Qian Mao
Department of Electrical & Computer Engineering
The University of Alabama
maoqiansh@gmail.com GoogleScholar DBLP
Publications
Journal
- Q. Mao, F. Hu, “Simulation Methodology and Performance Analysis of Network Coding Based Transport Protocol in Wireless Big Data Networks,” Simulation Modelling Practice and Theory, 2018.
- Q. Mao, F. Hu, K. Bao, S. Kumar, “Adaptive Batch Coding: A Balanced Congestion Control Strategy for Multi-Beam Antenna Networks,” IEEE Transactions on Vehicular Technology, 2017.
- Q. Mao, K. Bharanitharan, and C. C. Chang, “Multi-Round Dynamic Swap Optimization for Table-Based Steganography,” IET Image Processing, Aug. 2015.
- Q. Mao, F. Li, and C. C. Chang, “ReversibleData Hiding with Oriented and Minimized Distortions Using Cascading Trellis Coding,” Information Sciences, vol. 317, Oct. 2015, pp. 170-180.
- Q. Mao, K. Bharanitharan, and C. C. Chang, “A Proxy User Authentication Protocol Using Image Morphing,” the Computer Journal, vol. 58, no. 7, Jul. 2015, pp. 1573-1584.
- Q. Mao, “A Fast Algorithm for Matrix Embedding Steganography,” Digital Signal Processing, Vol. 25, Feb. 2014. pp. 248-254.
- Q. Mao and C. Qin, “A Novel Turbo Unequal Error Protection Scheme for Image Steganography,” Informatica, Vol. 24, No. 4, Aug. 2013, pp. 561-576.
- Q. Mao, C. C. Chang, L. Harn, and S. C. Chang, “An Image-Based Key Agreement Protocol Using the Morphing Technique,” Multimedia Tools and Applications, Nov., 2013.
- Q. Mao, C. C. Chang, and H. L. Wu, “An Image Encryption Scheme Based on Concatenated Torus Automorphisms,” KSII Transactions on Internet and Information Systems, Vol. 7, No. 6, Jun. 2013, pp. 1492-1511.
- Q. Mao, K. Bharanitharan, and C. C. Chang, “Edge Directed Automatic Control Point Selection Algorithm for Image Morphing,” IETE Technical Review, Vol. 30, No. 4, Aug. 2013, pp. 336-343.
- Q. Mao, C. C. Chang, and D. F. Zhong, “A Reversible Steganography Suitable for Embedding Small Amounts of Data,” International Journal of Network Security, Vol. 16, No. 4, Jul. 2014, pp. 304-312.
- C. C. Chang, H. L. Wu, Z. H. Wang, and Q. Mao, “An Efficient Smart Card Based Authentication Scheme Using Image Encryption,” Journal of Information Science and Engineering, Vol. 29, No. 6, Nov. 2013, pp. 1135-1150.
- Z. H. Wang, Q. Mao, and C. C. Chang, “A Data Lossless Message Hiding Scheme without Extra Information,” Journal of Internet Technology, Vol. 15, No. 4, Jul. 2014, pp. 657-670.
- F. Li, Q. Mao, and C. C. Chang, “A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method,” International Journal of Network Security, Vol. 18, No. 3, May 2016, pp. 410-419.
- C. C. Chang, Q. Mao, and H. L. Wu, “A Novel Authentication Scheme Based on Torus Automorphism for Smart Card,” Advances in Intelligent Systems and Applications, Vol. 2, in Proc. 2012 International Computer Symposium (ICS 2012), Hualien, Taiwan, Springer, pp. 53-60, Dec. 12-14, 2012.
- Q. Mao and C. Qin, “A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism,” Journal of Networks, Vol. 7, No. 2, Feb. 2012, pp. 236-242.
- Q. Mao, C. Qin, B. Q. Xu, and X. Y. Guo, “Turbo-Based Encryption with Error Correction Capability,” Journal of Computational Information Systems, Vol. 7, No. 8, Aug. 2011, pp. 2876-2885.
Conference
- Q. Mao, F, Hu, J. Qi, “Dynamic Centered Group Key Management for Unmanned Aerial Vehicle Networks with Multi-Beam Concurrent Transmissions,” in Proc. 2017 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2017), Montreal, QC, Canada, 08-13 Oct. 2017.
- C. C. Chang, Q. Mao, and H. L. Wu, “A Novel Authentication Scheme Based on Torus Automorphism for Smart Card,” Advances in Intelligent Systems and Applications, Vol. 2, in Proc. 2012 International Computer Symposium (ICS 2012), Hualien, Taiwan, pp. 53-60, Dec. 12-14, 2012.
- Q. Mao, B. Q. Xu, and Y. P. Qin, “A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes,” in Proc. the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal (IIH-MSP 2011), Da Lian, China, pp. 226-229, Oct. 14-16, 2011.
- Q. Mao, L. J Sun, and C. Qin, “Joint Error Correction and Encryption Scheme Based on Turbo Codes,” in Proc. 2010 International Symposium on Intelligence Information Processing and Trusted Computing (IPTC 2010), Huang Gang, China, pp. 503-506, Oct. 28-29, 2010.
- Q. Mao, C. Qin, and D. C. Dong, “A New Encryption Method Using Turbo Code,” in Proc. the Second International Conference on Multimedia Information Networking and Security (MINES 2010), Nan Jing, China, pp. 662-665, Nov. 4-6, 2010.
- C. Qin, Q. Mao, and X. P. Zhang, “Image Watermarking With Unequal Error Protection Capability,” in Proc. the First International Conference on Multimedia Information Networking and Security (MINES 2009), Wu Han, China, pp.81-84, Nov. 17-20, 2009.
Book Chapter
- S. J. Zhang, O. D. Xiu, Q. Mao, “Principle and Application of Information Transmission Technology,” Publishing House of Electronics Industry, China, Jan. 2011.