Bio
We haven't found any bio for you yet.
Researcher Links
Loading links...
Publications by Type
Loading publications…
The last 5 uploaded publications
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos Bourbakis, Kwok‐Tung Lo (2008). A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing Image Communication, 23(3), pp. 212-223, DOI: 10.1016/j.image.2008.01.003.
Article356 days agoCryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok‐Tung Lo (2007). Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Physics Letters A, 369(1-2), pp. 23-30, DOI: 10.1016/j.physleta.2007.04.023.
Article356 days agoOn the security defects of an image encryption scheme
Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Álvarez, Guanrong Chen (2009). On the security defects of an image encryption scheme. Image and Vision Computing, 27(9), pp. 1371-1381, DOI: 10.1016/j.imavis.2008.12.008.
Article356 days agoDynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Chengqing Li, Bingbing Feng, Shujun Li, Jürgen Kurths, Guanrong Chen (2019). Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Transactions on Circuits and Systems I Regular Papers, 66(6), pp. 2322-2335, DOI: 10.1109/tcsi.2018.2888688.
Article356 days agoCryptanalysis of an image encryption scheme based on a compound chaotic sequence
Chengqing Li, Shujun Li, Guanrong Chen, Wolfgang A. Halang (2008). Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image and Vision Computing, 27(8), pp. 1035-1039, DOI: 10.1016/j.imavis.2008.09.004.
Article356 days ago