代表性成果集锦
突出成果
1. 在学术上,实验室已发表SCI/EI检索学术论文100余篇(可见后续论文列表),其中Google他引次数超过4000余次;
2. 在科研上,实验室近年来主持和参与的各类科研项目10余项,包括:国家重点研发计划、国家自然科学基金、国家863计划、国家973计划等;
|
序号 |
项目名称 |
年度 |
|
1 |
国家自然科学基金“外援存储中的数据完整性验证技术研究 |
2012-2015 |
|
2 |
国家自然科学基金“支持时空属性的安全访问控制技术研究 |
2015-2018 |
|
3 |
国家自然科学基金“基于NP完全类问题的抗量子计算密码基础理论研究 |
2017-2019 |
|
4 |
国家自然科学基金“集合成员关系的密码学构造方法及其应用研究 |
2020-2023 |
|
5 |
国家重点研发计划重点专项“基于区块链技术的智能合约服务 |
2019-2022 |
|
学生获奖情况 |
||||
|
序号 |
获奖研究生 |
获奖名称及等级 |
获奖成果名称 |
获奖年度 |
|
1 |
杨立广 |
国家级 |
研究生国家奖学金 |
2016 |
|
2 |
王迪 |
国家级 |
研究生国家奖学金 |
2021 |
|
优秀毕业生 |
||||
|
序号 |
姓名 |
学位 |
导师 |
毕业时间 |
|
1 |
瑞雅德 (优秀毕业国际学生) |
博士 |
朱岩 |
2017 |
|
2 |
于汝云 |
博士 |
朱岩 |
2020 |
|
3 |
尹昊 |
硕士 |
朱岩 |
2018 |
|
4 |
周志远 |
硕士 |
朱岩 |
2020 |
|
5 |
王迪 |
硕士 |
朱岩 |
2022 |
3. 标准: 在中国电子学会区块链分会牵头成立“区块链智能合约”团体标准工作组,并编制多项标准,包括:
[1] 《区块链 智能合约 形式化表达》 T/CIE095-2020
[2] 《区块链 智能合约 合同文本置标语言 CTML》 T/CIE170-2021
[3] 《区块链 智能合约 形式化设计与验证方法》 T/CIE130-2022
[4] 人社部、工信部联合印发《区块链应用操作员国家职业技能标准》
[5] 北京市地方标准《政务数据分级与安全保护规范》DB11/T 1918—2021
4. 知识产权
|
知识产权名称 |
专利号 |
备注 |
|
Method and System for Group-oriented Encryption and Decryption with Selection and Exclusion Functions |
美国 |
|
|
Method and System for Cryptographic Decision-making of Set Membership |
美国 |
|
|
Method and System for Cryptographic Attribute Based Access Control supporting Dynamic Rules |
美国 |
|
|
Method and System for Executable Smart Legal Contract Construction and Execution over Legal Contracts |
美国 |
|
|
一种法律合约的智能可执行合约构造与执行方法和系统 |
202010381549.5 |
|
|
一种基于动态规则的密码学属性基访问控制方法与系统 |
|
|
|
一种基于群组密码体制的电子邮件认证方法与系统 |
|
|
|
一种基于信任网络的去中心化公钥管理方法和管理系统 |
|
|
|
一种基于属性集及关系谓词的加密系统及访问控制方法 |
|
|
|
一种基于脚本的属性基访问策略表示与执行方法及系统 |
|
|
|
一种集合成员关系判定的密码学构造方法及系统 |
|
|
|
一种具有选择和排除功能的群组加解密方法及系统 |
|
|
|
一种基于群组密码体制的电子邮件加密方法与系统 |
|
|
|
一种基于区块链访问技术的访问控制方法及系统 |
|
|
|
一种分布式计算中基于密码学的除法协议构造方法 |
|
|
|
一种分布式计算的逻辑比较方法 |
|
|
|
一种具有层次关系的密钥控制与公钥广播加密方法 |
|
|
|
网络应用流量分类识别装置及其方法 |
|
|
|
一种基于反馈传播的分布式计算网络构建方法及其系统 |
|
|
|
一种具有容错功能的密码学分布式计算与分步检验方法 |
|
|
|
流媒体监播中的数字标记构造及验证方法 |
|
|
|
数字作品中指纹的构造和验证方法及数字产品发行系统 |
|
|
|
一种基于交易的去中心化访问控制方法和系统 |
|
|
|
一种基于合同文本标记语言的智能法律合约生成方法 |
|
|
|
基于区块链交易的去中心化访问控制系统 |
|
|
|
一种基于合同文本标记语言的法律合同交互式标注方法 |
202110162638.5 |
|
|
基于属性基加密的区块链合约隐私保护方法与系统 |
201811351573.3 |
|
|
基于陷门二元单向函数的广播加密方法及装置 |
202010725369.4 |
|
5、论文列表
[1] E. Chen, Y. Zhu, K. Liang, and H. Yin, “Secure remote cloud file sharing with attribute-based access control and performance optimization,”IEEE Transactions on Cloud Computing, vol. 11, 2023.
[2] E. Chen, S. Wang, Y. Fan, Y. Zhu, and S. Yau, “Saasc: Toward pay-as-you-go mode for software service transactions based on blockchainamp;x0027;s smart legal contracts,” IEEE Transactions on Services Computing, 2023.
[3] G. Guo, Y. Zhu, E. Chen, R. Yu, L. Zhang, K. Lv, and R. Feng,“Efficient multiparty fully homomorphic encryption with computation fairness and error detection in privacy preserving multisource data mining,” IEEE Transactions on Reliability, 2023.
[4] H.-J. Yin, Y. Zhu, J.Wang, G.-L. Guo, and E. Chen, “Design and implementation of a smart-contract voting system based on zero-knowledge proof,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering,vol. 45, 2023.
[5] S.-D. Wang, E. Chen, Y. Zhu, Y.-C. Lin, and G.-W. Liu, “A software service transaction approach based on blockchain smart contracts,”Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 45,2023.
[6] E. Chen, Y. Zhu, Z. Zhou, S.-Y. Lee, W. Wong, and W.-C. Chu,“Policychain: A decentralized authorization service with script-driven policy on blockchain for internet of things,” IEEE Internet of Things Journal, vol. 9, 2022.
[7] E. Chen, B. Qin, Y. Zhu, W. Song, S. Wang, C.-C. Chu, and S. Yau,“Spesc-translator: Towards automatically smart legal contract conversion for blockchain-based auction services,” IEEE Transactions on Services Computing, vol. 15, 2022.
[8] H. Lu, R. Yu, Y. Zhu, X. He, K. Liang, and W.-C. Chu, “Policydriven data sharing over attribute-based encryption supporting dual membership,” Journal of Systems and Software, vol. 188, 2022.
[9] Q. Guo, Y. Zhu, H.-J. Yin, E. Chen, D. Wang, and G.-W. Liu,“Design and implementation of conclusion procedure in smart legal contracts based on negotiation and acceptance,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 44, 2022.
[10] G. Guo, Y. Zhu, E. Chen, G. Zhu, D. Ma, and W. Chu, “Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols,” Peer-to-Peer Networking and Applications, vol. 15, 2022.
[11] H. Yin, E. Chen, Y. Zhu, R. Feng, and S. Yau, “An efficient zeroknowledge dual membership proof supporting pos-and-neg membership decision,” Mathematics, vol. 10, 2022.
[12] H. Yin, E. Chen, Y. Zhu, C. Zhao, R. Feng, and S. Yau, “Attributebased private data sharing with script-driven programmable ciphertext and decentralized key management in blockchain internet of things,” IEEE Internet of Things Journal, vol. 9, 2022.
[13] D. Wang, Y. Zhu, E. Chen, Q. Guo, J.-N. Li, Y.-Z. Sun, and R. Yi,“Smart legal contract and its research progress,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 44, 2022.
[14] Y. Zhu, W. Song, D. Wang, D. Ma, and W.-C. Chu, “Ta-spesc: Toward asset-driven smart contract language supporting ownership transaction and rule-based generation on blockchain,” IEEE Transactions on Reliability,vol. 70, 2021.
[15] Y. Zhu, Q. Guo, H. Yin, K. Liang, and S. Yau, “Blockchain-based software architecture development for service requirements with smart contracts,” Computer, vol. 54, 2021.
[16] Y. Zhu, B.-H. Qin, E. Chen, and G.-W. Liu, “An advanced smart contract conversion and its design and implementation for auction contract,” Jisuanji Xuebao/Chinese Journal of Computers, vol. 44,2021.
[17] E Chen, Y. Zhu, G. Zhu, K. Liang, and R. Feng, “How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors,” Computers and Security, vol. 107, 2021.
[18] E Chen, B. Qin, Y. Zhu, W. Song, S. Wang, C.-C. Chu, and S. Yau,“Spesc-translator: Towards automatically smart legal contract conversion for blockchain-based auction services,” 2021.
[19] Y. Jiang, Y. Li, and Y. Zhu, “Act: Auditable confidential transaction scheme,” Jisuanji Yanjiu yu Fazhan/Computer Research and Development,vol. 57, 2020.
[20] E Chen, Y. Zhu, C. Lin, and K. Lv, “Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature,” Frontiers of Computer Science, vol. 14, 2020.
[21] G. Guo, Y. Zhu, R. Yu, W.-C. Chu, and D. Ma, “A privacy-preserving framework with self-governance and permission delegation in online social networks,” IEEE Access, vol. 8, 2020.
[22] D. Wang, Y. Zhu, Y. Zhang, and G. Liu, “Security assessment of blockchain in chinese classified protection of cybersecurity,” IEEE Access, vol. 8, 2020.
[23] G. Gan, E. Chen, Z. Zhou, and Y. Zhu, “Token-based access control,”IEEE Access, vol. 8, 2020.
[24] Y. Zhu, Y. Zhang, D. Wang, B.-H. Qin, Q. Guo, R.-Q. Feng, and Z.-J.Zhao, “Research on blockchain evaluation methods under the classified protection of cybersecurity,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 42, 2020.
[25] Y. Jiang, Y. Li, and Y. Zhu, “Auditable zerocoin scheme with user awareness,” 2019.
[26] Y. Zhu, R. Yu, D. Ma, and W.-C. Chu, “Cryptographic attribute-based access control (abac) for secure decision making of dynamic policy with multiauthority attribute tokens,” IEEE Transactions on Reliability,vol. 68, 2019.
[27] Y. Zhu, K. Riad, R. Guo, G. Gan, and R. Feng, “New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain,” Frontiers of Computer Science, vol. 13,2019.
[28] Y. Zhu, Q.-S. Wang, B.-H. Qin, and Z.-H. Wang, “Survey of blockchain technology and its advances,” Gongcheng Kexue Xuebao/Chinese Journal of Engineering, vol. 41, 2019.
[29] Y. Zhu, H. Yin, and Q.-Y. Wang, “Group vpn system and multicast key distribution protocol based on group-oriented cryptography,” Ruan Jian Xue Bao/Journal of Software, vol. 30, 2019.
[30] Y. Zhu, Y. Zhang, J. Wang, W. Song, C.-C. Chu, and G. Liu, “From data-driven to intelligent-driven: Technology evolution of network security in big data era,” vol. 2, 2019.
[31] Y. Zhu, S. Yang, C.-C. Chu, and R. Feng, “Flashghost: Data sanitization with privacy protection based on frequent colliding hash table,” 2019.
[32] Y. Zhu, X.-X. Song, X.-B. Xue, B.-H. Qin, and G.-W. Liu, “Smart contract execution system over blockchain based on secure multi-party computation,” Journal of Cryptologic Research, vol. 6, 2019.
[33] Y. Zhu, R. Yu, E. Chen, and D. Huang, “An efficient broadcast encryption supporting designation and revocation mechanisms,” Chinese Journal of Electronics, vol. 28, 2019.
[34] X. He, B. Qin, Y. Zhu, X. Chen, and Y. Liu, “Spesc: A specification language for smart contracts,” vol. 1, 2018.
[35] Q. Wang, R. Feng, and Y. Zhu, “Verifiable random functions with boolean function constraints,” Science China Information Sciences,vol. 61, 2018.
[36] B. Li, D. Huang, Z. Wang, and Y. Zhu, “Attribute-based access control for icn naming scheme,” IEEE Transactions on Dependable and Secure Computing, vol. 15, 2018.
[37] Y. Zhu, R. Yu, E. Chen, and D. Huang, “Dual-mode broadcast encryption,” Science China Information Sciences, vol. 61, 2018.
[38] Y. Zhu, G. Gan, R. Guo, and D. Huang, “Phe: An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud,” IEEE Transactions on Cloud Computing, vol. 6, 2018.
[39] Y. Zhu, Y. Qin, Z. Zhou, X. Song, G. Liu, and W.-C. Chu, “Digital asset management with distributed permission over blockchain and attributebased access control,” 2018.
[40] Y. Zhu, R. Yu, Y. Qin, D. Ma, and W.-C. Chu, “Provably secure cryptographic abac system to enhance reliability and privacy using realtime token and dynamic policy,” 2018.
[41] Y. Zhu, X. Song, S. Yang, Y. Qin, and Q. Zhou, “Secure smart contract system built on smpc over blockchain,” 2018.
[42] Y. Zhu, S. Yang, G. Gan, and X. He, “An efficient retrograde storage for self-destructing messages on frequently colliding hash table,” vol. 1,2018.
[43] Y. Zhu, Y. Qin, G. Gan, Y. Shuai, and W.-C. Chu, “Tbac: Transactionbased access control on blockchain for resource sharing with cryptographically decentralized authorization,” vol. 1, 2018.
[44] Y. Zhu, G. Gan, and K. Riad, “Bc-pds: Protecting privacy and selfsovereignty through blockchains for openpds,” 2017.
[45] K. Riad and Z. Yan, “Multi-factor synthesis decision-making for trustbased access control on cloud,” International Journal of Cooperative Information Systems, vol. 26, 2017.
[46] F. Luo, C. Lin, and Y. Zhu, “Role-based signature and its security proof,” Journal of Information Science and Engineering, vol. 32, 2016.
[47] W.-T. Tsai, R. Blower, Y. Zhu, and L. Yu, “A system view of financial blockchains,” 2016.
[48] K. Riad, Z. Yan, H. Hu, and G.-J. Ahn, “Ar-abac: A new attribute based access control model supporting attribute-rules for cloud computing,”2016.
[49] C. Lin, F. Luo, H. Wang, and Y. Zhu, A provable data possession scheme with data hierarchy in cloud, 2016, vol. 9589.
[50] Y. Zhu, R. Guo, G. Gan, and W.-T. Tsai, “Interactive incontestable signature for transactions confirmation in bitcoin blockchain,” vol. 1,2016.
[51] B. Shrestha, D. Ma, Y. Zhu, H. Li, and N. Saxena, “Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware,” IEEE Transactions on Information Forensics and Security,vol. 10, 2015.
[52] Z. Wang, D. Huang, Y. Zhu, B. Li, and C.-J. Chung, “Efficient attribute-based comparable data access control,” IEEE Transactions on Computers, vol. 64, 2015.
[53] H. Wu, D. Huang, and Y. Zhu, “Establishing a personal on-demand execution environment for mobile cloud applications,” Mobile Networks and Applications, vol. 20, 2015.
[54] Y. Zhu, F. Pu, G. Gan, R. Guo, and S. Zhang, “Traitor tracing and revocation for secure decoders in file syncing-and-sharing service,” vol. 2, 2015.
[55] Y. Zhu, L. Yang, and D. Ma, “Secure snaps: A new forward secrecy cryptosystem for self-destructing messages in mobile services,” 2015.
[56] Y. Zhu, D. Huang, C.-J. Hu, and X. Wang, “From rbac to abac:Constructing flexible data access control for cloud storage services,” IEEE Transactions on Services Computing, vol. 8, 2015.
[57] Y. Zhu, D. Li, and L. Yang, Traitor tracing based on partially-ordered hierarchical encryption, 2015, vol. 9473.
[58] Y. Zhu, X. Wang, D. Ma, and R. Guo, “Identity-set-based broadcast encryption supporting ”cut-or-select” with short ciphertext,” 2015.
[59] B. Li, A. P. Verleker, D. Huang, Z. Wang, and Y. Zhu, “Attribute-based access control for icn naming scheme,” 2014.
[60] S. Wang, Y. Zhu, D. Ma, and R. Feng, “Lattice-based key exchange on small integer solution problem,” Science China Information Sciences, vol. 57, 2014.
[61] Y. Zhu, S. Wang, D. Ma, and R. Feng, “Identity-based encryption on rsa without pairings and key escrow,” Chinese Journal of Electronics, vol. 23, 2014.
[62] Y. Zhu, D. Ma, C. Hu, G.-J. Ahn, and H. Hu, “Secure and efficient random functions with variable-length output,” Journal of Network and Computer Applications, vol. 45, 2014.
[63] Y. Zhu, G.-J. Ahn, H. Hu, D. Ma, and S. Wang, “Role-based cryptosystem:A new cryptographic rbac system based on role-key hierarchy,”IEEE Transactions on Information Forensics and Security, vol. 8, 2013.
[64] Y. Zhu, D. Ma, S. Wang, and R. Feng, Efficient identity-based encryption without pairings and key escrow for mobile devices, 2013, vol.7992 LNCS.
[65] Y. Zhu, D. Ma, D. Huang, and C. Hu, “Enabling secure location-basedservices in mobile cloud computing,” 2013.
[66] Y. Zhu, D. Ma, C.-J. Hu, and D. Huang, “How to use attribute-based encryption to implement role-based access control in the cloud,” 2013.
[67] Y. Zhu, G.-J. Ahn, H. Hu, S. Yau, H. An, and C.-J. Hu, “Dynamic audit services for outsourced storages in clouds,” IEEE Transactions on Services Computing, vol. 6, 2013.
[68] Y. Zhu, C. Hu, D. Ma, and J. Li, “Cryptographic spatio-temporal predicates for location-based services,” 2013.
[69] H. Li, D. Ma, N. Saxena, B. Shrestha, and Y. Zhu, “Tap-wave-rub:Lightweight malware prevention for smartphones using intuitive human gestures,” 2013.
[70] D. Ma, Y. Zhu, and M. Yu, “End-to-end aggregate authentication of time-series data,” 2013.
[71] D. Ma, N. Saxena, T. Xiang, and Y. Zhu, “Location-aware and safer cards: Enhancing rfid security and privacy via location sensing,” IEEE Transactions on Dependable and Secure Computing, vol. 10, 2013.
[72] Y. Zhu, S. Wang, D. Ma, H. Hu, and G.-J. Ahn, “Secure and efficient constructions of hash, mac and prf for mobile devices,” 2012.
[73] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, 2012.
[74] Y. Zhu, D. Ma, and S. Wang, “Secure data retrieval of outsourced data with complex query support,” 2012.
[75] Y. Zhu, S. Wang, H. Hu, G.-J. Ahn, and D. Ma, “Secure collaborative integrity verification for hybrid cloud environments,” International Journal of Cooperative Information Systems, vol. 21, 2012.
[76] Y. Zhu, M. Yu, H. Hu, G.-J. Ahn, and H. Zhao, “Efficient construction of provably secure steganography under ordinary covert channels,” Science China Information Sciences, vol. 55, 2012.
[77] Y. Zhu, H. Hu, G.-J. Ahn, D. Huang, and S. Wang, “Towards temporal access control in cloud computing,” 2012.
[78] Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao, “Comparison-based encryption for fine-grained access control in clouds,” 2012.
[79] Y. Zhu, H. Hu, G.-J. Ahn, and S. Yau, “Efficient audit service outsourcing for data integrity in clouds,” Journal of Systems and Software, vol. 85, 2012.
[80] Y. Zhu, H. Hu, G.-J. Ahn, Y. Han, and S. Chen, “Collaborative integrity verification in hybrid clouds,” 2011.
[81] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” 2011.
[82] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, and H. Hu, “Zero-knowledge proofs of retrievability,” Science China Information Sciences, vol. 54,2011.
[83] Y. Zhu, H.-X. Hu, G.-J. Ahn, H.-X. Wang, and S.-B. Wang, “Provably secure role-based encryption with revocation mechanism,” Journal of Computer Science and Technology, vol. 26, 2011.
[84] Y. Zhu, Z. Hu, H. Wang, H. Hu, and G.-J. Ahn, “A collaborative framework for privacy protection in online social networks,” 2010.
[85] Y. Zhu, G.-J. Ahn, H. Hu, and H. Wang, “Cryptographic role-based security mechanisms based on role-key hierarchy,” 2010.
[86] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau, “Efficient provable data possession for hybrid clouds,” 2010.
[87] D. Huang, Z. Zhou, and Z. Yan, “Gradual identity exposure using attribute-based encryption,” 2010.
[88] H.-X. Wang, Y. Zhu, R.-Q. Feng, and S. Yau, “Attribute-based signature with policy-and-endorsement mechanism,” Journal of Computer Science and Technology, vol. 25, 2010.
[89] Y. Zhu, C.-T. Li, and H.-J. Zhao, “Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain,”2007.
[90] X. Zhang, Y. Yang, and Y. Zhu, “A secure hierarchical fragile watermarking method with tamper localization,” vol. 2, 2006.
[91] X.-H. Zhang, Y. Zhu, and Y.-T. Yang, “Hybrid watermarking algorithm based on spread spectrum and quantization,” Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, vol. 27, 2006.
[92] Z. Yan, Z. Wei, and Z. Xinshan, “Collusion secure convolutional fingerprinting information codes,” vol. 2006, 2006.
[93] X. Zhu, Y. Gao, and Y. Zhu, “Image-adaptive watermarking based on perceptually shaping watermark blockwise,” vol. 2006, 2006.
[94] Y. Zhu and Y.-T. Yang, “Performance analysis of spread spectrum cdma watermarking and applied research,” Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, vol. 38, 2006.
[95] Y. Zhu, Y.-T. Yang, and D.-G. Feng, “Convolutional fingerprinting information codes for collusion security,” Ruan Jian Xue Bao/Journal of Software, vol. 17, 2006.
[96] Y. Zhu, X.-H. Han, Z.-Y. Ye, and Y.-T. Yang, “Spread spectrum convolutional fingerprinting and its security analysis,” Jisuanji Xuebao/Chinese Journal of Computers, vol. 29, 2006.
[97] Y. Zhu, Y.-T. Yang, and D.-G. Feng, “Research on hybrid watermarking based on spread spectrum and quantization in multiwavelet domain,”Tien Tzu Hsueh Pao/Acta Electronica Sinica, vol. 34, 2006.
[98] Y. Zhu, Y.-T. Yang, Z.-Y. Ye, W. Zou, and D.-G. Feng, “Asymmetric spread-spectrum fingerprinting with buyer transparency,” Tien Tzu Hsueh Pao/Acta Electronica Sinica, vol. 34, 2006.
[99] Y. Zhu, Y.-T. Yang, Z.-W. Sun, and D.-G. Feng, “Ownership proofs of digital works based on secure multiparty computation,” Ruan Jian Xue Bao/Journal of Software, vol. 17, 2006.
[100] Y. Zhu, D. Feng, and W. Zou, Collusion secure convolutional spread spectrum fingerprinting, 2005, vol. 3710 LNCS.
[101] Y. Zhu, Z.-W. Sun, Y.-T. Yang, and D.-G. Feng, “Performance analysis of spread spectrum cdma watermarking and applied research in multiwavelet domain,” Jisuanji Xuebao/Chinese Journal of Computers,vol. 28, 2005.
[102] Y.Zhu, X.-Y. Li, and R.-B. Zhang, “Adaptive speech enhancement based on wavelet in high noise environment,” vol. 2, 2002.