scispace - formally typeset
Y

Yuli Zhao

Researcher at Northeastern University (China)

Publications -  22
Citations -  305

Yuli Zhao is an academic researcher from Northeastern University (China). The author has contributed to research in topics: Computer science & Network topology. The author has an hindex of 5, co-authored 17 publications receiving 216 citations.

Papers
More filters
Journal ArticleDOI

Image encryption based on three-dimensional bit matrix permutation

TL;DR: A new 3D bit matrix permutation is proposed, in which the Chen system is used to develop a random visiting mechanism to the bit level of the plain-image, and a new mapping rule is developed to map one random position to another random position in the 3D matrix rather than using traditional sequential visiting to theplain-image.
Journal ArticleDOI

Automatic Software Refactoring via Weighted Clustering in Method-Level Networks

TL;DR: A system-level multiple refactoring algorithm, which can identify the move method, move field, and extract classRefactoring opportunities automatically according to the principle of “high cohesion and low coupling,” is described.
Journal ArticleDOI

Evolutionary Game Dynamics of the Competitive Information Propagation on Social Networks

TL;DR: The model can simulate an individual’s strategy selection in social networks when facing two pieces of competitive information and finds that the basic payoff that accrues to individuals as a result of spreading their information and the network topology are two factors that significantly influence the propagation result.
Journal ArticleDOI

Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture

TL;DR: Under the proposed KSA, a key scheming for updating the initial keys using the plain-image and a new substitution method for encrypting various types of images are designed and developed.
Journal ArticleDOI

Improved online fountain codes

TL;DR: Simulation results reveal that the improved online fountain codes outperform the original fountain codes in terms of intermediate symbol recovery rate, average encoded symbols required to be generated by the sender, average feedback transmissions, and encoding/decoding efficiency.