Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ye Yun is active.

Publication


Featured researches published by Ye Yun.


international conference on computer application and system modeling | 2010

A new steganography method via combination in PowerPoint files

Zhang Hao-ran; Huang Liusheng; Ye Yun; Meng Peng

Steganography is the science of communicating secret information which no one apart from the intended recipient can be aware of. Most researchers focus on the medium of image, video and audio, while text is paid less attention, especially PowerPoint documents due to some shortcomings. In this paper, a new steganography method which hides information via different combinations of different objects in a PowerPoint file is proposed. Combination is widely used in PowerPoint files to help people operate different objects simultaneously. During our hiding process, the original content of the PowerPoint file is not changed at all, thus making the result stegodocument more natural and safe from traditional attacks compared to other steganography method.


international symposium on information engineering and electronic commerce | 2009

Efficient Secure Protocols to Determine Whether a Point is inside a Convex Hull

Ye Yun; Huang Liusheng; Yang Wei; Zhou Zhengyou

Secure Multi-party Computation (SMC) is dedicated to solve trust problems in cooperative computing with each participant’s private data. Privacy Preserving Computational Geometry (PPCG) is a special area in SMC and is being widely used. This paper investigates the problem of judging whether a point is in a convex hull or not. We firstly present a secure protocol to determine the position of a private point and a private line, based on which two efficient point-inclusion schemes are proposed. Compared with previous solutions, our protocols perform better in efficiency, especially when the number of the convex hull’s points is large.


information technology and computer science | 2009

A Secure Protocol for Determining the Meeting Points of Two Intersected Circles

Ye Yun; Huang Liusheng; Yang Wei; Zhou Zhengyou

Secure Multi-party Computation (SMC) deals with the problem of secure computation among participants who are not trusted by others. Privacy Preserving Computational Geometry is a special area in SMC and has been applied to various of areas such as military, commerce and governments et al. In this paper, we will propose an efficient secure protocol, which is based on numerical computation, for the problem of determining the meeting points of two intersected circles, which is a practical problem in our daily life. In our solution, the communicational complexity can be lowered to just Ο(12*(logR1+ logr2)), where R1 and R2 are the radius of the two circles respectively. We also present the experimental results in this paper.


Archive | 2014

Big data storage integrity verification method based on lattices

Ma Yuanyuan; Ye Yun; Deng Song; Huang Liusheng; Tian Miaomiao; Chen Yadong; Chen Lu; Guan Xiaojuan; Li Weiwei; Yang Wei


Archive | 2017

Distributed differential privacy protection method based on k-means

Ye Yun; Liang Yun; Huang Hui; Guo Yunfei; Wang Yao; Huang Feng; Huang Li; Zeng Pengfei; Li Chunlong; Huai Mengdi; Tian Miaomiao


Archive | 2017

User privacy data sending method and receiving method

Huang Feng; Ye Yun; Huang Hui; Liang Yun; Li Chunlong; Huang Li; Guo Yunfei; Wang Yao; Zeng Pengfei; Yu Zhenjiang; Wang Juanjuan


Archive | 2017

Safety isolation system and method for transmission of power system under multi-service optical network

Yu Gengshen; Guo Qian; Yu Yong; Li Nige; Fan Jie; Jiang Chengzhi; Gao Peng; Cao Wantian; Feng Gu; Ye Yun


Archive | 2017

Method for verifying and monitoring mobile application security in BYOD environment

Yu Yong; Cao Wantian; Feng Gu; Wang Linzhang; Wang Yan; Zhang Xiaojian; Wu Peng; Yu Pengfei; Shi Congcong; Guo Qian; Li Nige; Fan Jie; Gao Peng; Yu Gengshen; Ye Yun


Archive | 2017

Distributed network safety control system and method

Guo Qian; Cao Wantian; Gao Peng; Li Nige; Yu Gengshen; Fan Jie; Feng Gu; Shi Congcong; Yu Yong; Ye Yun; Jiang Chengzhi


Xiaoxing Weixing Jisuanji Xitong | 2016

本論文は,TOP-M DK-OUTLIERに基づくプライバシー保護異常データ検出アルゴリズムを提案した。【JST・京大機械翻訳】

Ye Yun; Yu Yong; Huang Liusheng; Shi Congcong; Li Nige; Huai Mengdi

Collaboration


Dive into the Ye Yun's collaboration.

Top Co-Authors

Avatar

Huang Liusheng

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yang Wei

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Gao Peng

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Deng Song

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Huang Feng

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Li Weiwei

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ma Yuanyuan

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Zhang Tao

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Meng Peng

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Nie Yiwen

University of Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge