Guorui Feng

Orcid: 0000-0001-8249-2608

According to our database1, Guorui Feng authored at least 157 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deep neural networks watermark via universal deep hiding and metric learning.
Neural Comput. Appl., May, 2024

Flexible Tensor Learning for Multi-View Clustering With Markov Chain.
IEEE Trans. Knowl. Data Eng., April, 2024

Learning Appearance-Motion Synergy via Memory-Guided Event Prediction for Video Anomaly Detection.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Traffic sign attack via pinpoint region probability estimation network.
Pattern Recognit., February, 2024

BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks.
IEEE Internet Things J., January, 2024

Verifiable Privacy-Preserving Heart Rate Estimation Based on LSTM.
IEEE Internet Things J., January, 2024

Multi-Source Style Transfer via Style Disentanglement Network.
IEEE Trans. Multim., 2024

Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning.
IEEE Trans. Multim., 2024

Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding.
IEEE Trans. Dependable Secur. Comput., 2024

SMDC-Net: Saliency-Guided Multihead Distribution Calibration Network for Few-Shot Object Detection on Remote Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2024

2023
A Fast Method for Robust Video Watermarking Based on Zernike Moments.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

Artistic image adversarial attack via style perturbation.
Multim. Syst., December, 2023

Background-detail restoration image deraining network based on convolutional dictionary network.
Signal Process. Image Commun., November, 2023

A Fusion Deraining Network Based on Swin Transformer and Convolutional Neural Network.
IEICE Trans. Inf. Syst., July, 2023

Data hiding during image processing using capsule networks.
Neurocomputing, June, 2023

An Improved NSGA-III Algorithm Based on Deep Q-Networks for Cloud Storage Optimization of Blockchain.
IEEE Trans. Parallel Distributed Syst., May, 2023

Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization.
IEEE Trans. Knowl. Data Eng., March, 2023

Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023

Image Inpainting Anti-Forensics Network via Attention-Guided Hierarchical Reconstruction.
Symmetry, February, 2023

NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks.
IEEE Trans. Image Process., 2023

Cover Selection for Steganography Using Image Similarity.
IEEE Trans. Dependable Secur. Comput., 2023

Outsourcing LDA-Based Face Recognition to an Untrusted Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

JPEG Steganography With Content Similarity Evaluation.
IEEE Trans. Cybern., 2023

Consistency-Induced Multiview Subspace Clustering.
IEEE Trans. Cybern., 2023

Enhanced Example Diffusion Model via Style Perturbation.
Symmetry, 2023

Image Steganalysis Network Based on Dual-Attention Mechanism.
IEEE Signal Process. Lett., 2023

Maximum Block Energy Guided Robust Subspace Clustering.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2023

Privacy-enhanced and non-interactive linear regression with dropout-resilience.
Inf. Sci., 2023

CADW: CGAN-Based Attack on Deep Robust Image Watermarking.
IEEE Multim., 2023

RFD-ECNet: Extreme Underwater Image Compression with Reference to Feature Dictionar.
CoRR, 2023

Flexible and Secure Watermarking for Latent Diffusion Model.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Interactive Image Style Transfer Guided by Graffiti.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

RFD-ECNet: Extreme Underwater Image Compression with Reference to Feature Dictionary.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Altered Fingerprints Detection Based on Deep Feature Fusion.
IEICE Trans. Inf. Syst., September, 2022

Multi-granularity Brushstrokes Network for Universal Style Transfer.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Semi-Supervised Structured Subspace Learning for Multi-View Clustering.
IEEE Trans. Image Process., 2022

Repeatable Data Hiding: Towards the Reusability of Digital Images.
IEEE Trans. Circuits Syst. Video Technol., 2022

ACDB-EA: Adaptive convergence-diversity balanced evolutionary algorithm for many-objective optimization.
Swarm Evol. Comput., 2022

ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling.
IEEE Signal Process. Lett., 2022

Feature compensation network based on non-uniform quantization of channels for digital image global manipulation forensics.
Signal Process. Image Commun., 2022

Enforced block diagonal subspace clustering with closed form solution.
Pattern Recognit., 2022

Surveillance video anomaly detection via non-local U-Net frame prediction.
Multim. Tools Appl., 2022

Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning.
IEEE Internet Things J., 2022

Efficient Multi-Scale Feature Fusion for Image Manipulation Detection.
IEICE Trans. Inf. Syst., 2022

Universal adversarial perturbation for remote sensing images.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Perceptual Model Hashing: Towards Neural Network Model Authentication.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Neural Network Model Protection with Piracy Identification and Tampering Localization Capability.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Exploiting Language Model For Efficient Linguistic Steganalysis.
Proceedings of the IEEE International Conference on Acoustics, 2022

Patch Diffusion: A General Module for Face Manipulation Detection.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints.
IEEE Trans. Circuits Syst. Video Technol., 2021

Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server.
IEEE Trans. Cloud Comput., 2021

Linguistic Steganalysis With Graph Neural Networks.
IEEE Signal Process. Lett., 2021

Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval.
IEEE Signal Process. Lett., 2021

Hierarchical Authorization of Convolutional Neural Networks for Multi-User.
IEEE Signal Process. Lett., 2021

Embedding Probability Guided Network for Image Steganalysis.
IEEE Signal Process. Lett., 2021

An optimized CNN-based quality assessment model for screen content image.
Signal Process. Image Commun., 2021

Structured subspace learning-induced symmetric nonnegative matrix factorization.
Signal Process., 2021

Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations.
Secur. Commun. Networks, 2021

Reversible Privacy Protection with the Capability of Antiforensics.
Secur. Commun. Networks, 2021

Special issue on low complexity methods for multimedia security.
Multim. Syst., 2021

Embedded multiport data buffer for a solid-state drive controller.
IEICE Electron. Express, 2021

Multichannel Steganography in Digital Images for Multiple Receivers.
IEEE Multim., 2021

Exploiting Language Model for Efficient Linguistic Steganalysis: An Empirical Study.
CoRR, 2021

Orientation Convolutional Networks for Image Recognition.
CoRR, 2021

Non-Interactive and secure outsourcing of PCA-Based face recognition.
Comput. Secur., 2021

Data Hiding in Neural Networks for Multiple Receivers [Research Frontier].
IEEE Comput. Intell. Mag., 2021

Efficient outsourced extraction of histogram features over encrypted images in cloud.
Sci. China Inf. Sci., 2021

Diffusing the Liveness Cues for Face Anti-spoofing.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Image Style Recognition Using Graph Network and Perception Layer.
Proceedings of the Artificial Intelligence - First CAAI International Conference, 2021

2020
A New Steganography Method for Dynamic GIF Images Based on Palette Sort.
Wirel. Commun. Mob. Comput., 2020

Key Based Artificial Fingerprint Generation for Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2020

Diversity-Based Cascade Filters for JPEG Steganalysis.
IEEE Trans. Circuits Syst. Video Technol., 2020

How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

On Security Enhancement of Steganography via Generative Adversarial Image.
IEEE Signal Process. Lett., 2020

Feature extraction optimization of JPEG steganalysis based on residual images.
Signal Process., 2020

Anti-forensics of diffusion-based image inpainting.
J. Electronic Imaging, 2020

On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm.
IEEE Internet Things J., 2020

No-reference screen content image quality assessment based on multi-region features.
Neurocomputing, 2020

Defeating data hiding in social networks using generative adversarial network.
EURASIP J. Image Video Process., 2020

Semi-structured data protection scheme based on robust watermarking.
EURASIP J. Image Video Process., 2020

Iris Segmentation Using Feature Channel Optimization for Noisy Environments.
Cogn. Comput., 2020

An efficient two-grid method for the Cahn-Hilliard equation with the concentration-dependent mobility and the logarithmic Flory-Huggins bulk potential.
Appl. Math. Comput., 2020

Steganographic Distortion Function for Enhanced Images.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Image Forgery Detection Based on the Convolutional Neural Network.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

A Deep Learning Approach to Detection of Warping Forgery in Images.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Low-Complexity Scalable Extension of the High-Efficiency Video Coding (SHVC) Encoding System.
ACM Trans. Multim. Comput. Commun. Appl., 2019

Content-Based Adaptive SHVC Mode Decision Algorithm.
IEEE Trans. Multim., 2019

SHVC CU Processing Aided by a Feedforward Neural Network.
IEEE Trans. Ind. Informatics, 2019

Selective Ensemble Classification of Image Steganalysis Via Deep Q Network.
IEEE Signal Process. Lett., 2019

Detection of double JPEG compression using modified DenseNet model.
Multim. Tools Appl., 2019

Image Steganalysis via Random Subspace Fisher Linear Discriminant Vector Functional Link Network and Feature Mapping.
Mob. Networks Appl., 2019

Additional articles of special issue on Real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

Special issue on real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

Breaking Steganography: Slight Modification with Distortion Minimization.
Int. J. Digit. Crime Forensics, 2019

JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering.
IEICE Trans. Inf. Syst., 2019

Iris Segmentation Based on Improved U-Net Network Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Deep Optimization model for Screen Content Image Quality Assessment using Neural Networks.
CoRR, 2019

Breaking Permutation-Based Mesh Steganography and Security Improvement.
IEEE Access, 2019

Broadcasting Steganography in the Blockchain.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Ensemble Steganalysis Based on Deep Residual Network.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

File Recovery of High-Order Clearing First Cluster Based on FAT32.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Efficient Intra Mode Selection for Depth-Map Coding Utilizing Spatiotemporal, Inter-Component and Inter-View Correlations in 3D-HEVC.
IEEE Trans. Image Process., 2018

Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Deep learning for steganalysis based on filter diversity selection.
Sci. China Inf. Sci., 2018

2017
Sparse Representation for Color Image Super-Resolution with Image Quality Difference Evaluation.
IEICE Trans. Inf. Syst., 2017

JPEG Image Steganalysis from Imbalanced Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering.
IEICE Trans. Inf. Syst., 2017

Data hiding in Fingerprint Minutiae Template for Privacy Protection.
CoRR, 2017

An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery.
IEEE Signal Process. Lett., 2016

Block cipher based separable reversible data hiding in encrypted images.
Multim. Tools Appl., 2016

Unbalanced JPEG image steganalysis via multiview data match.
J. Vis. Commun. Image Represent., 2016

Defining cost functions for adaptive steganography at the microscale.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine.
IEEE Trans. Cybern., 2015

A novel adaptive image zooming scheme via weighted least-squares estimation.
Frontiers Comput. Sci., 2015

2014
Compressing Encrypted Images With Auxiliary Information.
IEEE Trans. Multim., 2014

Mixing high-dimensional features for JPEG steganalysis with ensemble classifier.
Signal Image Video Process., 2014

Efficient reversible data hiding in encrypted images.
J. Vis. Commun. Image Represent., 2014

Effective feature selection for image steganalysis using extreme learning machine.
J. Electronic Imaging, 2014

Reversible Data Hiding in Encrypted Images Based on Image Interpolation.
Int. J. Digit. Crime Forensics, 2014

2013
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier.
IEEE Signal Process. Lett., 2013

2012
Scalable Coding of Encrypted Images.
IEEE Trans. Image Process., 2012

Spectrum-estimation based lossless information recovery for sparse array patterns.
Telecommun. Syst., 2012

Evolutionary selection extreme learning machine optimization for regression.
Soft Comput., 2012

Perceptual differential energy watermarking for H.264/AVC.
Multim. Tools Appl., 2012

Reversible data hiding of high payload using local edge sensing prediction.
J. Syst. Softw., 2012

Reversible watermarking via extreme learning machine prediction.
Neurocomputing, 2012

Steganalysis in High-Dimensional Feature Space Using Selective Ensemble Classifiers.
Proceedings of the Advances on Digital Television and Wireless Multimedia Communications, 2012

2011
Reference Sharing Mechanism for Watermark Self-Embedding.
IEEE Trans. Image Process., 2011

Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction.
IEEE Trans. Inf. Forensics Secur., 2011

Self-embedding watermark with flexible restoration quality.
Multim. Tools Appl., 2011

Reversible Watermarking Using Adaptive Edge-Guided Interpolation.
KSII Trans. Internet Inf. Syst., 2011

Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift.
Intell. Autom. Soft Comput., 2011

Image self-embedding with high-quality restoration capability.
Digit. Signal Process., 2011

Compressing Encrypted Image Using Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Differential Energy Watermarking Based on Macro-block Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Inpainting Assisted Self Recovery With Decreased Embedding Data.
IEEE Signal Process. Lett., 2010

Reversible fragile watermarking for locating tampered blocks in JPEG images.
Signal Process., 2010

Colour filter array interpolation based self recovery with anti-cropping capability.
Int. J. Multim. Intell. Secur., 2010

Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

2009
Error Minimized Extreme Learning Machine With Growth of Hidden Nodes and Incremental Learning.
IEEE Trans. Neural Networks, 2009

Macroblock-level adaptive search range algorithm for motion estimation in multiview video coding.
J. Electronic Imaging, 2009

Fragile Watermarking Scheme with Extensive Content Restoration Capability.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2008
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment.
Int. J. Virtual Real., 2008

2007
Optimal bit allocation adaptive modulation algorithm for MIMO system.
J. Commun. Networks, 2007

2006
Erratum to: Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transformation [Pattern Recognition 38 (12) 2530].
Pattern Recognit., 2006

2005
Deterministic convergence of an online gradient method for BP neural networks.
IEEE Trans. Neural Networks, 2005

Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform.
Pattern Recognit., 2005

Permutation-Based Semi-Fragile Watermark Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Convergence of an Online Gradient Method for BP Neural Networks with Stochastic Inputs.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Recent Developments on Convergence of Online Gradient Methods for Neural Network Training.
Proceedings of the Advances in Neural Networks, 2004

Novel blind non-additive robust watermarking using 1-D chaotic map.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
A novel algorithm for embedding and detecting digital watermarks.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
Training Multilayer Perceptrons Via Minimization of Sum of Ridge Functions.
Adv. Comput. Math., 2002


  Loading...