University of Science & Technology Beijing
University of Science & Technology Beijing

互联网安全实验室

代表性成果集锦

突出成果

1. 在学术上,实验室已发表SCI/EI检索学术论文100余篇(可见后续论文列表),其中Google他引次数超过4000余次;

2. 在科研上,实验室近年来主持和参与的各类科研项目10余项,包括:国家重点研发计划、国家自然科学基金、国家863计划、国家973计划等;

序号

项目名称

年度

1

国家自然科学基金外援存储中的数据完整性验证技术研究

2012-2015

2

国家自然科学基金支持时空属性的安全访问控制技术研究

2015-2018

3

国家自然科学基金基于NP完全类问题的抗量子计算密码基础理论研究

2017-2019

4

国家自然科学基金集合成员关系的密码学构造方法及其应用研究

2020-2023

5

国家重点研发计划重点专项基于区块链技术的智能合约服务

2019-2022

学生获奖情况

序号

获奖研究生

获奖名称及等级

获奖成果名称

获奖年度

1

杨立广

国家级

研究生国家奖学金

2016

2

王迪

国家级

研究生国家奖学金

2021

优秀毕业生

序号

姓名

学位

导师

毕业时间

1

瑞雅德

(优秀毕业国际学生)

博士

朱岩

2017

2

于汝云

博士

朱岩

2020

3

尹昊

硕士

朱岩

2018

4

周志远

硕士

朱岩

2020

5

王迪

硕士

朱岩

2022

3. 标准: 在中国电子学会区块链分会牵头成立“区块链智能合约”团体标准工作组,并编制多项标准,包括:
    [1] 《区块链 智能合约 形式化表达》 T/CIE095-2020
    [2] 《区块链 智能合约 合同文本置标语言 CTML》 T/CIE170-2021
    [3] 《区块链 智能合约 形式化设计与验证方法》 T/CIE130-2022
    [4] 人社部、工信部联合印发《区块链应用操作员国家职业技能标准》
    [5] 北京市地方标准《政务数据分级与安全保护规范》DB11/T 1918—2021

4. 知识产权

知识产权名称

专利号

备注

Method and System for Group-oriented Encryption and Decryption with Selection and Exclusion Functions

US20180006811A1

美国

Method and System for Cryptographic Decision-making of Set Membership

US20170359177A1

美国

Method and System for Cryptographic Attribute Based Access Control supporting Dynamic Rules

US16759917

美国

Method and System for Executable Smart Legal Contract Construction and Execution over Legal Contracts

US 17/444, 054

美国

一种法律合约的智能可执行合约构造与执行方法和系统

202010381549.5

 

一种基于动态规则的密码学属性基访问控制方法与系统

CN201711100571.2

 

一种基于群组密码体制的电子邮件认证方法与系统

CN201711289023.9

 

一种基于信任网络的去中心化公钥管理方法和管理系统

CN201611218516.9

 

一种基于属性集及关系谓词的加密系统及访问控制方法

CN201511000960.9

 

一种基于脚本的属性基访问策略表示与执行方法及系统

2019110594916

 

一种集合成员关系判定的密码学构造方法及系统

CN201510013367.1

 

一种具有选择和排除功能的群组加解密方法及系统

CN201510012649.X

 

一种基于群组密码体制的电子邮件加密方法与系统

201711286361.7

 

一种基于区块链访问技术的访问控制方法及系统

CN201711326186.X

 

一种分布式计算中基于密码学的除法协议构造方法

CN200910222922.6

 

一种分布式计算的逻辑比较方法

CN200910222920.7

 

一种具有层次关系的密钥控制与公钥广播加密方法

CN200910222921.1

 

网络应用流量分类识别装置及其方法

CN200610165296.8 

 

一种基于反馈传播的分布式计算网络构建方法及其系统

CN200810172676.3

 

一种具有容错功能的密码学分布式计算与分步检验方法

CN200810111190.9

 

流媒体监播中的数字标记构造及验证方法

CN200610144813.3

 

数字作品中指纹的构造和验证方法及数字产品发行系统

CN200610011699.7

 

一种基于交易的去中心化访问控制方法和系统

202011189225.8

 

一种基于合同文本标记语言的智能法律合约生成方法

202110172214.7

 

基于区块链交易的去中心化访问控制系统

2021SR0324983

 

一种基于合同文本标记语言的法律合同交互式标注方法

202110162638.5

 

基于属性基加密的区块链合约隐私保护方法与系统

201811351573.3

 

基于陷门二元单向函数的广播加密方法及装置

202010725369.4

 

5、论文列表

[1]      E. Chen, Y. Zhu, K. Liang, and H. Yin, “Secure remote cloud file sharing with attribute-based access control and performance optimization,”IEEE Transactions on Cloud Computing, vol. 11, 2023.

[2]      E. Chen, S. Wang, Y. Fan, Y. Zhu, and S. Yau, “Saasc: Toward pay-as-you-go mode for software service transactions based on blockchainamp;x0027;s smart legal contracts,” IEEE Transactions on Services Computing, 2023.

[3]      G. Guo, Y. Zhu, E. Chen, R. Yu, L. Zhang, K. Lv, and R. Feng,“Efficient multiparty fully homomorphic encryption with computation fairness and error detection in privacy preserving multisource data mining,” IEEE Transactions on Reliability, 2023.

[4]      H.-J. Yin, Y. Zhu, J.Wang, G.-L. Guo, and E. Chen, “Design and implementation of a smart-contract voting system based on zero-knowledge proof,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering,vol. 45, 2023.

[5]      S.-D. Wang, E. Chen, Y. Zhu, Y.-C. Lin, and G.-W. Liu, “A software service transaction approach based on blockchain smart contracts,”Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 45,2023.

[6]      E. Chen, Y. Zhu, Z. Zhou, S.-Y. Lee, W. Wong, and W.-C. Chu,“Policychain: A decentralized authorization service with script-driven policy on blockchain for internet of things,” IEEE Internet of Things Journal, vol. 9, 2022.

[7]      E. Chen, B. Qin, Y. Zhu, W. Song, S. Wang, C.-C. Chu, and S. Yau,“Spesc-translator: Towards automatically smart legal contract conversion for blockchain-based auction services,” IEEE Transactions on Services Computing, vol. 15, 2022.

[8]      H. Lu, R. Yu, Y. Zhu, X. He, K. Liang, and W.-C. Chu, “Policydriven data sharing over attribute-based encryption supporting dual membership,” Journal of Systems and Software, vol. 188, 2022.

[9]      Q. Guo, Y. Zhu, H.-J. Yin, E. Chen, D. Wang, and G.-W. Liu,“Design and implementation of conclusion procedure in smart legal contracts based on negotiation and acceptance,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 44, 2022.

[10]   G. Guo, Y. Zhu, E. Chen, G. Zhu, D. Ma, and W. Chu, “Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols,” Peer-to-Peer Networking and Applications, vol. 15, 2022.

[11]   H. Yin, E. Chen, Y. Zhu, R. Feng, and S. Yau, “An efficient zeroknowledge dual membership proof supporting pos-and-neg membership decision,” Mathematics, vol. 10, 2022.

[12]   H. Yin, E. Chen, Y. Zhu, C. Zhao, R. Feng, and S. Yau, “Attributebased private data sharing with script-driven programmable ciphertext and decentralized key management in blockchain internet of things,” IEEE Internet of Things Journal, vol. 9, 2022.

[13]   D. Wang, Y. Zhu, E. Chen, Q. Guo, J.-N. Li, Y.-Z. Sun, and R. Yi,“Smart legal contract and its research progress,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 44, 2022.

[14]   Y. Zhu, W. Song, D. Wang, D. Ma, and W.-C. Chu, “Ta-spesc: Toward asset-driven smart contract language supporting ownership transaction and rule-based generation on blockchain,” IEEE Transactions on Reliability,vol. 70, 2021.

[15]   Y. Zhu, Q. Guo, H. Yin, K. Liang, and S. Yau, “Blockchain-based software architecture development for service requirements with smart contracts,” Computer, vol. 54, 2021.

[16]   Y. Zhu, B.-H. Qin, E. Chen, and G.-W. Liu, “An advanced smart contract conversion and its design and implementation for auction contract,” Jisuanji Xuebao/Chinese Journal of Computers, vol. 44,2021.

[17]   E Chen, Y. Zhu, G. Zhu, K. Liang, and R. Feng, “How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors,” Computers and Security, vol. 107, 2021.

[18]   E Chen, B. Qin, Y. Zhu, W. Song, S. Wang, C.-C. Chu, and S. Yau,“Spesc-translator: Towards automatically smart legal contract conversion for blockchain-based auction services,” 2021.

[19]   Y. Jiang, Y. Li, and Y. Zhu, “Act: Auditable confidential transaction scheme,” Jisuanji Yanjiu yu Fazhan/Computer Research and Development,vol. 57, 2020.

[20]   E Chen, Y. Zhu, C. Lin, and K. Lv, “Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature,” Frontiers of Computer Science, vol. 14, 2020.

[21]   G. Guo, Y. Zhu, R. Yu, W.-C. Chu, and D. Ma, “A privacy-preserving framework with self-governance and permission delegation in online social networks,” IEEE Access, vol. 8, 2020.

[22]   D. Wang, Y. Zhu, Y. Zhang, and G. Liu, “Security assessment of blockchain in chinese classified protection of cybersecurity,” IEEE Access, vol. 8, 2020.

[23]   G. Gan, E. Chen, Z. Zhou, and Y. Zhu, “Token-based access control,”IEEE Access, vol. 8, 2020.

[24]   Y. Zhu, Y. Zhang, D. Wang, B.-H. Qin, Q. Guo, R.-Q. Feng, and Z.-J.Zhao, “Research on blockchain evaluation methods under the classified protection of cybersecurity,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 42, 2020.

[25]   Y. Jiang, Y. Li, and Y. Zhu, “Auditable zerocoin scheme with user awareness,” 2019.

[26]   Y. Zhu, R. Yu, D. Ma, and W.-C. Chu, “Cryptographic attribute-based access control (abac) for secure decision making of dynamic policy with multiauthority attribute tokens,” IEEE Transactions on Reliability,vol. 68, 2019.

[27]   Y. Zhu, K. Riad, R. Guo, G. Gan, and R. Feng, “New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain,” Frontiers of Computer Science, vol. 13,2019.

[28]   Y. Zhu, Q.-S. Wang, B.-H. Qin, and Z.-H. Wang, “Survey of blockchain technology and its advances,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 41, 2019.

[29]   Y. Zhu, H. Yin, and Q.-Y. Wang, “Group vpn system and multicast key distribution protocol based on group-oriented cryptography,” Ruan Jian Xue Bao/Journal of Software, vol. 30, 2019.

[30]   Y. Zhu, Y. Zhang, J. Wang, W. Song, C.-C. Chu, and G. Liu, “From data-driven to intelligent-driven: Technology evolution of network security in big data era,” vol. 2, 2019.

[31]   Y. Zhu, S. Yang, C.-C. Chu, and R. Feng, “Flashghost: Data sanitization with privacy protection based on frequent colliding hash table,” 2019.

[32]   Y. Zhu, X.-X. Song, X.-B. Xue, B.-H. Qin, and G.-W. Liu, “Smart contract execution system over blockchain based on secure multi-party computation,” Journal of Cryptologic Research, vol. 6, 2019.

[33]   Y. Zhu, R. Yu, E. Chen, and D. Huang, “An efficient broadcast encryption supporting designation and revocation mechanisms,” Chinese Journal of Electronics, vol. 28, 2019.

[34]   X. He, B. Qin, Y. Zhu, X. Chen, and Y. Liu, “Spesc: A specification language for smart contracts,” vol. 1, 2018.

[35]   Q. Wang, R. Feng, and Y. Zhu, “Verifiable random functions with boolean function constraints,” Science China Information Sciences,vol. 61, 2018.

[36]   B. Li, D. Huang, Z. Wang, and Y. Zhu, “Attribute-based access control for icn naming scheme,” IEEE Transactions on Dependable and Secure Computing, vol. 15, 2018.

[37]   Y. Zhu, R. Yu, E. Chen, and D. Huang, “Dual-mode broadcast encryption,” Science China Information Sciences, vol. 61, 2018.

[38]   Y. Zhu, G. Gan, R. Guo, and D. Huang, “Phe: An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud,” IEEE Transactions on Cloud Computing, vol. 6, 2018.

[39]   Y. Zhu, Y. Qin, Z. Zhou, X. Song, G. Liu, and W.-C. Chu, “Digital asset management with distributed permission over blockchain and attributebased access control,” 2018.

[40]   Y. Zhu, R. Yu, Y. Qin, D. Ma, and W.-C. Chu, “Provably secure cryptographic abac system to enhance reliability and privacy using realtime token and dynamic policy,” 2018.

[41]   Y. Zhu, X. Song, S. Yang, Y. Qin, and Q. Zhou, “Secure smart contract system built on smpc over blockchain,” 2018.

[42]   Y. Zhu, S. Yang, G. Gan, and X. He, “An efficient retrograde storage for self-destructing messages on frequently colliding hash table,” vol. 1,2018.

[43]   Y. Zhu, Y. Qin, G. Gan, Y. Shuai, and W.-C. Chu, “Tbac: Transactionbased access control on blockchain for resource sharing with cryptographically decentralized authorization,” vol. 1, 2018.

[44]   Y. Zhu, G. Gan, and K. Riad, “Bc-pds: Protecting privacy and selfsovereignty through blockchains for openpds,” 2017.

[45]   K. Riad and Z. Yan, “Multi-factor synthesis decision-making for trustbased access control on cloud,” International Journal of Cooperative Information Systems, vol. 26, 2017.

[46]   F. Luo, C. Lin, and Y. Zhu, “Role-based signature and its security proof,” Journal of Information Science and Engineering, vol. 32, 2016.

[47]   W.-T. Tsai, R. Blower, Y. Zhu, and L. Yu, “A system view of financial blockchains,” 2016.

[48]   K. Riad, Z. Yan, H. Hu, and G.-J. Ahn, “Ar-abac: A new attribute based access control model supporting attribute-rules for cloud computing,”2016.

[49]   C. Lin, F. Luo, H. Wang, and Y. Zhu, A provable data possession scheme with data hierarchy in cloud, 2016, vol. 9589.

[50]   Y. Zhu, R. Guo, G. Gan, and W.-T. Tsai, “Interactive incontestable signature for transactions confirmation in bitcoin blockchain,” vol. 1,2016.

[51]   B. Shrestha, D. Ma, Y. Zhu, H. Li, and N. Saxena, “Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware,” IEEE Transactions on Information Forensics and Security,vol. 10, 2015.

[52]   Z. Wang, D. Huang, Y. Zhu, B. Li, and C.-J. Chung, “Efficient attribute-based comparable data access control,” IEEE Transactions on Computers, vol. 64, 2015.

[53]   H. Wu, D. Huang, and Y. Zhu, “Establishing a personal on-demand execution environment for mobile cloud applications,” Mobile Networks and Applications, vol. 20, 2015.

[54]   Y. Zhu, F. Pu, G. Gan, R. Guo, and S. Zhang, “Traitor tracing and revocation for secure decoders in file syncing-and-sharing service,” vol. 2, 2015.

[55]   Y. Zhu, L. Yang, and D. Ma, “Secure snaps: A new forward secrecy cryptosystem for self-destructing messages in mobile services,” 2015.

[56]   Y. Zhu, D. Huang, C.-J. Hu, and X. Wang, “From rbac to abac:Constructing flexible data access control for cloud storage services,” IEEE Transactions on Services Computing, vol. 8, 2015.

[57]   Y. Zhu, D. Li, and L. Yang, Traitor tracing based on partially-ordered hierarchical encryption, 2015, vol. 9473.

[58]   Y. Zhu, X. Wang, D. Ma, and R. Guo, “Identity-set-based broadcast encryption supporting ”cut-or-select” with short ciphertext,” 2015.

[59]   B. Li, A. P. Verleker, D. Huang, Z. Wang, and Y. Zhu, “Attribute-based access control for icn naming scheme,” 2014.

[60]   S. Wang, Y. Zhu, D. Ma, and R. Feng, “Lattice-based key exchange on small integer solution problem,” Science China Information Sciences, vol. 57, 2014.

[61]   Y. Zhu, S. Wang, D. Ma, and R. Feng, “Identity-based encryption on rsa without pairings and key escrow,” Chinese Journal of Electronics, vol. 23, 2014.

[62]   Y. Zhu, D. Ma, C. Hu, G.-J. Ahn, and H. Hu, “Secure and efficient random functions with variable-length output,” Journal of Network and Computer Applications, vol. 45, 2014.

[63]   Y. Zhu, G.-J. Ahn, H. Hu, D. Ma, and S. Wang, “Role-based cryptosystem:A new cryptographic rbac system based on role-key hierarchy,”IEEE Transactions on Information Forensics and Security, vol. 8, 2013.

[64]   Y. Zhu, D. Ma, S. Wang, and R. Feng, Efficient identity-based encryption without pairings and key escrow for mobile devices, 2013, vol.7992 LNCS.

[65]   Y. Zhu, D. Ma, D. Huang, and C. Hu, “Enabling secure location-basedservices in mobile cloud computing,” 2013.

[66]   Y. Zhu, D. Ma, C.-J. Hu, and D. Huang, “How to use attribute-based encryption to implement role-based access control in the cloud,” 2013.

[67]   Y. Zhu, G.-J. Ahn, H. Hu, S. Yau, H. An, and C.-J. Hu, “Dynamic audit services for outsourced storages in clouds,” IEEE Transactions on Services Computing, vol. 6, 2013.

[68]   Y. Zhu, C. Hu, D. Ma, and J. Li, “Cryptographic spatio-temporal predicates for location-based services,” 2013.

[69]   H. Li, D. Ma, N. Saxena, B. Shrestha, and Y. Zhu, “Tap-wave-rub:Lightweight malware prevention for smartphones using intuitive human gestures,” 2013.

[70]   D. Ma, Y. Zhu, and M. Yu, “End-to-end aggregate authentication of time-series data,” 2013.

[71]   D. Ma, N. Saxena, T. Xiang, and Y. Zhu, “Location-aware and safer cards: Enhancing rfid security and privacy via location sensing,” IEEE Transactions on Dependable and Secure Computing, vol. 10, 2013.

[72]   Y. Zhu, S. Wang, D. Ma, H. Hu, and G.-J. Ahn, “Secure and efficient constructions of hash, mac and prf for mobile devices,” 2012.

[73]   Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, 2012.

[74]   Y. Zhu, D. Ma, and S. Wang, “Secure data retrieval of outsourced data with complex query support,” 2012.

[75]   Y. Zhu, S. Wang, H. Hu, G.-J. Ahn, and D. Ma, “Secure collaborative integrity verification for hybrid cloud environments,” International Journal of Cooperative Information Systems, vol. 21, 2012.

[76]   Y. Zhu, M. Yu, H. Hu, G.-J. Ahn, and H. Zhao, “Efficient construction of provably secure steganography under ordinary covert channels,” Science China Information Sciences, vol. 55, 2012.

[77]   Y. Zhu, H. Hu, G.-J. Ahn, D. Huang, and S. Wang, “Towards temporal access control in cloud computing,” 2012.

[78]   Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, “Comparison-based encryption for fine-grained access control in clouds,” 2012.

[79]   Y. Zhu, H. Hu, G.-J. Ahn, and S. Yau, “Efficient audit service outsourcing for data integrity in clouds,” Journal of Systems and Software, vol. 85, 2012.

[80]   Y. Zhu, H. Hu, G.-J. Ahn, Y. Han, and S. Chen, “Collaborative integrity verification in hybrid clouds,” 2011.

[81]   Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” 2011.

[82]   Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, and H. Hu, “Zero-knowledge proofs of retrievability,” Science China Information Sciences, vol. 54,2011.

[83]   Y. Zhu, H.-X. Hu, G.-J. Ahn, H.-X. Wang, and S.-B. Wang, “Provably secure role-based encryption with revocation mechanism,” Journal of Computer Science and Technology, vol. 26, 2011.

[84]   Y. Zhu, Z. Hu, H. Wang, H. Hu, and G.-J. Ahn, “A collaborative framework for privacy protection in online social networks,” 2010.

[85]   Y. Zhu, G.-J. Ahn, H. Hu, and H. Wang, “Cryptographic role-based security mechanisms based on role-key hierarchy,” 2010.

[86]   Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau, “Efficient provable data possession for hybrid clouds,” 2010.

[87]   D. Huang, Z. Zhou, and Z. Yan, “Gradual identity exposure using attribute-based encryption,” 2010.

[88]   H.-X. Wang, Y. Zhu, R.-Q. Feng, and S. Yau, “Attribute-based signature with policy-and-endorsement mechanism,” Journal of Computer Science and Technology, vol. 25, 2010.

[89]   Y. Zhu, C.-T. Li, and H.-J. Zhao, “Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain,”2007.

[90]   X. Zhang, Y. Yang, and Y. Zhu, “A secure hierarchical fragile watermarking method with tamper localization,” vol. 2, 2006.

[91]   X.-H. Zhang, Y. Zhu, and Y.-T. Yang, “Hybrid watermarking algorithm based on spread spectrum and quantization,” Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, vol. 27, 2006.

[92]   Z. Yan, Z. Wei, and Z. Xinshan, “Collusion secure convolutional fingerprinting information codes,” vol. 2006, 2006.

[93]   X. Zhu, Y. Gao, and Y. Zhu, “Image-adaptive watermarking based on perceptually shaping watermark blockwise,” vol. 2006, 2006.

[94]   Y. Zhu and Y.-T. Yang, “Performance analysis of spread spectrum cdma watermarking and applied research,” Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, vol. 38, 2006.

[95]   Y. Zhu, Y.-T. Yang, and D.-G. Feng, “Convolutional fingerprinting information codes for collusion security,” Ruan Jian Xue Bao/Journal of Software, vol. 17, 2006.

[96]   Y. Zhu, X.-H. Han, Z.-Y. Ye, and Y.-T. Yang, “Spread spectrum convolutional fingerprinting and its security analysis,” Jisuanji Xuebao/Chinese Journal of Computers, vol. 29, 2006.

[97]   Y. Zhu, Y.-T. Yang, and D.-G. Feng, “Research on hybrid watermarking based on spread spectrum and quantization in multiwavelet domain,”Tien Tzu Hsueh Pao/Acta Electronica Sinica, vol. 34, 2006.

[98]   Y. Zhu, Y.-T. Yang, Z.-Y. Ye, W. Zou, and D.-G. Feng, “Asymmetric spread-spectrum fingerprinting with buyer transparency,” Tien Tzu Hsueh Pao/Acta Electronica Sinica, vol. 34, 2006.

[99]   Y. Zhu, Y.-T. Yang, Z.-W. Sun, and D.-G. Feng, “Ownership proofs of digital works based on secure multiparty computation,” Ruan Jian Xue Bao/Journal of Software, vol. 17, 2006.

[100] Y. Zhu, D. Feng, and W. Zou, Collusion secure convolutional spread spectrum fingerprinting, 2005, vol. 3710 LNCS.

[101] Y. Zhu, Z.-W. Sun, Y.-T. Yang, and D.-G. Feng, “Performance analysis of spread spectrum cdma watermarking and applied research in multiwavelet domain,” Jisuanji Xuebao/Chinese Journal of Computers,vol. 28, 2005.

[102] Y.Zhu, X.-Y. Li, and R.-B. Zhang, “Adaptive speech enhancement based on wavelet in high noise environment,” vol. 2, 2002.