute teacher.

Volunteering Experience 1

Programming Teacher, Lianke High-tech Education, 2024

  • As a teacher of children’s programming courses, I focus on teaching and guiding the Python programming language. I am responsible for designing and implementing creative and interactive course plans to stimulate children’s interest and enthusiasm in programming.

Research Assistant Experience 1

Research Assistant, University of Electronic Science and Technology of China, Zhongshan Institute, 2024

  • Conducted scientific research, analyzed relevant data, published academic articles and assisted professors and other research staff to complete research projects.

Volunteering Experience 3

Programming Teacher, Zhongshan East District Songyuan Middle School, 2024

  • Responsible for designing and implementing teaching plans, imparting programming knowledge, evaluating student learning outcomes, providing personalized tutoring, updating course content to adapt to technological development, caring about students’ all-round development, and participating in educational management to ensure that students can master C++ programming skills and prepare for future careers.