Chuan Qin

According to our database1, Chuan Qin authored at least 140 papers between 2006 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Virtual-Subarray-Based Angle-of-Arrival Estimation in Analog Antenna Arrays.
IEEE Wirel. Commun. Lett., 2020

Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses.
TOS, 2020

An Enhanced Neural Network Approach to Person-Job Fit in Talent Recruitment.
ACM Trans. Inf. Syst., 2020

Shortening the Cover for Fast JPEG Steganography.
IEEE Trans. Circuits Syst. Video Techn., 2020

An improved first quantization matrix estimation for nonaligned double compressed JPEG images.
Signal Process., 2020

High-fidelity dual-image reversible data hiding via prediction-error shift.
Signal Process., 2020

Anti-compression JPEG steganography over repetitive compression networks.
Signal Process., 2020

A real-time reversible image authentication method using uniform embedding strategy.
J. Real Time Image Process., 2020

Efficient image noise estimation based on skewness invariance and adaptive noise injection.
IET Image Process., 2020

Adam revisited: a weighted past gradients perspective.
Frontiers Comput. Sci., 2020

A Survey on Knowledge Graph-Based Recommender Systems.
CoRR, 2020

Generic System Frequency Response Model for Power Grids With Different Generations.
IEEE Access, 2020

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network.
IEEE Access, 2020

Large-Scale Talent Flow Embedding for Company Competitive Analysis.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

QLACO: Q-learning Aided Ant Colony Routing Protocol for Underwater Acoustic Sensor Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

SetRank: A Setwise Bayesian Approach for Collaborative Ranking from Implicit Feedback.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Generalized Discrete-Time Equivalent Model for Representing Interfaces in Wide-Area Power Systems.
IEEE Trans. Smart Grid, 2019

$\alpha$ -Trimmed Weber Representation and Cross Section Asymmetrical Coding for Human Identification Using Finger Images.
IEEE Trans. Information Forensics and Security, 2019

Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting.
IEEE Trans. Circuits Syst. Video Techn., 2019

Correction to: Adaptive image camouflage using human visual system model.
Multim. Tools Appl., 2019

Adaptive image camouflage using human visual system model.
Multim. Tools Appl., 2019

Adaptive and dynamic multi-grouping scheme for absolute moment block truncation coding.
Multim. Tools Appl., 2019

Separable reversible data hiding in encrypted images based on scalable blocks.
Multim. Tools Appl., 2019

Reversible data hiding with differential compression in encrypted image.
Multim. Tools Appl., 2019

Additional articles of special issue on Real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

Special issue on real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer.
Inf. Sci., 2019

Effective reversible data hiding in encrypted image with adaptive encoding strategy.
Inf. Sci., 2019

Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection.
IEEE Access, 2019

Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation.
IEEE Access, 2019

Reversible Image Steganography Scheme Based on a U-Net Structure.
IEEE Access, 2019

Large-Scale Talent Flow Forecast with Dynamic Latent Factor Model?
Proceedings of the World Wide Web Conference, 2019

Angle-of-Arrival Acquisition and Tracking via Virtual Subarrays in an Analog Array.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

DuerQuiz: A Personalized Question Recommender System for Intelligent Job Interview.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

New Paradigm for Self-embedding Image Watermarking with Poisson Equation.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Direct Adversarial Attack on Stego Sandwiched Between Black Boxes.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Remote PMU Testing using Low-cost FPGA Platform and PPA following IEEE TSS.
Proceedings of the 2019 IEEE Industry Applications Society Annual Meeting, Baltimore, MD, USA, September 29, 2019

2018
Wideband Inductorless Low-Power LNAs with Gm Enhancement and Noise-Cancellation.
IEEE Trans. Circuits Syst. I Regul. Pap., 2018

Visible watermark removal scheme based on reversible data hiding and image inpainting.
Signal Process. Image Commun., 2018

On the fault-tolerant performance for a class of robust image steganography.
Signal Process., 2018

Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Process., 2018

Perceptual hashing for color images based on hybrid extraction of structural features.
Signal Process., 2018

Dither modulation based adaptive steganography resisting jpeg compression and statistic detection.
Multim. Tools Appl., 2018

Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing.
Multim. Tools Appl., 2018

Reversible visual transformation via exploring the correlations within color images.
J. Vis. Commun. Image Represent., 2018

Reversible data hiding in encrypted image with separable capability and high embedding capacity.
Inf. Sci., 2018

Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018

Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE Multim., 2018

A general framework for shiftable position-based dual-image reversible data hiding.
EURASIP J. Image and Video Processing, 2018

An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion.
IEEE Access, 2018

Enhancing Person-Job Fit for Talent Recruitment: An Ability-aware Neural Network Approach.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

Sub-wavelength Spacing Optical Phase Array Nanoantenna Emitter with Vertical Silicon Photonic Vias.
Proceedings of the Optical Fiber Communications Conference and Exposition, 2018

XiaoIce Band: A Melody and Arrangement Generation Framework for Pop Music.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Exploiting Topic-Based Adversarial Neural Network for Cross-Domain Keyphrase Extraction.
Proceedings of the IEEE International Conference on Data Mining, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

How Images Inspire Poems: Generating Classical Chinese Poetry from Images with Memory Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System.
TOS, 2017

Dual AC Boosting Compensation Scheme for Multistage Amplifiers.
IEEE Trans. Circuits Syst. II Express Briefs, 2017

Detection of Double-Compressed H.264/AVC Video Incorporating the Features of the String of Data Bits and Skip Macroblocks.
Symmetry, 2017

Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion.
Signal Process., 2017

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Process., 2017

Detecting Image Splicing Based on Noise Level Inconsistency.
Multim. Tools Appl., 2017

Fragile image watermarking scheme based on VQ index sharing and self-embedding.
Multim. Tools Appl., 2017

Guided filtering based color image reversible data hiding.
J. Vis. Commun. Image Represent., 2017

A Dynamic Hand Gesture Recognition System Incorporating Orientation-based Linear Extrapolation Predictor and Velocity-assisted Longest Common Subsequence Algorithm.
KSII Trans. Internet Inf. Syst., 2017

A 5.8 GHz class-AB power amplifier with 25.4 dBm saturation power and 29.7% PAE.
Sci. China Inf. Sci., 2017

Power-efficient electro-optical single-tone optical-frequency shifter using X-cut Y-propagating lithium tantalate waveguide emulating a rotating half-wave-plate.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2017

40 Gbps PON with 23 dB power budget using 10 Gbps optics and DMT.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2017

App Download Forecasting: An Evolutionary Hierarchical Competition Approach.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Information Leakage in Encrypted Deduplication via Frequency Analysis.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Joint Allocation of Spectral and Power Resources for Non-Cooperative Wireless Localization Networks.
IEEE Trans. Communications, 2016

Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism.
Signal Process., 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multim. Tools Appl., 2016

Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
Inf. Sci., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
IEEE Internet Comput., 2016

Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
I. J. Network Security, 2016

Scheduling in Cooperative UWB Localization Networks Using Round Trip Measurements.
IEEE Communications Letters, 2016

Perceptual image hashing with selective sampling for salient structure features.
Displays, 2016

Dynamic optical arbitrary waveform generation from a heterogeneously integrated InP/Si3N4 chip-scale module.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2016

Cross section binary coding for fusion of finger vein and finger dorsal texture.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Rekeying for Encrypted Deduplication Storage.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Study and Test of a New Bundle-Structure Riser Stress Monitoring Sensor Based on FBG.
Sensors, 2015

Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
Security and Communication Networks, 2015

An adaptive reversible steganographic scheme based on the just noticeable distortion.
Multim. Tools Appl., 2015

Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
Multim. Tools Appl., 2015

Effective reversible data hiding in encrypted image with privacy protection for image content.
J. Vis. Commun. Image Represent., 2015

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting.
KSII Trans. Internet Inf. Syst., 2015

Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes.
I. J. Network Security, 2015

Robust image hashing with embedding vector variance of LLE.
Digit. Signal Process., 2015

3D elastic optical networking in the temporal, spectral, and spatial domains.
IEEE Communications Magazine, 2015

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Multiple Description Coding for Encrypted Images.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Joint power and spectrum optimization in wireless localization networks.
Proceedings of the IEEE International Conference on Communication, 2015

Automatic design for analog/RF front-end system in 802.11ac receiver.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

Perceptual image hashing using block truncation coding and local binary pattern.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
TagSense: Leveraging Smartphones for Automatic Image Tagging.
IEEE Trans. Mob. Comput., 2014

A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting.
IEEE Trans. Image Process., 2014

Compression of encrypted images with multi-layer decomposition.
Multim. Tools Appl., 2014

A novel (n, t, n) secret image sharing scheme without a trusted third party.
Multim. Tools Appl., 2014

Efficient wet paper embedding for steganography with multilayer construction.
Ann. des Télécommunications, 2014

Demonstration of orbital angular momentum state conversion using two hybrid 3D photonic integrated circuits.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

A Database with ROI Extraction for Studying Fusion of Finger Vein and Finger Dorsal Texture.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

Finger-Vein Recognition by Using Spatial Feature Interdependence Matrix Weighted by Probability and Direction.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

2013
Optimized Control of DFIG-Based Wind Generation Using Sensitivity Analysis and Particle Swarm Optimization.
IEEE Trans. Smart Grid, 2013

An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism.
IEEE Trans. Circuits Syst. Video Techn., 2013

Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism.
Signal Process., 2013

Adaptive self-recovery for tampered images based on VQ indexing and inpainting.
Signal Process., 2013

Modeling, Control Strategy, and Power Conditioning for Direct-Drive Wave Energy Conversion to Operate With Power Grid.
Proceedings of the IEEE, 2013

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability.
KSII Trans. Internet Inf. Syst., 2013

A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy.
KSII Trans. Internet Inf. Syst., 2013

A Novel Turbo Unequal Error Protection Scheme for Image Steganography.
Informatica, 2013

Robust image hashing using non-uniform sampling in discrete Fourier domain.
Digit. Signal Process., 2013

An inductorless wideband low noise amplifier with current reuse and linearity enhancement.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

3D GIS Modeling of Virtual High-Speed Railway Scene Based on ArcGlobe.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

A Virtual High-Speed Railway Scene Modeling Method Based on Basic-Element Model Combination.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

2012
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism.
Signal Process., 2012

An adaptive prediction-error expansion oriented reversible information hiding scheme.
Pattern Recognit. Lett., 2012

A multi-threshold secret image sharing scheme based on MSP.
Pattern Recognit. Lett., 2012

A hierarchical threshold secret image sharing.
Pattern Recognit. Lett., 2012

Simultaneous inpainting for image structure and texture using anisotropic heat transfer model.
Multim. Tools Appl., 2012

A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism.
J. Networks, 2012

Reversible Data Hiding Scheme Based on Image Inpainting.
Fundam. Inform., 2012

Progressive Authentication: Deciding When to Authenticate on Mobile Phones.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Can smartphone sensors enhance kinect experience?
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
Journal of Multimedia, 2011

Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011

Demo: an out-of-band alternative to face recognition.
Proceedings of the 9th International Conference on Mobile Systems, 2011

TagSense: a smartphone-based approach to automatic image tagging.
Proceedings of the 9th International Conference on Mobile Systems, 2011

2010
Movement strategies for intelligent mobile routers.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes.
Journal of Multimedia, 2010

2009
Fast Texture Synthesis Based on Dynamic Space Partitioning.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Image Editing without Color Inconsistency Using Modified Poisson Equation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2006
A distributed algorithm for computing Connected Dominating Set in ad hoc networks.
Int. J. Wirel. Mob. Comput., 2006

Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006


  Loading...