scispace - formally typeset
H

Hai Yu

Researcher at Northeastern University (China)

Publications -  127
Citations -  2793

Hai Yu is an academic researcher from Northeastern University (China). The author has contributed to research in topics: Encryption & Chaotic. The author has an hindex of 24, co-authored 106 publications receiving 2215 citations. Previous affiliations of Hai Yu include Northeastern University.

Papers
More filters
Journal ArticleDOI

A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system

TL;DR: A security improved image cipher which utilises chaotic Baker map and hyperchaotic Lorenz system for permutation and diffusion and a plain-image related key stream generation scheme is introduced, which improves the security against known/chosen plaintext attack.
Journal ArticleDOI

Will Dependency Conflicts Affect My Program's Semantics?

TL;DR: An automated testing technique is proposed, which synthesizes test cases using ingredients from the project under test to trigger inconsistent behaviors of the APIs with the same signatures in conflicting library versions, which is Inspired by an empirical study of 75 real SC issues.
Journal ArticleDOI

Using reliability risk analysis to prioritize test cases

TL;DR: A risk-based test case prioritization algorithm based on the transmission of information flows among software components that has a higher detection rate of faults with serious risk indicators and performs stably in different systems, compared with the other state-of-the-art algorithms.
Journal ArticleDOI

Watershed-Based Superpixels With Global and Local Boundary Marching

TL;DR: This paper proposes a new strategy with two distinct criteria for global and local refinement of the boundary pixels, based on the watershed transformation, which reduces the compromise between the boundary adherence and compactness.
Journal ArticleDOI

Improved online fountain codes

TL;DR: Simulation results reveal that the improved online fountain codes outperform the original fountain codes in terms of intermediate symbol recovery rate, average encoded symbols required to be generated by the sender, average feedback transmissions, and encoding/decoding efficiency.