Nenghai Yu

According to our database1, Nenghai Yu authored at least 351 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Towards Anti-Interference Human Activity Recognition Based on WiFi Subcarrier Correlation Selection.
IEEE Trans. Veh. Technol., 2020

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud.
IEEE Trans. Serv. Comput., 2020

MichiGAN: multi-input-conditioned hair image generation for portrait editing.
ACM Trans. Graph., 2020

Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
IEEE Trans. Inf. Forensics Secur., 2020

SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities.
IEEE Trans. Inf. Forensics Secur., 2020

Shortening the Cover for Fast JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

JPEG Steganography With Estimated Side-Information.
IEEE Trans. Circuits Syst. Video Technol., 2020

Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio.
IEEE Trans. Circuits Syst. Video Technol., 2020

Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes.
IEEE Trans. Commun., 2020

A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Fast Encoding Algorithms for Reed-Solomon Codes With Between Four and Seven Parity Symbols.
IEEE Trans. Computers, 2020

Robust adaptive steganography based on generalized dither modulation and expanded embedding domain.
Signal Process., 2020

Real-time attacks on robust watermarking tools in the wild by CNN.
J. Real Time Image Process., 2020

Efficient and privacy-preserving authentication scheme for wireless body area networks.
J. Inf. Secur. Appl., 2020

Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs.
IET Inf. Secur., 2020

Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks.
IACR Cryptol. ePrint Arch., 2020

Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks.
CoRR, 2020

An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization.
CoRR, 2020

Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry.
CoRR, 2020

Rethinking Spatially-Adaptive Normalization.
CoRR, 2020

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem.
Comput. Commun., 2020

Towards Anti-interference WiFi-based Activity Recognition System Using Interference-Independent Phase Component.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

GSM: Graph Similarity Model for Multi-Object Tracking.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Research on Online Leakage Assessment.
Proceedings of the Data Science, 2020

A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Spatial-Temporal Feature Aggregation Network For Video Object Detection.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Self-Supervised Adversarial Training.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Cross-Modality Person Re-Identification With Shared-Specific Feature Transfer.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Density-Aware Graph for Deep Semi-Supervised Visual Recognition.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Robust Superpixel-Guided Attentional Adversarial Attack.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Self-Robust 3D Point Recognition via Gather-Vector Guidance.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Model Watermarking for Image Processing Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

DASOT: A Unified Framework Integrating Data Association and Single Object Tracking for Online Multi-Object Tracking.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019

Distortion Design for Secure Adaptive 3-D Mesh Steganography.
IEEE Trans. Multimedia, 2019

AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network.
IEEE Trans. Inf. Forensics Secur., 2019

Screen-Shooting Resilient Watermarking.
IEEE Trans. Inf. Forensics Secur., 2019

Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
IEEE Trans. Inf. Forensics Secur., 2019

Reversible Data Hiding in Color Image With Grayscale Invariance.
IEEE Trans. Circuits Syst. Video Technol., 2019

New Locally Correctable Codes Based on Projective Reed-Muller Codes.
IEEE Trans. Commun., 2019

Content-adaptive reversible visible watermarking in encrypted images.
Signal Process., 2019

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks.
Secur. Commun. Networks, 2019

A no-reference quality assessment for contrast-distorted image based on improved learning method.
Multim. Tools Appl., 2019

Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection.
Multim. Tools Appl., 2019

Object and patch based anomaly detection and localization in crowded scenes.
Multim. Tools Appl., 2019

A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization.
Multim. Tools Appl., 2019

Anomaly residual prediction with spatial-temporal and perceptual constraints.
J. Electronic Imaging, 2019

Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras.
IEEE Internet Things J., 2019

A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks.
IEEE Internet Things J., 2019

Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data.
IEEE Internet Things J., 2019

Using multi-label classification to improve object detection.
Neurocomputing, 2019

Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Process., 2019

Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019

Irregular MDS Array Codes With Fewer Parity Symbols.
IEEE Commun. Lett., 2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret.
CoRR, 2019

A General Decoupled Learning Framework for Parameterized Image Operators.
CoRR, 2019

A Large Scale Urban Surveillance Video Dataset for Multiple-Object Tracking and Behavior Analysis.
CoRR, 2019

Data Exfiltration via Multipurpose RFID Cards and Countermeasures.
CoRR, 2019

Anonymous authentication scheme for smart home environment with provable security.
Comput. Secur., 2019

Potential risk of IoT device supporting IR remote control.
Comput. Networks, 2019

A Class of In-Place Linear Transformations Possessing the Cache-Oblivious Property.
IEEE Access, 2019

JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds.
IEEE Access, 2019

Real-Time Online Multi-Object Tracking in Compressed Domain.
IEEE Access, 2019

Scale Voting With Pyramidal Feature Fusion Network for Person Search.
IEEE Access, 2019

Learning Pixel-Level and Instance-Level Context-Aware Features for Pedestrian Detection in Crowds.
IEEE Access, 2019

Bitcoin Blockchain Compression Algorithm for Blank Node Synchronization.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

PPML: Metric Learning with Prior Probability for Video Object Segmentation.
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019

Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo).
Proceedings of the IEEE INFOCOM 2019, 2019

UnseenCode: Invisible On-screen Barcode with Image-based Extraction.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Tracking Assisted Faster Video Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Real Time Compressed Video Object Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Query-Free Embedding Attack Against Deep Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

G-SGD: Optimizing ReLU Neural Networks in its Positively Scale-Invariant Space.
Proceedings of the 7th International Conference on Learning Representations, 2019

Cascaded Residual Density Network for Crowd Counting.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Direct Adversarial Attack on Stego Sandwiched Between Black Boxes.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification.
Proceedings of the Image and Graphics - 10th International Conference, 2019

Enhanced Video Segmentation with Object Tracking.
Proceedings of the Image and Graphics - 10th International Conference, 2019

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Memory-Based Neighbourhood Embedding for Visual Recognition.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Context and Attribute Grounded Dense Captioning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Semantics Disentangling for Text-To-Image Generation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Capacity Control of ReLU Neural Networks by Basis-Path Norm.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Trust Region Evolution Strategies.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models.
IEEE Trans. Multimedia, 2018

Reversible Data Hiding Under Inconsistent Distortion Metrics.
IEEE Trans. Image Process., 2018

Crowd Tracking by Group Structure Evolution.
IEEE Trans. Circuits Syst. Video Technol., 2018

Reversible data hiding in JPEG image based on DCT frequency and block selection.
Signal Process., 2018

Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing.
IEEE Netw., 2018

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.
Multim. Tools Appl., 2018

Which gray level should be given the smallest cost for adaptive steganography?
Multim. Tools Appl., 2018

Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification.
Multim. Tools Appl., 2018

Targeted attack and security enhancement on texture synthesis based steganography.
J. Vis. Commun. Image Represent., 2018

Reversible visual transformation via exploring the correlations within color images.
J. Vis. Commun. Image Represent., 2018

Fast Video Stitching for Aerially Captured HD Videos.
Int. J. Image Graph., 2018

Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.
CoRR, 2018

Real-Time Anomaly Detection With HMOF Feature.
CoRR, 2018

Provably Secure Steganography on Generative Media.
CoRR, 2018

CAAD 2018: Iterative Ensemble Adversarial Attack.
CoRR, 2018

Emerging Applications of Reversible Data Hiding.
CoRR, 2018

CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.
CoRR, 2018

Reversible Adversarial Examples.
CoRR, 2018

Detecting Adversarial Examples Based on Steganalysis.
CoRR, 2018

IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals.
CoRR, 2018

Robust Anomaly Detection via Fusion of Appearance and Motion Features.
Proceedings of the IEEE Visual Communications and Image Processing, 2018

Low-Latency Authentication Against Satellite Compromising for Space Information Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Improving the Embedding Strategy for Batch Adaptive Steganography.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Provably Secure Generative Steganography Based on Autoregressive Model.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A multi-task framework with feature passing module for skin lesion classification and segmentation.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018

Adversarial Examples Against Deep Neural Network based Steganalysis.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Real-time Anomaly Detection with HMOF Feature.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

Model-Level Dual Learning.
Proceedings of the 35th International Conference on Machine Learning, 2018

Anomaly Detection and Localization: A Novel Two-Phase Framework Based on Trajectory-Level Characteristics.
Proceedings of the 2018 IEEE International Conference on Multimedia & Expo Workshops, 2018

Flow Guided Siamese Network for Visual Tracking.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Pyramid Sub-Region Sensitive Network for Object Detection.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Binary "proximity patches motion" descriptor for action recognition in videos.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018

Text Semantic Steganalysis Based on Word Embedding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Covert Communication by Exploring Statistical and Linguistical Distortion in Text.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Object-Oriented Anomaly Detection in Surveillance Videos.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Zoom-Net: Mining Deep Feature Interactions for Visual Relationship Recognition.
Proceedings of the Computer Vision - ECCV 2018, 2018

Decouple Learning for Parameterized Image Operators.
Proceedings of the Computer Vision - ECCV 2018, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Robust Audio Watermarking Algorithm Based on Air Channel Characteristics.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Stereoscopic Neural Style Transfer.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Efficient Human Action Recognition Interface for Augmented and Virtual Reality Applications Based on Binary Descriptor.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2018

2017
Large-Scale Online Feature Selection for Ultra-High Dimensional Sparse Data.
ACM Trans. Knowl. Discov. Data, 2017

Comments on "Steganography Using Reversible Texture Synthesis".
IEEE Trans. Image Process., 2017

A New Rule for Cost Reassignment in Adaptive Steganography.
IEEE Trans. Inf. Forensics Secur., 2017

Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving.
IEEE Trans. Inf. Forensics Secur., 2017

Decomposing Joint Distortion for Adaptive Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2017

CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding.
IEEE Trans. Computers, 2017

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth.
Secur. Commun. Networks, 2017

Unified entropy-based sorting for reversible data hiding.
Multim. Tools Appl., 2017

Optimal structural similarity constraint for reversible data hiding.
Multim. Tools Appl., 2017

Smart motion reconstruction system for golf swing: a DBN model based transportable, non-intrusive and inexpensive golf swing capture and reconstruction system.
Multim. Tools Appl., 2017

Semi-order preserving encryption.
Inf. Sci., 2017

Finite budget analysis of multi-armed bandit problems.
Neurocomputing, 2017

SOL: A library for scalable online learning algorithms.
Neurocomputing, 2017

Enhanced Attacks on Defensively Distilled Deep Neural Networks.
CoRR, 2017

Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators.
CoRR, 2017

Sequence Generation with Target Attention.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Visual Tracking by Deep Discriminative Map.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Anomaly Detection with Passive Aggressive Online Gaussian Model Estimation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Deliberation Networks: Sequence Generation Beyond One-Pass Decoding.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

Receive Buffer Pre-division Based Flow Control for MPTCP.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Dual Inference for Machine Learning.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Asynchronous Stochastic Gradient Descent with Delay Compensation.
Proceedings of the 34th International Conference on Machine Learning, 2017

Dual Supervised Learning.
Proceedings of the 34th International Conference on Machine Learning, 2017

Neural network with saliency based feature selection ability.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Key-Region Representation Learning for Anomaly Detection.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Deep Scale Feature for Visual Tracking.
Proceedings of the Image and Graphics - 9th International Conference, 2017

PPEDNet: Pyramid Pooling Encoder-Decoder Network for Real-Time Semantic Segmentation.
Proceedings of the Image and Graphics - 9th International Conference, 2017

TCCF: Tracking Based on Convolutional Neural Network and Correlation Filters.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Secure Image Denoising over Two Clouds.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Coherent Online Video Style Transfer.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Probability-p Order-Preserving Encryption.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Robust visual tracking with deep feature fusion.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Range Queries on Two Column Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Extracting Sift Keypoints in DCT Domain.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

StyleBank: An Explicit Representation for Neural Image Style Transfer.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

2016
Secure Nonlocal Denoising in Outsourced Images.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Reversible Data Hiding in Encrypted Images by Reversible Image Transformation.
IEEE Trans. Multimedia, 2016

Monet: A System for Reliving Your Memories by Theme-Based Photo Storytelling.
IEEE Trans. Multimedia, 2016

Ada-Sal Network: emulate the Human Visual System.
Signal Process. Image Commun., 2016

Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams.
Signal Process., 2016

Improving visual quality of reversible data hiding by twice sorting.
Multim. Tools Appl., 2016

Protecting patient confidential information based on ECG reversible data hiding.
Multim. Tools Appl., 2016

Image camouflage by reversible image transformation.
J. Vis. Commun. Image Represent., 2016

Locality-preserving low-rank representation for graph construction from nonlinear manifolds.
Neurocomputing, 2016

Multi-level visual tracking with hierarchical tree structural constraint.
Neurocomputing, 2016

Reversible data hiding in medical images with enhanced contrast in texture area.
Digit. Signal Process., 2016

Asynchronous Stochastic Gradient Descent with Delay Compensation for Distributed Deep Learning.
CoRR, 2016

Defining cost functions for adaptive steganography at the microscale.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Dual Learning for Machine Translation.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Second Order Perdicting-Error Sorting for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Budgeted Multi-Armed Bandits with Multiple Plays.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016

Anomaly detection via 3D-HOF and fast double sparse representation.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Consistent matching based on boosted salience channels for group re-identification.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Part-based multi-graph ranking for visual tracking.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Reversible image processing via reversible data hiding.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016

Best Action Selection in a Stochastic Environment.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Constructing a Nonnegative Low-Rank and Sparse Graph With Data-Adaptive Features.
IEEE Trans. Image Process., 2015

Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications.
IEEE Trans. Image Process., 2015

Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
IEEE Trans. Inf. Forensics Secur., 2015

Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2015

Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015

MoVieUp: Automatic Mobile Video Mashup.
IEEE Trans. Circuits Syst. Video Technol., 2015

Mobile cloud computing based privacy protection in location-based information survey applications.
Secur. Commun. Networks, 2015

Defining embedding distortion for motion vector-based video steganography.
Multim. Tools Appl., 2015

Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Multi-target Tracking via Max-Entropy Target Selection and Heterogeneous Camera Fusion.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

Thompson Sampling for Budgeted Multi-Armed Bandits.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Person re-identification by the marriage of KISS metric learning and post-rank optimization: KISSPOP.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

Online shared dictionary learning for visual tracking.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

Improve Neural Network Using Saliency.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Cooperative Target Tracking in Dual-Camera System with Bidirectional Information Fusion.
Proceedings of the Image and Graphics - 8th International Conference, 2015

A Robust Occlusion Judgment Scheme for Target Tracking Under the Framework of Particle Filter.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Moving Object Segmentation by Length-Unconstrained Trajectory Analysis.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Economic Costs of Multi-sever Private Information Retrieval in Cloud Computing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

Budgeted Bandit Problems with Continuous Random Costs.
Proceedings of The 7th Asian Conference on Machine Learning, 2015

2014
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics.
IEEE Trans. Computers, 2014

Reversibility improved data hiding in encrypted images.
Signal Process., 2014

Recursive code construction for reversible data hiding in DCT domain.
Multim. Tools Appl., 2014

The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications.
Int. J. Distributed Sens. Networks, 2014

Reversible Data Hiding for DNA Sequences and Its Applications.
Int. J. Digit. Crime Forensics, 2014

Optimizing Non-Local Pixel Predictors for Reversible Data Hiding.
Int. J. Digit. Crime Forensics, 2014

Towards optimal noise distribution for privacy preserving in data aggregation.
Comput. Secur., 2014

Adaptive ±1 Steganography in Extended Noisy Region.
Comput. J., 2014

Moving object detection of dynamic scenes using spatio-temporal context and background modeling.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Optimized Distances for Binary Code Ranking.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Salable Image Search with Reliable Binary Code.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Non-local Denoising in Encrypted Images.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Quadtree-based optimal path routing with the smallest routing table size.
Proceedings of the IEEE Global Communications Conference, 2014

Crowd Tracking with Dynamic Evolution of Group Structures.
Proceedings of the Computer Vision - ECCV 2014, 2014

Fast tamper location of batch DNA sequences based on reversible data hiding.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

Redundant and Relay Assistant Scheduling of Small Satellites.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Incentivizing High-Quality Content from Heterogeneous Users: On the Existence of Nash Equilibrium.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Distributed Hash Table - Theory, Platforms and Applications.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9008-1, 2013

FoCUS: Learning to Crawl Web Forums.
IEEE Trans. Knowl. Data Eng., 2013

Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression.
IEEE Trans. Image Process., 2013

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Inf. Forensics Secur., 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

A Low-Complexity Screen Compression Scheme for Interactive Screen Sharing.
IEEE Trans. Circuits Syst. Video Technol., 2013

Intelligent processing techniques for semantic-based image and video retrieval.
Neurocomputing, 2013

Learning from contextual information of geo-tagged web photos to rank personalized tourism attractions.
Neurocomputing, 2013

Order preserving hashing for approximate nearest neighbor search.
Proceedings of the ACM Multimedia Conference, 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

High precision rotation angle estimation for rotated images.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Online travel destination recommendation with efficient variable memory Markov model.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Large scale image retrieval with visual groups.
Proceedings of the IEEE International Conference on Image Processing, 2013

High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

Moving Object Detection for Moving Cameras on Superpixel Level.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

MOS-Based Channel Allocation Schemes for Mixed Services over Cognitive Radio Networks.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

Toward Optimal Additive Noise Distribution for Privacy Protection in Mobile Statistics Aggregation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Tamper restoration on DNA sequences based on reversible data hiding.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

Word Alignment Modeling with Context Dependent Deep Neural Network.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

2012
Learning Bregman Distance Functions for Semi-Supervised Clustering.
IEEE Trans. Knowl. Data Eng., 2012

Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.
IEEE Trans. Image Process., 2012

Fast Matrix Embedding by Matrix Extending.
IEEE Trans. Inf. Forensics Secur., 2012

Flickr Distance: A Relationship Measure for Visual Concepts.
IEEE Trans. Pattern Anal. Mach. Intell., 2012

Color Image Quality Assessment Based on CIEDE2000.
Adv. Multim., 2012

A Design Method of Saturation Test Image Based on CIEDE2000.
Adv. Multim., 2012

Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data.
Adv. Multim., 2012

FoCUS: learning to crawl web forums.
Proceedings of the 21st World Wide Web Conference, 2012

A low-complexity screen compression scheme.
Proceedings of the 2012 Visual Communications and Image Processing, 2012

Breaking row-column shuffle based image cipher.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Trip Mining and Recommendation from Geo-tagged Photos.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

Image Forensics with Rotation-Tolerant Resampling Detection.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

Efficient Tag Mining via Mixture Modeling for Real-Time Search-Based Image Annotation.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

AMIGO: accurate mobile image geotagging.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

Accelerometer-based single-handed video browsing on mobile devices: design and user studies.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

Non-negative low rank and sparse graph for semi-supervised learning.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

A Ranking-based Approach to Word Reordering for Statistical Machine Translation.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012

A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability.
IEEE Trans. Knowl. Data Eng., 2011

Distance metric learning from uncertain side information for automated photo tagging.
ACM Trans. Intell. Syst. Technol., 2011

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
Int. J. Comput. Commun. Control, 2011

Latent Topic Visual Language Model for Object Categorization.
Proceedings of the SIGMAP 2011, 2011

Regularized Semi-supervised Latent Dirichlet Allocation for Visual Concept Learning.
Proceedings of the Advances in Multimedia Modeling, 2011

Capacity-Approaching Codes for Reversible Data Hiding.
Proceedings of the Information Hiding - 13th International Conference, 2011

Semi-supervised Classification via Low Rank Graph.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Dynamic Background Subtraction Using Spatial-Color Binary Patterns.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

An Automatic Matching Algorithm Based on SIFT Descriptors for Remote Sensing Ship Image.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Tracking Based on SURF and Superpixel.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

ContextRank: Personalized Tourism Recommendation by Exploiting Context Information of Geotagged Web Photos.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

A New Graph Constructor for Semi-supervised Discriminant Analysis via Group Sparsity.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Edge Saliency Map Detection with Texture Suppression.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Complementary hashing for approximate nearest neighbor search.
Proceedings of the IEEE International Conference on Computer Vision, 2011

RandTest: Towards more secure and reliable dataflow processing in cloud computing.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Semantics-Preserving Bag-of-Words Models and Applications.
IEEE Trans. Image Process., 2010

Generalization and Analysis of the Paper Folding Method for Steganography.
IEEE Trans. Inf. Forensics Secur., 2010

People Summarization by Combining Named Entity Recognition and Relation Extraction.
J. Convergence Inf. Technol., 2010

Identifying camera and processing from cropped JPEG photos via tensor analysis.
Proceedings of the IEEE International Conference on Systems, 2010

Soft-Constraint Based Online LDA for Community Recommendation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Photo2Trip: an interactive trip planning system based on geo-tagged photos.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

iLike: integrating visual and textual features for vertical search.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

BioSnowball: automated population of Wikis.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

Camera Model Identification for JPEG Images via Tensor Analysis.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A robust part-based tracker.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Dual linkage refinement for YouTube video topic discovery.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

SVD based linear filtering in DCT domain.
Proceedings of the International Conference on Image Processing, 2010

Rotation robust detection of copy-move forgery.
Proceedings of the International Conference on Image Processing, 2010

CkNN monitoring based on parallel pre-computing.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

A Novel Parallel Traffic Control Mechanism for Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Scale-Invariant Visual Language Modeling for Object Categorization.
IEEE Trans. Multimedia, 2009

Passive detection of doctored JPEG image via block artifact grid extraction.
Signal Process., 2009

Learning to tag.
Proceedings of the 18th International Conference on World Wide Web, 2009

Learning Bregman Distance Functions and Its Application for Semi-Supervised Clustering.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

Semantics-preserving bag-of-words models for efficient image annotation.
Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining, 2009

Distance metric learning from uncertain side information with application to automated photo tagging.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

On cross-language image annotations.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

A robust chaos-based image encryption scheme.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Low-Resolution Face Recognition via Sparse Representation of Patches.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Image Classification via Semi-supervised pLSA.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Trajectory simplification method for location-based social networking services.
Proceedings of the 2009 International Workshop on Location Based Social Networks, 2009

Unsupervised Object Learning with AM-pLSA.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Research on Cloud Computing Based on Deep Analysis to Typical Platforms.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

2008
High-performance packet classification algorithm for multithreaded IXP network processor.
ACM Trans. Embed. Comput. Syst., 2008

A comprehensive human computation framework: with application to image labeling.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Flickr distance.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Annotating personal albums via web mining.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Multi-progressive model for web image annotation.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Learning object from small and imbalanced dataset with Boost-BFKO.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Query oriented subspace shifting for near-duplicate image detection.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

SocialRank: A ranking model for web image retrieval in web 2.0.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Tagrank - Measuring tag importance for image annotation.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Doctored JPEG image detection.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Efficient near-duplicate image detection by learning from examples.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Multi-graph similarity reinforcement for image annotation refinement.
Proceedings of the International Conference on Image Processing, 2008

Maximum Margin Clustering with Pairwise Constraints.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Designing Fault Tolerant Networks Topologies Based on Greedy Algorithm.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

Multiple-instance ranking: Learning to rank images for image retrieval.
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008

Feature Annotation for Visual Concept Detection in ImageCLEF 2008.
Proceedings of the Working Notes for CLEF 2008 Workshop co-located with the 12th European Conference on Digital Libraries (ECDL 2008) , 2008

Can phrase indexing help to process non-phrase queries?
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

2007
Accurate 3D Facial Synthesis for Plastic Surgery Simulation.
Proceedings of the Advances in Multimedia Modeling, 2007

Bipartite graph reinforcement model for web image annotation.
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Visual language modeling for image classification.
Proceedings of the 9th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2007

Volume Graph Model for 3D Facial Surface Extraction.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Image Annotation in a Progressive Way.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

A Search-Based Web Image Annotation Method.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

On Detection of Advertising Images.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Image Search Result Clustering and Re-Ranking via Partial Grouping.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Mutually beneficial learning with application to on-line news classification.
Proceedings of the First Ph.D. Workshop in CIKM, 2007

2006
A new nonlinear feature extraction method for face recognition.
Neurocomputing, 2006

Image Annotations Based on Semi-supervised Clustering with Semantic Soft Constraints.
Proceedings of the Advances in Multimedia Information Processing, 2006

Regularized Local Discrimimant Embedding.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

nReader: reading news quickly, deeply and vividly.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Face Recognition Using Neighborhood Preserving Projections.
Proceedings of the Advances in Multimedia Information Processing, 2005

Neighborhood Preserving Projections (NPP): A Novel Linear Dimension Reduction Method.
Proceedings of the Advances in Intelligent Computing, 2005

2004
Traffic engineering with constraint-based routing in DiffServ/MPLS network.
Proceedings of the 13th IEEE Workshop on Local and Metropolitan Area Networks, 2004

Fusion of SVD and LDA for face recognition.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Adaptive color quantization based on perceptive edge protection.
Pattern Recognit. Lett., 2003

On the second-order statistics of the sample covariance.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Performance of channel estimation assisted linear multiuser receivers for downlink CDMA systems with long spreading codes.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

On performance study of data based multiuser detection methods for uplink long-code CDMA systems.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...