Min Long

Orcid: 0000-0001-5938-5070

According to our database1, Min Long authored at least 111 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network.
Comput. Secur., February, 2024

Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction.
IEEE Trans. Multim., 2024

Face De-Morphing Based on Diffusion Autoencoders.
IEEE Trans. Inf. Forensics Secur., 2024

ADFF: Adaptive de-morphing factor framework for restoring accomplice's facial image.
IET Image Process., 2024

2023
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol., November, 2023

Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning.
IEEE Trans. Biom. Behav. Identity Sci., October, 2023

A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics.
ACM Trans. Multim. Comput. Commun. Appl., 2023

A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy.
IEEE Trans. Multim., 2023

A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning.
IEEE Trans. Dependable Secur. Comput., 2023

Passivity-based boundary control for stochastic delay reaction-diffusion systems.
Int. J. Syst. Sci., 2023

HEGrid: A high efficient multi-channel radio astronomical data gridding framework in heterogeneous computing environments.
Future Gener. Comput. Syst., 2023

CALP-FD: Cross Attention-Based Facial Landmarks Prompt for Face De-Morphing.
Proceedings of the 9th International Conference on Systems and Informatics, 2023

Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

PRISM: A Blockchain-Enabled Reputation-Based Consensus for Enhancing Scientific Workflow Provenance.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

2022
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study.
ACM Trans. Priv. Secur., 2022

Face Morphing Attack Detection and Localization Based on Feature-Wise Supervision.
IEEE Trans. Inf. Forensics Secur., 2022

BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation.
IEEE Trans. Circuits Syst. Video Technol., 2022

Face morphing attack detection and attacker identification based on a watchlist.
Signal Process. Image Commun., 2022

Presentation attack detection based on two-stream vision transformers with self-attention fusion.
J. Vis. Commun. Image Represent., 2022

Automated Materials Spectroscopy Analysis using Genetic Algorithms.
CoRR, 2022

F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

SciLedger: A Blockchain-based Scientific Workflow Provenance and Data Sharing Platform.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022

2021
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting.
IEEE Trans. Circuits Syst. Video Technol., 2021

A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models.
IEEE Trans. Circuits Syst. Video Technol., 2021

BullyNet: Unmasking Cyberbullies on Social Networks.
IEEE Trans. Comput. Soc. Syst., 2021

Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation.
IEEE Trans. Biom. Behav. Identity Sci., 2021

Identifying natural images and computer-generated graphics based on convolutional neural network.
Int. J. Auton. Adapt. Commun. Syst., 2021

Detection of radio frequency interference using an improved generative adversarial network.
Astron. Comput., 2021

S-Box Design Based on Discrete Chaotic Map and Improved Artificial Bee Colony Algorithm.
IEEE Access, 2021

MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

VAULT: A Scalable Blockchain-Based Protocol for Secure Data Access and Collaboration.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network.
IEEE Trans. Multim., 2020

A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling.
IEEE Trans. Circuits Syst. Video Technol., 2020

Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics.
IEEE Trans. Circuits Syst. Video Technol., 2020

Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting.
Signal Process. Image Commun., 2020

A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering.
Signal Process., 2020

Performance optimization of non-equilibrium ionization simulations from MapReduce and GPU acceleration.
Parallel Comput., 2020

Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning.
J. Vis. Commun. Image Represent., 2020

基于区块链的环境监测数据安全传输方案 (Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain).
计算机科学, 2020

A Coverless Image Information Hiding Algorithm Based on Fractal Theory.
Int. J. Bifurc. Chaos, 2020

Visible Reversible Watermarking for 3D Models Based on Mesh Subdivision.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

A Facial Privacy Protection Framework Based on Component Difference and Template Morphing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
3-D Printed Object Authentication Based on Printing Noise and Digital Signature.
IEEE Trans. Reliab., 2019

Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers.
IEEE Trans. Inf. Forensics Secur., 2019

A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion.
Signal Process. Image Commun., 2019

A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates.
Multim. Tools Appl., 2019

Identifying natural images and computer generated graphics based on binary similarity measures of PRNU.
Multim. Tools Appl., 2019

基于用户间接信任及高斯填充的推荐算法 (Recommendation Methods Considering User Indirect Trust and Gaussian Filling).
计算机科学, 2019

Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree.
Int. J. Digit. Crime Forensics, 2019

Performance analysis of energy harvesting communications using multiple time slots.
IET Commun., 2019

Source identification of 3D printed objects based on inherent equipment distortion.
Comput. Secur., 2019

FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image.
IEEE Access, 2019

2018
Robust Coverless Image Steganography Based on DCT and LDA Topic Classification.
IEEE Trans. Multim., 2018

A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting.
IEEE Trans. Inf. Forensics Secur., 2018

Outage performance of double-relay cooperative transmission network with energy harvesting.
Phys. Commun., 2018

Face presentation attack detection using guided scale texture.
Multim. Tools Appl., 2018

Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination.
J. Vis. Commun. Image Represent., 2018

Separable reversible data hiding and encryption for HEVC video.
J. Real Time Image Process., 2018

Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling.
Int. J. Digit. Crime Forensics, 2018

A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
Int. J. Digit. Crime Forensics, 2018

FIPIP: A novel fine-grained parallel partition based intra-frame prediction on heterogeneous many-core systems.
Future Gener. Comput. Syst., 2018

FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image.
CoRR, 2018

A Formula Adaptive Pixel Pair Matching Steganography Algorithm.
Adv. Multim., 2018

Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web.
Signal Process. Image Commun., 2017

A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017

Identifying source camera using guided image estimation and block weighted average.
J. Vis. Commun. Image Represent., 2017

A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping.
Int. J. Digit. Crime Forensics, 2017

Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos.
Int. J. Bifurc. Chaos, 2017

A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Perceptual Encryption Scheme for HEVC Video with Lossless Compression.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017


Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017

2016
Image tamper detection based on noise estimation and lacunarity texture.
Multim. Tools Appl., 2016

A novel parallelized motion estimation algorithm for GPU based video encoding.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2016

Source Camera Identification Based on Guided Image Estimation and Block Weighted Average.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Evaluation of SNR estimation errors on amplify-and-forward relaying performance.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2015
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization.
Int. J. Digit. Crime Forensics, 2015

Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Performance Analysis of Relay Selection in the Presence of on-off Relay Traffic.
IEEE Trans. Veh. Technol., 2014

Evaluation of generalised relay selection in the presence of feedback delay for multi-hop relaying.
IET Commun., 2014

Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting.
Comput. Aided Des., 2014

Fine-grained CUDA-based Parallel Intra Prediction for H.264/AVC.
Proceedings of the 24th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2014

Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

2013
Performance Analysis of Amplify-and-Forward Relaying With Correlated Links.
IEEE Trans. Veh. Technol., 2013

An ROI Privacy Protection Scheme for H.264 Video Based on FMO and Chaos.
IEEE Trans. Inf. Forensics Secur., 2013

A reversible watermark scheme for 2D vector map based on reversible contrast mapping.
Secur. Commun. Networks, 2013

Securing data services: a security architecture design for private storage cloud based on HDFS.
Int. J. Grid Util. Comput., 2013

An Effective Selective Encryption Scheme for H.264 Video based on Chaotic Qi System.
Int. J. Digit. Crime Forensics, 2013

Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters.
Int. J. Digit. Crime Forensics, 2013

Analysis of collaborative spectrum sensing without dedicated sensing period.
IET Commun., 2013

Estimation of the Average Fading Powers for AF Relay System.
IEEE Commun. Lett., 2013

2012
Existence and Exponential Stability of Multiple Periodic Solutions for a Multidirectional Associative Memory Neural Network.
Neural Process. Lett., 2012

Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features.
Int. J. Digit. Crime Forensics, 2012

Bit error rate improvement for chaos shift keying chaotic communication systems.
IET Commun., 2012

SAPSC: Security Architecture of Private Storage Cloud Based on HDFS.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Simple and Accurate Analysis of BER Performance for DCSK Chaotic Communication.
IEEE Commun. Lett., 2011

A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011

2010
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation.
Comput. Aided Des., 2010

2009
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation.
Proceedings of the Information Security and Digital Forensics, 2009

2008
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
B-cell Epitope Mapping of Helicobacter pylori Neutrophil-Activating Protein.
Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies 2007, 2007

2006
LSM: Language Sense Model for Information Retrieval.
Proceedings of the Advances in Web-Age Information Management, 2006


  Loading...