scispace - formally typeset
X

Xuncai Zhang

Researcher at Zhengzhou University of Light Industry

Publications -  91
Citations -  1123

Xuncai Zhang is an academic researcher from Zhengzhou University of Light Industry. The author has contributed to research in topics: Encryption & DNA computing. The author has an hindex of 15, co-authored 90 publications receiving 874 citations. Previous affiliations of Xuncai Zhang include Zhengzhou University & Peking University.

Papers
More filters
Proceedings ArticleDOI

An encryption scheme using DNA technology

TL;DR: An encryption scheme is designed by using the technologies of DNA synthesis, PCR amplification and DNA digital coding as well as the theory of traditional cryptography to prevent attack from a possible word as PCR primers.
Journal ArticleDOI

Application of a novel IWO to the design of encoding sequences for DNA computing

TL;DR: A new methodology based on the IWO algorithm is developed to optimize encoding sequences by defining the colonizing behavior of weeds to overcome the obstacles of the original IwO algorithm, which cannot be applied to discrete problems directly.
Journal ArticleDOI

An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding

TL;DR: The experimental results show that the proposed method can effectively encrypt the image and has prominent characteristics, such as strong plaintext sensitivity, a large key space, and excellent ciphertext statistical properties.
Proceedings ArticleDOI

An improved shuffled frog leaping algorithm with cognitive behavior

TL;DR: A novel dasiacognition componentpsila is introduced to enhance the effectiveness of the SFL, namely frog not only adjust its position according to the best individual within the memeplex or the global best of population but also according to thinking of the frog itself.
Journal ArticleDOI

A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals

TL;DR: The experimental results and security analysis show that the encryption technique has enough key space to resist exhaustive attacks and can effectively resist statistical attacks, differential attacks, noise attacks, and cropping attacks.