scispace - formally typeset
H

Hai Yu

Researcher at Northeastern University (China)

Publications -  127
Citations -  2793

Hai Yu is an academic researcher from Northeastern University (China). The author has contributed to research in topics: Encryption & Chaotic. The author has an hindex of 24, co-authored 106 publications receiving 2215 citations. Previous affiliations of Hai Yu include Northeastern University.

Papers
More filters
Journal ArticleDOI

Color image encryption based on paired interpermuting planes

TL;DR: A new confusion scheme based on paired interpermuting planes is presented, employing an “exchange and random access strategy” to replace the traditional confusion operations.
Journal ArticleDOI

A Symmetric Image Encryption Algorithm Based on a Coupled Logistic–Bernoulli Map and Cellular Automata Diffusion Strategy

TL;DR: It is found that the new evolution effects among different generations of cells in cellular automata can significantly improve the diffusion effect and lead to a new one-dimensional chaotic map, which exhibits a much better random behavior and is more efficient than comparable ones.
Journal ArticleDOI

Automatic Software Refactoring via Weighted Clustering in Method-Level Networks

TL;DR: A system-level multiple refactoring algorithm, which can identify the move method, move field, and extract classRefactoring opportunities automatically according to the principle of “high cohesion and low coupling,” is described.
Proceedings ArticleDOI

Could I have a stack trace to examine the dependency conflict issue

TL;DR: Riddle, an automated approach that generates tests and collects crashing stack traces for projects subject to risk of dependency conflicts, combines condition mutation, search strategies and condition restoration and demonstrates the effectiveness and usefulness of Riddle.
Journal ArticleDOI

Optimization of cascading failure on complex network based on NNIA

TL;DR: Two multi-objective optimization models that comprehensively consider the operational cost of the edges in the networks and the robustness of the networks are established and optimal protection measures are taken to weaken the damage caused by cascading failures.