I am currently a professor with the School of Computer Science and Technology at Harbin Institute of Technology, Shenzhen. My research interests include Applied Cryptography, Multimedia Security, Trustworthy AI, and Nonlinear Systems and Applications. If you have any interest in exploring potential academic collaborations or if you have inquiries related to my research, please feel free to contact me via email at huazhongyunAThit.edu.cn or huazyumATgmail.com.
I received the B.S. degree in software engineering from Chongqing University, Chongqing, China, in 2011, and the M.S. and Ph.D. degrees in software engineering from the University of Macau, Macau, China, in 2013 and 2016, respectively. My works have appeared in prestigious venues such as ACM CCS, Usenix Security, ICML, CVPR, AAAI, ACM MM, IEEE TIFS, IEEE TDSC, IEEE TC, IEEE TPDS, IEEE TIP, and IEEE TSP. I have been recognized as a 'Highly Cited Researcher' in 2022, 2023, and 2024. I have published more than 120 papers. I am an associate editor of IEEE Signal Processing Letters and IEEE Transactions on Dependable and Secure Computing. 。
My research interests include:
- Applied Cryptography:Information security, data privacy, privacy-preserving machine learning, secure cloud computing, etc
- Multimedia Security
- Trustworthy AI
- Nonlinear Systems and Applications
🔥 News
- 2025.04: 🎉🎉 A paper is accepted by IEEE TDSC
- 2025.03: 🎉🎉 A paper is accepted by IEEE TSC; I was invited to serve as an Associate Editor of IEEE Transactions on Dependable and Secure Computing (TDSC)
- 2025.02: 🎉🎉 A paper is accepted by IEEE TIFS; A paper is accepted by IEEE TDSC; A paper is accepted by IEEE TMM
- 2025.01: 🎉🎉 A paper is accepted by IEEE TIP; Two papers are accpeted by USENIX Security 2025
- 2024.12: 🎉🎉 Two papers are accpeted by AAAI 2025; A paper is accepted by IEEEE TIFS
- 2024.11: 🎉🎉 I am recognized as a 'Highly Cited Researcher 2024'; A paper is accted by IEEE TSC
- 2024.10: 🎉🎉 A paper is nominated for the Best Paper Award at ACM MM 2024
- 2024.09: 🎉🎉 A paper is accpeted by IEEE TCAS-I; A paper is accpeted by IEEE TCSVT; A paper is accpeted by ACM TOMM
- 2024.08: 🎉🎉 A paper is accpeted by ACM CCS; A paper is accpeted by IEEE TSC; Two papers are accpeted by IEEE TIE; A paper is accepted by IEEE TBIOM
- 2024.07: 🎉🎉 A paper is accpeted by IEEE TCAS-I; A paper is accpeted by IEEE TII; A paper is accpeted by IEEE TII;Two papers are accpeted by ACM MM
- 2024.06: 🎉🎉 A paper is accpeted by IEEE TCSVT; A paper is accpeted by ACM TOMM
- 2024.05: 🎉🎉 A paper is accpeted by ICML 2024; A paper is accpeted by IEEE TIFS
- 2024.03: 🎉🎉 A paper is accpeted by IEEE TCAS-I; A paper is accpeted by IEEE TCSS; Apaper is accepted bgy IEEE TIFS
- 2024.02: 🎉🎉 A paper is accpeted by CSF; A paper is accpeted by CVPR 2024
- 2024.01: 🎉🎉 A paper is accpeted by IEEE TIFS
- 2023.12: 🎉🎉 A paper is accpeted by AAAI 2024; A paper is accepted by ACM TOMM; A paper is accepted by IEEE TSC
- 2023.11: 🎉🎉 I am recognized as a 'Highly Cited Researcher 2023'
- 2023.11: 🎉🎉 A paper is accepted by IEEE TC; A paper is accepted by IEEE TSC; A paper is accepted by IEEE TDSC
📎 Academic Service Experience
- 2025 - Now, Associate Editor, IEEE Transactions on Dependable and Secure Computing
- 2024 - Now, Associate Editor, IEEE Signal Processing Letters
- 2022 - Now, Associate Editor, International Journal of Bifurcation and Chaos
- 2020 - Now, Editorial Board, China Computer Science Review (A Chinese Journal)
- 2021, Special Issue Editor, "Cyber Security and AI" in Sensors
- 2022, Special Issue Editor, "Mathematical Methods for Computer Science" in Mathematics (JCR Q1)
- 2020/10/30 - 11/01, 2020 International Conference on Security and Privacy in Digital Economy, Section Chair
- 2020/10/30 - 11/01, 2018 IEEE International Conference on SMC, Special Section Chair
- 2023 - Now, IEEE Senior Member
🎓 Educations
- 2013.09 - 2016.06,
Ph.D., Department of Computer and Information Science, University of Macau
- 2011.09 - 2013.06,
M.S., Department of Computer and Information Science, University of Macau
- 2007.09 - 2011.06,
B.S., Department of Software Engineering, Chongqing University
💻 Research Experience
- 2024.01 - Now, Professor, School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen
- 2018.03 - 2023.12, Associate Professor, School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen
- 2016.11 - 2018.03, Assistant Professor, School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School
- 2010.10 - 2011.04, Research Intern, New Tech Department, Hewlett Packard
📝 Publications
- Mingyang Song, Zhongyun Hua*, Yifeng Zheng, Tao Xiang, Guoai Xu, Xingliang Yuan,"Assuring Certified Database Utility in Privacy-Preserving Database Fingerprinting", Proc. of 34th USENIX Security Symposium (USENIX Security), accepted, 2025.
- Shuangqing Xu, Yifeng Zheng*, Zhongyun Hua*,"Camel: Communication-Efficient and Maliciously Secure Federated Learning in the Shuffle Model of Differential Privacy", Proc. of ACM Conference on Computer and Communications Security (ACM CCS), pp. 243-257, 2024.
- Mingyang Song, Zhongyun Hua*, Yifeng Zheng, Tao Xiang, and Xiaohua Jia, “SimLESS: A Secure Deduplication System over Similar Data in Cloud Media Sharing”, IEEE Transactions on Information Forensics and Security, vol. 19, pp. 4700-4715, 2024. [doi][pdf]
- Huajie Ouyang, Yifeng Zheng, Songlei Wang, and Zhongyun Hua,"OblivTime: Oblivious and Efficient Interval Skyline Query Processing over Encrypted Time-Series Data", IEEE Transactions on Services Computing, in press, 2025.
- Zhongyun Hua, Yan, Tong, Yifeng Zheng*, Yuhong Li, and Yushu Zhang, “PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the Dark”, IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3644-3658, 2024.[doi][pdf]
- Zhongyun Hua, Yufei, Yao, Mingyang Song, Yifeng Zheng*, Yushu Zhang, and Cong Wang, “Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service”, IEEE Transactions on Services Computing, vol. 17, no. 3, pp. 821-835, 2024.[doi][pdf]
- Weibo Wang, Yifeng Zheng*, Songlei Wanga, Zhongyun Hua, Lei Xub, and Yansong Gao, “BopSkyline: Boosting Privacy-Preserving Skyline Query Service in the Cloud”, Computer & Security, vol. 14, 2024.[doi][pdf]
- Yifeng Zheng, Weibo Wang, Songlei Wang, Zhongyun Hua*, and Yansong Gao, “ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud”, IEEE Transactions on Services Computing, accepted, 2024.
- Yifeng Zheng*, Tianchen Xiong, Huajie Ouyang, Songlei Wang, Zhongyun Hua, Yansong Gao,"SARA: A Sparsity-Aware Efficient Oblivious Aggregation Service for Federated Matrix Factorization", in International Conference on Web Information Systems Engineering, 2025.
- Bo Fang, Zhongyun Hua, Hejiao Huang, "Locality-Sensitive Hashing Scheme Based on Heap Sort of Hash Bucket," in 2019 14th International Conference on Computer Science & Education (ICCSE), 5-10, Toronto, Canada, 2019.08.19-2019.08-21. [pdf] [BibTeX]
- 佟岩, 花忠云*, 廖清, 张玉书, “基于秘密共享的安全命名实体识别推理方法“, 网络与信息安全学报, accepted, 2024.
- Yifeng Zheng, Menglun Zhou, Songlei Wang, Zhongyun Hua*, Jinghua Jiang, and Yansong Gao, “Privacy-Preserving Competitive Detour Tasking in Spatial Crowdsourcing”, IEEE Transactions on Services Computing, accepted, 2024.
- Mingyang Song, Zhongyun Hua*, Yifeng Zheng, Tao Xiang, and Xiaohua Jia, “Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud”, IEEE Transactions on Dependable and Secure Computing, 2023
- Mingyang Song, Zhongyun Hua*, Yifeng Zheng, Hejiaog Huang, Xiaohua Jia, “LSDedup: Layered Secure Deduplication for Cloud Storage”, IEEE Transactions on Computers, 2023
- Mingyang Song, Zhongyun Hua*, Yifeng Zheng, Tao Xiang, Xiaohua Jia, "FCDedup: A Two-Level Deduplication System for Encrypted Data in Fog Computing", IEEE Transactions on Parallel and Distributed Systems, vol. 34, no. 10, pp. 2642-2656, 2023. [doi][pdf]
- Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, Zhongyun Hua*, "Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables", IEEE Transactions on Services Computing, vol. 16, no. 5, pp. 3604-3620, 2023. [doi][pdf]
- Menglun Zhou, Yifeng Zheng*, Songlei Wang, Zhongyun Hua, Hejiao Huang, Yansong Gao, Xiaohua Jia, "PPTA: A location privacy-preserving and flexible task assignment service for spatial crowdsourcing", Computer Networks, vol. 224, pp. 109600, 2023. [doi][pdf]
- Zhongyun Hua*, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, Xinpeng Zhang, "Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images", IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 3669-3686, 2023. [doi][pdf]
- Xingyu Liu, Zhongyun Hua*, Shuang Yi, Yushu Zhang, Yicong Zhou, "Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images", ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 20, no. 5, 2024. [doi][pdf]
- Zhongyun Hua, Xingyu Liu, Yifeng Zheng, Shuang Yi*, Yushu Zhang, "Reversible Data Hiding over Encrypted Images via Preprocessing-Free Matrix Secret Sharing", IEEE Transactions on Circuits and Systems for Video Technology, vol. 34, no. 3, pp. 1799-1814, 2024. [doi][pdf]
- Yongyong Chen, Lei Cheng, Zhongyun Hua*, Shuang Yi, "Laplacian Regularized Deep Low-Rank Subspace Clustering Network", Applied Intelligence, vol. 53, no. 19, 2023. [doi][pdf]
- Zhongyun Hua, Yanxiang Wang, Shuang Yi*, Yicong Zhou, Xiaohua Jia, "Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing", IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 8, pp. 4968–4982, 2022. [doi][pdf]
- Zhongyun Hua, Ziyi Wang, Yifeng Zheng, Yongyong Chen, Yuanman Li*, "Enabling Large-Capacity Reversible Data Hiding over Encrypted JPEG Bitstreams", IEEE Transactions on Circuits and Systems for Video Technology, vol. 33, no. 3, pp. 1003–1018, 2023. [doi][pdf]
- Mingyang Song, Zhongyun Hua*, Yifeng Zheng, Hejiao Huang, Xiaohua Jia, "Blockchain-Based Deduplication and Integrity Auditing over Encrypted Cloud Storage", IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 6, pp. 4928-4945, 2023. [doi][pdf]
- Shuang Yi, Juan Zhou, Zhongyun Hua, Yong Xiang, "Reversible data hiding method in encrypted images using secret sharing and Huffman coding," in 2021 11th International Conference on Information Science and Technology (ICIST), Sichuan, China, 2021.05.21-2021.05.23. [pdf] [BibTeX]
- 李忠文, 丁烨, 花忠云, 李君一, 廖清*, “结合三元组重要性的知识图谱补全模型”, 计算机科学, 2020
- Enji Liang, Kuiyuan Zhang, Zhongyun Hua*, Yuanman Li, and Xiaohua Jia, "TransCMFD: An adaptive transformer for copy-move forgery detection", Neurocomputing, accepted, 2025.
- Yushu Zhang , Zixuan Yang , Tao Wang , Zhongyun Hua, and Jian Weng, "Tailor-made Face Privacy Protection via Class-wise Targeted Universal Adversarial Perturbations", IEEE Transactions on Dependable and Secure Computing, accepted, 2025.
- Enji Liang, Kuiyuan Zhang, Zhongyun Hua*, and Xiaohua Jia, "BASNet: Boundary Assisted Network for Image Splicing Forgery Detection", IEEE Transactions on Multimedia, accepted, 2025.
- Xiangli Xiao, Yushu Zhang, Zhongyun Hua, Zhihua Xia, and Jian Weng,"Preview Helps Selection: Previewable Image Watermarking with Client-Side Embedding", IEEE Transactions on Dependable and Secure Computing, accepted, 2025.
- Tao Wang, Yushu Zhang, Xiangli Xiao, Zhongyun Hua, Wenying Wen, and Yuming Fang,"Beyond Privacy: Generating Privacy-Preserving Faces Supporting Robust Image Authentication", IEEE Transactions on Information Forensics and Security, accepted, 2025.
- Yushu Zhang, Yuanyuan Sun, Shuren Qi, Zhongyun Hua, Wenying Wen, and Yuming Fang,"Atkscopes: Multiresolution Adversarial Perturbation as a Unified Attack on Perceptual Hashing and Beyond", Proc. of 34th USENIX Security Symposium (USENIX Security), accepted, 2025.
- Kuiyuan Zhang, Zhongyun Hua*, Yushu Zhang, Yifang Guo, and Tao Xiang,"Robust AI-Synthesized Speech Detection Using Feature Decomposition Learning and Synthesizer Feature Augmentation", IEEE Transactions on Information Forensics and Security, vol. 20, pp. 871-885, 2025.
- Kuiyuan Zhang, Zhongyun Hua*, Rushi Lan, Yifang Guo, Yushu Zhang, Guoai Xu,"Multi-View Collaborative Learning Network for Speech Deepfake Detection", Proc. of Thirty-Ninth AAAI Conference on Artificial Intelligence (AAAI), 2025.
- Kuiyuan Zhang, Zhongyun Hua*, Rushi Lan, Yushu Zhang, Yifang Guo,"Phoneme-Level Feature Discrepancies: A Key to Detecting Sophisticated Speech Deepfakes", Proc. of Thirty-Ninth AAAI Conference on Artificial Intelligence (AAAI), 2025.
- Ruoyu Zhao, Yushu Zhang, Rushi Lan, Shuang Yi, Zhongyun Hua, and Jian Weng, "All Roads Lead to Rome: Achieving 3D Object Encryption through 2D Image Encryption Methods", IEEE Transactions on Image Processing, accepted, 2025.
- Yuhang Zhou, Yushu Zhang, Leo Yu Zhang, Zhongyun Hua*,"DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group", Proc. of 32nd ACM International Conference on Multimedia (ACM MM), 2024.
- Zixuan Yang, Yushu Zhang*, Tao Wang, Zhongyun Hua, Zhihua Xia, Jian Weng,"Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils", Proc. of 32nd ACM International Conference on Multimedia (ACM MM), 2024.
- Linshan Hou, Ruili Feng, Zhongyun Hua*, Wei Luo, Leo Yu Zhang, Yiming Li*,"IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency", Proc. of Forty-first International Conference on Machine Learning (ICML), 2024.
- Yuhang Zhou, Zhongyun Hua*, "Defense without Forgetting: Continual Adversarial Defense with Anisotropic & Isotropic Pseudo Replay", Proc. of IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR), 2024.
- Qiuyu Duan, Zhongyun Hua*, Qing Liao, Yushu Zhang, LEO Yu Zhang, "Conditional Backdoor Attack via JPEG Compression", Proc. of Thirty-Eighth AAAI Conference on Artificial Intelligence (AAAI), 2024.
- Zeming Hou, Zhongyun Hua,Kuiyuan Zhang, Yushu Zhang, "CDNet: Cluster Decision for Deepfake Detection Generalization" Proc. of 2023 IEEE International Conference on Image Processing (ICIP), 2023. [pdf][BibTeX]
- Jinhao Cui, Heyan Chai, Yanbin Gong, Ye Ding, Zhongyun Hua,Cuiyun Gao, Qing Liao, "MocGCL: Molecular Graph Contrastive Learning via Negative Selection" Proc. of 2023 International Joint Conference on Neural Networks (IJCNN). [pdf] [BibTeX]
- Zhibin Zheng, Zhongyun Hua, Leo Yu Zhang, "Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers," Proc. of 29th International Conference on Neural Information Processing (ICONIP 2022), IIT Indore, India, November 22-26, 2022. [pdf] [BibTeX]
- Lei Chen, Yongyong Chen, Zhongyun Hua, "Deep Contrastive Multi-view Subspace Clustering," Proc. of 29th International Conference on Neural Information Processing (ICONIP 2022), IIT Indore, India, November 22-26, 2022. [pdf] [BibTeX]
- Jiaxiang You, Yuanman Li, Jiantao Zhou, Zhongyun Hua, Weiwei Sun, Xia Li, "A Transformer based Approach for Image Manipulation Chain Detection," Proc. of 29th ACM International Conference on Multimedia (ACMMM), Chengdu, China, October, 20-24 2021. [pdf] [BibTeX]
- Enji Liang, Kuiyuan Zhang, Zhongyun Hua*, and Xiaohua Jia, "Multi-Scale Feature Attention Fusion for Image Splicing Forgery Detection", ACM Transactions on Multimedia Computing, Communications, and Applicationsy, in press, 2024.
- 段秋宇, 候琳珊, 花忠云*, 廖清, 张玉书, 张瑜, “基于模型操作的单参数后门攻击”, 网络与信息安全学报, accepted, 2024.
- Kuiyuan Zhang, Zeming Hou, Zhongyun Hua*, Yifeng Zheng, and Leo Yu Zhang, "Boosting Deepfake Detection Generalizability via Expansive Learning and Confidence Judgement", IEEE Transactions on Circuits and Systems for Video Technology, in press, 2024.
- Tao Wang, Yushu Zhang*, Zixuan Yang, Xiangli Xiao, Hua Zhang, Zhongyun Hua, "MSeeing is not believing: An identity hider for human vision privacy protection", IEEE Transactions on Biometrics, Behavior, and Identity Science, in press, 2024.
- Linshan Hou, Zhongyun Hua*, Yuhong Li, Yifeng Zheng, and Leo Yu Zhang, "M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models", IEEE Transactions on Circuits and Systems for Video Technology, in press, 2024.
- Yuanman Li, Lanhao Ye, Haokun Cao, Wei Wang, Zhongyun Hua*, "Cascaded Adaptive Graph Representation Learning for lmage Copy-Move Forgery Detection", ACM Transactions on Multimedia Computing, Communications, and Applications, in press, 2024.
- Xiangli Xiao, Yushu Zhang*, Zhongyun Hua, Zhihua Xia, Jian Weng, "Client-Side Embedding of Screen-Shooting Resilient Image Watermarking", IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5357-5372, 2024. [doi][pdf]
- Kuiyuan Zhang, Zhongyun Hua*, Yuanman Li, Yushu Zhang, Yicong Zhou, “Uformer-ICS: A U-Shaped Transformer for Image Compressive Sensing Service”, IEEE Transactions on Services Computing, 2023
- Jiahao Zhao, Yushu Zhang*, Jiajia Jiang, Zhongyun Hua, Yong Xiang, “A secure dynamic cross-chain decentralized data consistency verification model”, Journal of King Saud University-Computer and Information Sciencesg, vol. 36, no. 1, 2024
- Xiangli Xiao, Yushu Zhang*, Leo Yu Zhang, Zhongyun Hua, Zhe Liu, Jiwu Huang, "FairCMS: Cloud Media Sharing with Fair Copyright Protection", IEEE Transactions on Computational Social Systems, in press, 2024.
- 祁树仁,张玉书*,薛明富,花忠云, "面向多畸变稳健性的图像归因算法", 信息网络安全, no. 4, pp. 30-28, 2023.
- Yushu Zhang, Nuo Chen, Shuren Qi*, Mingfu Xue, Zhongyun Hua, "Detection of Recolored Image by Texture Features in Chrominance Components", ACM Transactions on Multimedia Computing, Communications and Applications, vol. 19, no. 3, pp 1-23, 2023. [doi][pdf]
- Xuanqi Zhang, Qiangqiang Shen, Yongyong Chen*, Zhongyun Hua, Jingyong Su, "Multi-View Ensemble Clustering via Low-Rank and Sparse Decomposition: from Matrix to Tensor", ACM Transactions on Knowledge Discovery from Data, vol. 17, no. 103, pp 1-19, 2023. [doi][pdf]
- Kuiyuan Zhang, Zhongyun Hua*, Yuanman Li, Yongyong Chen, Yicong Zhou, "AMS-Net: Adaptive Multi-Scale Network for Image Compressive Sensing", IEEE Transactions on Multimedia, vol. 25, pp. 5676-5689, 2023. [doi][pdf]
- Zhongyun Hua*, Kuiyuan Zhang, Yuanman Li, Yicong Zhou, "Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing", Signal Processing, vol. 183, article no. 107998, 2021. [doi]
- Zhongyun Hua, Shuang Yi, Yicong Zhou, "Medical image encryption using high-speed scrambling and pixel adaptive diffusion", Signal Processing, vol. 144, pp. 134-144, 2018. [ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX] [Code]
- Zhongyun Hua, Fan Jin, Binxuan Xu, Hejiao Huang, "2D Logistic-Sine-Coupling Map for Image Encryption", Signal Processing, vol. 149, pp. 148-161, 2018. [Most Cited in SIGPRO] [Most downloaded in SIGPRO] [ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX] [Code]
- Ruoyu Zhao, Yushu Zhang, Rushi Lan, Zhongyun Hua, Yong Xiang, "Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT", IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2630-2645, 1 Feb.1, 2023. [doi][pdf]
- Yushu Zhang, Zhibin Fu, Shuren Qi, Mingfu Xue, Zhongyun Hua, Yong Xiang, "Localization of Inpainting Forgery With Feature Enhancement Network", IEEE Transactions on Big Data, vol. 9, no. 3, pp. 936-948, 2023. [doi][pdf]
- Zhongyun Hua*, Zhihua Zhu, Shuang Yi, Zheng Zhang, Hejiao Huang, "Cross-plane colour image encryption using a two-dimensional logistic tent modular map", Information Sciences, vol. 546, pp. 1063-1083, 2021. [ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX] [Code]
- Zhongyun Hua*, Zhihua Zhu, Yongyong Chen, and Yuanman Li, "Color image encryption using orthogonal Latin squares and a new 2D chaotic system", Nonlinear Dynamics, vol. 104, pp. 4505-4522, 2021. [ESI 1% Highly Cited Paper] [doi] [Code]
- Zhongyun Hua, Jiaxin Li, Yuanman Li, Yongyong Chen*, "Image Encryption Using Value-Differencing Transformation and Modified ZigZag Transformation", Nonlinear Dynamics, vol. 106, pp. 3583-3599, 2021. [ESI 1% Highly Cited Paper] [doi][pdf]
- Zhongyun Hua*, Jiaxin Li, Yongyong Chen, Shuang Yi, "Design and application of an S-box using complete Latin square", Nonlinear Dynamics, vol. 104, pp. 807–825, 2021. [doi] [Code]
- Yongyong Chen, Shuqin Wang, Xiaolin Xiao, Youfa Liu*, Zhongyun Hua*, Yicong Zhou, "Self-paced Enhanced Low-rank Tensor Kernelized Multi-view Subspace Clustering", IEEE Transactions on Multimedia, vol. 24, pp. 4054-4066, 2022. [doi]
- Yongyong Chen, Xiaolin Xiao, Zhongyun Hua, Yicong Zhou, "Adaptive Transition Probability Matrix Learning for Multi-view Spectral Clustering", IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 9, pp. 4712-4726, Sept. 2022. [doi]
- Yuchao Su, Jie Du, Yuanman Li, Xia Li, Rongqin Liang, Zhongyun Hua, Jiantao Zhou, "Trajectory Forecasting Based on Prior-Aware Directed Graph Convolutional Neural Network", IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 16773-16785, Sept. 2022. [doi]
- Jie Zhao, Hejiao Huang*, Chonglin Gu, Zhongyun Hua, Xiaojun Zhang, "Blockchain-Assisted Conditional Anonymity Privacy-Preserving Public Auditing Scheme with Reward Mechanism", IEEE Systems Journal, vol. 16, no. 3, pp. 4477-4488, Sept. 2022. [doi]
- BAO Han, HUA ZhongYun, LIU WenBo and BAO BoCheng, and Xi Zhang, "Discrete memristive neuron model and its interspike interval-encoded application in image encryption", Science China Technological Sciences, vol. 64, pp. 2281-2291, 2021. [doi]
- Zhongyun Hua, Binxuan Xu, Fan Jin, Hejiao Huang, "Image Encryption Using Josephus Problem and Filtering Diffusion", IEEE Access, vol. 7, pp. 8660 - 8674, 2019. [IF: 3.557/2017, JCR: Q1]. [doi] [pdf] [BibTeX] [Code]
- Zhongyun Hua*, Yicong Zhou, Hejiao Huang, "Cosine-transform-based chaotic system for image encryption", Information Sciences, vol. 480, pp. 403 - 419, 2019. [Most Cited in INS] [Most downloaded in INS] [ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX] [Code]
- Shuang Yi, Yicong Zhou, Zhongyun Hua, "Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion", Signal Processing: Image Communication, vol. 64, pp. 78-88, 2018. [pdf] [BibTeX]
- Zhongyun Hua, Yicong Zhou, "Design of image cipher using block-based scrambling and image filtering," Information Sciences, vol. 396, pp. 97-113, 2017. [IF: 4.832/2016, JCR: Q1] [doi] [pdf] [BibTeX] [Code]
- Yongyong Chen, Shuqin Wang, Chong Peng, Zhongyun Hua*, and Yicong Zhou, "Generalized Nonconvex Low-Rank Tensor Approximation for Multi-View Subspace Clustering", IEEE Transactions on Image Processing, vol. 30, pp. 4022-4035, 2021. [doi]
- Xiaolin Xiao, Yuejiao Gong, Zhongyun Hua*, Weineng Chen, "On Reliable Multi-View Affinity Learning for Subspace Clustering", IEEE Transactions on Multimedia, vol. 23, pp. 4555-4566, 2021. [doi]
- Binxuan Xu, Zhongyun Hua, Hejiao Huang, "A novel image encryption scheme using Josephus permutation and image filtering" in 9th International Symposium on Cyberspace Safety and Security (CSS 2017), 2017, pp. 307-319. [pdf] [BibTeX]
- Zhongyun Hua, Yicong Zhou, "Image encryption using 2D Logistic-adjusted-Sine map," Information Sciences, vol. 339, pp. 237–253, 2016. [ [Most Cited in INS] [ ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX] [Code]
- Zhongyun Hua, Yicong Zhou, Chi-Man Pun, C. L. Philip Chen, "2D Sine Logistic modulation map for image encryption," Information Sciences, vol. 297, pp. 80–94, 2015. [ [Most Cited in INS] [ ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX] [Code]
- Zhongyun Hua, Binghang Zhou, Yicong Zhou, " Image content-based encryption algorithm using high-dimensional chaotic system," in 2015 International Symposium on Nonlinear Theory and its Applications (NOLTA2015), 2015, pp. 554-557. [pdf] [BibTeX]
- Zhongyun Hua, Yiran Wang, Yicong Zhou, “Image cipher using a new interactive two-dimensional chaotic map,” in 2015 IEEE International Conference on Systems, Man and Cybernetics (SMC), 2015, pp. 1804-1808. (EI) [pdf] [BibTeX]
- Zhongyun Hua, Yicong Zhou, Chi-Man Pun, C. L. Philip Chen, “Image encryption using 2D Logistic-Sine chaotic map,” in 2014 IEEE International Conference on Systems, Man and Cybernetics (SMC), 2014, pp. 3229-3234. (EI) [pdf] [BibTeX]
- Zhongyun Hua, Zihua Wu, Yinxing Zhang*, Han Bao, Yicong Zhou, "MTwo-Dimensional Cyclic Chaotic System for Noise-Reduced OFDM-DCSK Communication", IEEE Transactions on Circuits and Systems I: Regular Papers , in press, 2024.
- Bocheng Bao, Haigang Tang, Han Bao*, Zhongyun Hua, Quan Xu, and Mo Chen, IEEE Transactions on Industrial Electronics , 2024.
- Han Bao, Yuanhui Su, Zhongyun Hua, Mo Chen, Senior, and Bocheng Bao*, "Two-Dimensional Bounded Chaotic System With Hardware Implementation", IEEE Transactions on Industrial Electronics , 2024.
- Zhongyun Hua, Jinhui Yao, Yinxing Zhang, Han Bao, Shuang Yi*, "Two-Dimensional Coupled Complex Chaotic Map", IEEE Transactions on Industrial Informatics , 2024.
- Han Bao, Yuanhui Su, Zhongyun Hua, Quan Xu, Bocheng Bao*, "Two-Dimensional Threshold Hyperchaotic Map and Application in Timed One-Time Password", IEEE Transactions on Industrial Informatics , 2024.
- Han Bao, Yuanhui Su, Zhongyun Hua, Mo Chen, Quan Xu, Bocheng Bao*, "Grid Homogeneous Coexisting Hyperchaos and Hardware Encryption for 2-D HNN-Like Map", IEEE Transactions on Circuits and Systems I: Regular Papers , 2024.
- Yinxing Zhang, Zhongyun Hua*, Han Bao, Hejiao Huang, "Multi-Valued Model for Generating Complex Chaos and Fractals", IEEE Transactions on Circuits and Systems I: Regular Papers , vol. 71, no. 6, pp. 2783-2796, 2024.
- ChenLong Yi, ChunBiao Li*, YongXin Li, Ming Xia, ZhongYun Hua, "Modifying Lyapunov exponent of chaotic map by self-cascading", Science China Technological Science , in press, 2024.
- Zihua Wu, Yinxing Zhang, Han Bao, Rushi Lan, Zhongyun Hua*, "nD-CS: A Circularly Shifting Chaotic Map Generation Method", Chaos, Solitons and Fractals , vol. 181, 2024. [doi][pdf]
- GU Yang, BAO Han*, YU XiHong, HUA ZhongYun, BAO BoCheng, XU Quan, "Hybrid tri-memristor hyperchaotic map and application in Wasserstein Generative Adversarial Nets", Science China Technological Sciences , 2024. [doi]
- Han Bao, Zhuowu Wang, Zhongyun Hua, Xihong Yu, Quan Xu, and Bocheng Bao*, "Initial-Offset-Control Coexisting Hyperchaos in Two-Dimensional Discrete Neuron Model", IEEE Transactions on Industrial Informatics , vol. 20, no. 3, pp. 4784-4794, 2024. [doi][pdf]
- Han Bao, KeXin Li, Jun Ma, Zhongyun Hua, Quan Xu, BoCheng Bao, "Memristive effects on an improved discrete Rulkov neuron model", Science China Technological Sciences , vol. 66, pp. 3153-3163, 2023. [doi]
- Yongxin Li, Chunbiao Li, Sicong Liu Zhongyun Hua, Haibo Jiang, "A 2-D Conditional Symmetric Hyperchaotic Map With Complete Control", Nonlinear Dynamics, vol. 109, no. 2, pp. 1155-1165, 2022. [doi]
- Yinxing Zhang, Zhongyun Hua*, Han Bao, Hejiao Huang, Yicong Zhou, "Generation of n-Dimensional Hyperchaotic Maps Using Gershgorin-Type Theorem and Its Application", IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 53, no. 10, pp. 6516-6529, Oct. 2023. [doi][pdf]
- Bocheng Bao, Zhuowu Wang, Zhongyun Hua, Mo Chen, Han Bao*, "Regime transition and multi-scroll hyperchaos in a discrete neuron model", Nonlinear Dynamics, vol. 111, pp. 13499-13512, 2023. [doi]
- Yinxing Zhang, Zhongyun Hua*, Han Bao, Hejiao Huang, Yicong Zhou, "An n-Dimensional Chaotic System Generation Method Using Parametric Pascal Matrix", IEEE Transactions on Industrial Informatics, vol. 18, no. 12, pp. 8434-8444, Dec. 2022. [doi]
- Yinxing Zhang, Han Bao, Zhongyun Hua*, Hejiao Huang, "Two-Dimensional Exponential Chaotic System With Hardware Implementation", IEEE Transactions on Industrial Electronics, vol. 70, no. 9, pp. 9346-9356, Sept. 2023. [doi]
- Weijia Cao, Hang Cai, Zhongyun Hua*, "n-Dimensional Chaotic Map with Application in Secure Communication", Chaos Solitons & Fractals,, Vol. 163, artcle no. 112519, 2022. [doi] [pdf]
- Zhongyun Hua*, Yinxing Zhang, Han Bao*, Hejiao Huang, and Yicong Zhou, "n-Dimensional Polynomial Chaotic System With Applications", IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 69, no. 2, pp. 784-797, 2022. [doi][pdf]
- Zhongyun Hua, Yongyong Chen, Han Bao, Yicong Zhou, "Two-Dimensional Parametric Polynomial Chaotic System", IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 7, pp. 4402-4414, 2022. [doi]
- Zhongyun Hua, Yicong Zhou, "Exponential Chaotic Model for Generating Robust Chaos", IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 54, no. 6, pp. 3713-3724, 2021. [ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX]
- Jianming Cai, Han Bao, Quan Xu, Zhongyun Hua, Bocheng Bao, "Smooth nonlinear fitting scheme for analog multiplierless implementation of Hindmarsh–Rose neuron model", Nonlinear Dynamics, vol. 104, pp. 4379-4389, 2021. [doi]
- Han Bao, Zhongyun Hua, Ning Wang, Lei Zhu, Mo Chen, Bo-Cheng Bao, "Initials-Boosted Coexisting Chaos in a 2-D Sine Map and Its Hardware Implementation", IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 1132-1140, 2021. [ESI 1% Highly Cited Paper] [doi] [BibTeX]
- Zhongyun Hua*, Yinxing Zhang, Yicong Zhou, "Two-Dimensional Modular Chaotification System for Improving Chaos Complexity", IEEE Transactions on Signal Processing, vol. 68, pp. 1937-1949, 2020. [ESI 1% Highly Cited Paper] (2021.11-2022.1) [doi] [BibTeX]
- Zhongyun Hua*, Binghang Zhou, Yinxing Zhang, Yicong Zhou, "Modular Chaotification Model with FPGA Implementation", Science China Technological Sciences, vol.64, pp. 1472-1484, 2021. [doi] [BibTeX]
- Zhongyun Hua*, Yicong Zhou, Bocheng Bao, "Two-Dimensional Sine Chaotification System with Hardware Implementation", IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 887-897, 2020. [ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX]
- Zhongyun Hua*, Binghang Zhou, Yicong Zhou, "Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation", IEEE Transactions on Industrial Electronics, vol. 66, no. 2, pp. 1273 - 1284, 2019. [ESI 1% Highly Cited Paper] [doi] [pdf] [BibTeX]
- Zhongyun Hua, Binghang Zhou, Yicong Zhou, "Sine-Transform-Based Chaotic System with FPGA Implementation", IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2557 - 2566, 2018. [ESI 1% Highly Cited Paper] (2019.11 - 2020.1) [doi] [pdf] [BibTeX]
- Zhongyun Hua, Yicong Zhou, "One-Dimensional Nonlinear Model for Producing Chaos", IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 65, no. 1, pp. 235 - 246, 2018. [doi] [pdf] [BibTeX]
- Zhongyun Hua, Shuang Yi, Yicong Zhou, Chengqing Li, Yue Wu, "Designing hyperchaotic Cat maps with any desired number of positive Lyapunov exponents", IEEE Transactions on Cybernetics, vol. 48, no. 2, pp. 463 - 473, 2018. [ESI 1% Highly Cited Paper] (2018.11 - 2019.1) [doi] [pdf] [BibTeX]
- Yue Wu, Zhongyun Hua, Yicong Zhou, "n-dimensional Discrete Cat Map Generation using Laplace Expansions," IEEE Transactions on Cybernetics, vol. 46, no. 11, pp. 2622 - 2633, 2016. [doi] [pdf] [BibTeX]
- Zhongyun Hua, Yicong Zhou, "Dynamic parameter-control chaotic system," IEEE Transactions on Cybernetics, vol. 46, no. 12, pp. 3330 - 3341, 2016. [doi] [pdf] [BibTeX]
- Yicong Zhou (Supervisor), Zhongyun Hua, Chi-Man Pun, C. L. Philip Chen, "Cascade chaotic system with applications," IEEE Transactions on Cybernetics, vol. 45, no. 9, pp. 2001-2012, 2015. [doi] [pdf] [BibTeX] [Code]
- Han Bao, Zhongyun Hua*, Houzhen Li, Mo Chen, Bocheng Bao, "Discrete Memristor Hyperchaotic Maps", IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 68, no. 11, pp. 4534-4544, Nov. 2021. [doi]
- Han Bao, Houzhen Li, Zhongyun Hua, Quan Xu, Bo-Cheng Bao*, "Sine-Transform-Based Memristive Hyperchaotic Model with Hardware Implementation", IEEE Transactions on Industrial Informatics, vol. 19, no. 3, pp. 2792-2801, March 2023. [doi]
- Kexin Li, Han Bao, Houzhen Li, Jun Ma, Zhongyun Hua*, Bo-Cheng Bao, "Memristive Rulkov Neuron Model with Magnetic Induction Effects", IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1726-1736, March 2022. [doi]
- Han Bao, Zhongyun Hua, Houzhen Li, Mo Chen, Bo-Cheng Bao*, "Memristor-Based Hyperchaotic Maps and Application in Auxiliary Classifier Generative Adversarial Nets", IEEE Transactions on Industrial Informatics, vol. 18, no. 8, pp. 5297-5306, 2022. [doi]
- Houzhen Li, Zhongyun Hua*, Han Bao, Lei Zhu, Mo Chen, Bocheng Bao, "Two-Dimensional Memristive Hyperchaotic Maps and Application in Secure Communication", IEEE Transactions on Industrial Electronics, vol. 68, no. 10, pp. 9931-9940, 2021. [ ESI 1% Highly Cited Paper] [doi] [BibTeX]
- Bocheng Bao, Kang Rong, Houzhen Li , IEEE, Kexin Li, Zhongyun Hua, and Xi Zhang, "Memristor-Coupled Logistic Hyperchaotic Map", IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 68, no. 8, pp. 2992-2996, 2021. [doi]
- Kang Rong, Han Bao, Houzhen Li, Zhongyun Hua, Bocheng Bao*, "Memristive Hénon map with hidden Neimark–Sacker bifurcations", Nonlinear Dynamics, vol. 108, pp. 4459-4470, 2022. [doi]
- Hang Cai, Zhongyun Hua, Hejiao Huang, "A Novel Differential-Chaos-Shift-Keying Secure Communication Scheme" in 2018 IEEE International Conference on Systems, Man and Cybernetics (SMC 2018), 2018, pp. 1794-1798, Miyazaki, Japan, 2018.10.7-2018.10.10. [pdf] [BibTeX]
- Zhongyun Hua, Yicong Zhou, Chi-Man Pun, C. L. Philip Chen, “A new 1D parameter-control chaotic framework,” in Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014. Proc. SPIE 9030, 2014, pp. 90300M-1–90300M-10.(EI) [pdf] [BibTeX]
- Zhongyun Hua, Yicong Zhou, C. L. Philip Chen, “A new series-wound framework for generating 1D chaotic maps,” in 2013 IEEE Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE), 118–123 (2013). (EI) [pdf] [BibTeX]
Applied Cryptography:
Multimedia Security, Multimedia Forensics, and AI Security:
Nonlinear Systems and Applications:
➿ Peer Review
Program Committee Member
🏅 Honours and Recognitions
IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 1132-1140, 2021.
IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 887-897, 2020.
IEEE Transactions on Industrial Informatics, vol. 66, no. 2, pp. 1273-1284, 2019.
IEEE Transactions on Industrial Informatics, vol. 68, no. 10, pp. 9931-9940, 2021.
IEEE Transactions on Industrial Informatics, vol. 65, no. 3, pp. 2557-2566, 2018. (2019.11 - 2020.1)
IEEE Transactions on Signal Processing, vol. 68, pp. 1937-1949, 2020. (2021.11-2022.1)
IEEE Transactions on cybernetics, vol. 45, no. 9, pp. 2001-2012, 2014.
IEEE Transactions on Industrial Electronics, vol. 66, no. 2, pp. 1273-1284, 2018.
IEEE Transactions on Industrial Electronics, vol. 65, no. 3, pp. 2557-2566, 2017.
Nonlinear Dynamics, vol. 104, no. 4, 4505-4522, 2021.
Information Sciences, vol. 546, pp. 1063-1083, 2021.
Information Sciences, vol. 480, pp. 403-419, 2019.
Information Sciences, vol. 396, pp. 97-113, 2017.
Information Sciences, vol. 297, pp. 80–94, 2015.
Information Sciences, vol. 339, pp. 237–253, 2016.
Signal Processing, vol. 183, pp. 107998, 2021.
Signal Processing, vol. 149, pp. 148-161, 2018.
Signal Processing, vol. 144, pp. 134-144, 2018.
Information Sciences, vol. 480, pp. 403-419, 2019.
Information Sciences, vol. 339, pp. 237–253, 2016. (2019)
Information Sciences, vol. 297, pp. 80–94, 2015. (2019)
Signal Processing, vol. 149, pp. 148-161, 2018.
Information Sciences, vol. 480, pp. 403-419, 2019.
Signal Processing, vol. 149, pp. 148-161, 2018. (2018-2019)
🔍 Research Grants (Selected)
- Research on high-dimensional robust chaos mechanism and its application in generative adversarial network, the National Natural Science Foundation of China, 62071142, 2021.01-2020.24, PI (570K CNY).
- High-Dimensional Chaos Theory with Application in Secure Communication, the Guangdong Basic and Applied Basic Research Foundation, 2021A1515011406, 2021.1-2023.12, PI (100 K CNY).
- Research on Designing New Chaotic Systems with Robust Chaos and Their Applications, the National Natural Science Foundation of China, 61701137, 2018.01-2020.12, PI (260K CNY).