K.T Lo
Affiliations: | Hong Kong Polytechnic University (Hong Kong) |
Area:
Electronics and Electrical EngineeringGoogle:
"K.T Lo"Children
Sign in to add traineeKing M. Ho | grad student | 2008 | Hong Kong Polytechnic University (Hong Kong) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Li P, Lo K. (2019) Joint image encryption and compression schemes based on 16 × 16 DCT Journal of Visual Communication and Image Representation. 58: 12-24 |
Li P, Lo K. (2018) A Content-Adaptive Joint Image Compression and Encryption Scheme Ieee Transactions On Multimedia. 20: 1960-1972 |
Li P, Lo K. (2017) Joint image compression and encryption based on order-8 alternating transforms Journal of Visual Communication and Image Representation. 44: 61-71 |
Cai Q, Lo K. (2013) Two Blocks Are Enough: On the Feasibility of Using Network Coding to Ameliorate the Content Availability of BitTorrent Swarms Ieee Transactions On Parallel and Distributed Systems. 24: 1682-1694 |
Ho K, Poon W, Lo K. (2010) An Evolutionary Video Assignment Optimization Technique for VOD System in Heterogeneous Environment International Journal of Digital Multimedia Broadcasting. 2010: 1-13 |
Li C, Li S, Lo K, et al. (2010) A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system Journal of Systems and Software. 83: 1443-1452 |
Guo H, Lo K, Qian Y, et al. (2009) Peer-to-Peer Live Video Distribution under Heterogeneous Bandwidth Constraints Ieee Transactions On Parallel and Distributed Systems. 20: 233-245 |
Ho K, Poon W, Lo K. (2009) Video-on-Demand Systems With Cooperative Clients in Multicast Environment Ieee Transactions On Circuits and Systems For Video Technology. 19: 361-373 |
Li S, Li C, Lo K, et al. (2008) Cryptanalyzing an Encryption Scheme Based on Blind Source Separation Ieee Transactions On Circuits and Systems I-Regular Papers. 55: 1055-1063 |
Li S, Li C, Chen G, et al. (2008) Cryptanalysis of the RCES/RSES image encryption scheme Journal of Systems and Software. 81: 1130-1143 |