Nenghai Yu

Orcid: 0000-0003-4417-9316

According to our database1, Nenghai Yu authored at least 575 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability.
Multim. Tools Appl., April, 2024

Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition.
IEEE Trans. Artif. Intell., March, 2024

Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks.
IEEE/ACM Trans. Netw., February, 2024

Efficient Remote Entanglement Distribution in Quantum Networks: A Segment-Based Method.
IEEE Trans. Netw. Serv. Manag., February, 2024

Deep Image Matting With Sparse User Interactions.
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024

ControlFace: Feature Disentangling for Controllable Face Swapping.
J. Imaging, January, 2024

An Efficient Scheduling Scheme of Swapping and Purification Operations for End-to-End Entanglement Distribution in Quantum Networks.
IEEE Trans. Netw. Sci. Eng., 2024

Joint Identity-Aware Mixstyle and Graph-Enhanced Prototype for Clothes-Changing Person Re-Identification.
IEEE Trans. Multim., 2024

Provably Secure Robust Image Steganography.
IEEE Trans. Multim., 2024

Exploring the Application of Large-Scale Pre-Trained Models on Adverse Weather Removal.
IEEE Trans. Image Process., 2024

PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition.
IEEE Trans. Image Process., 2024

Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography.
IEEE Trans. Inf. Forensics Secur., 2024

Toward Secure and Robust Steganography for Black-Box Generated Images.
IEEE Trans. Inf. Forensics Secur., 2024

FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs.
CoRR, 2024

Provably Secure Disambiguating Neural Linguistic Steganography.
CoRR, 2024

MiM-ISTD: Mamba-in-Mamba for Efficient Infrared Small Target Detection.
CoRR, 2024

Towards Generalist Prompting for Large Language Models by Mental Models.
CoRR, 2024

Model X-ray: Detect Backdoored Models via Decision Boundary.
CoRR, 2024

Bootstrapping Audio-Visual Segmentation by Strengthening Audio Cues.
CoRR, 2024

A Construction of Evolving k-threshold Secret Sharing Scheme over A Polynomial Ring.
CoRR, 2024

Unifying Multi-Modal Uncertainty Modeling and Semantic Alignment for Text-to-Image Person Re-identification.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

FaceRSA: RSA-Aware Facial Identity Cryptography Framework.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

MotionGPT: Finetuned LLMs Are General-Purpose Motion Generators.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Data-Free Hard-Label Robustness Stealing Attack.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

MuST: Robust Image Watermarking for Multi-Source Tracing.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

TCI-Former: Thermal Conduction-Inspired Transformer for Infrared Small Target Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Swapping-Based Entanglement Routing Design for Congestion Mitigation in Quantum Networks.
IEEE Trans. Netw. Serv. Manag., December, 2023

A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks.
IEEE Commun. Mag., December, 2023

Enhancing image steganography via adversarial optimization of the stego distribution.
Signal Process., November, 2023

Measuring the Consistency and Diversity of 3D Face Generation.
IEEE J. Sel. Top. Signal Process., November, 2023

Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks.
IEEE Trans. Artif. Intell., October, 2023

Robust Steganography for High Quality Images.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

SimQN: A Network-Layer Simulator for the Quantum Network Investigation.
IEEE Netw., September, 2023

High-fidelity video reversible data hiding using joint spatial and temporal prediction.
Signal Process., July, 2023

Semantic Probability Distribution Modeling for Diverse Semantic Image Synthesis.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2023

Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2023

AutoMA: Towards Automatic Model Augmentation for Transferable Adversarial Attacks.
IEEE Trans. Multim., 2023

OAcode: Overall Aesthetic 2D Barcode on Screen.
IEEE Trans. Multim., 2023

F<sup>2</sup>Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Cover Reproducible Steganography via Deep Generative Models.
IEEE Trans. Dependable Secur. Comput., 2023

Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code.
IEEE Trans. Dependable Secur. Comput., 2023

Some Results for the Redundancy Bound of the Optimal Ternary AIFV Codes.
IEEE Trans. Commun., 2023

Language universal font watermarking with multiple cross-media robustness.
Signal Process., 2023

Coherent adversarial deepfake video generation.
Signal Process., 2023

Future Event Prediction Based on Temporal Knowledge Graph Embedding.
Comput. Syst. Sci. Eng., 2023

Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models.
CoRR, 2023

Control Risk for Potential Misuse of Artificial Intelligence in Science.
CoRR, 2023

Performance-lossless Black-box Model Watermarking.
CoRR, 2023

Data-Free Hard-Label Robustness Stealing Attack.
CoRR, 2023

Detecting Voice Cloning Attacks via Timbre Watermarking.
CoRR, 2023

Towards More Unified In-context Visual Understanding.
CoRR, 2023

OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation.
CoRR, 2023

CMFDFormer: Transformer-based Copy-Move Forgery Detection with Continual Learning.
CoRR, 2023

FunctionMarker: Watermarking Language Datasets via Knowledge Injection.
CoRR, 2023

Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023

PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model.
CoRR, 2023

Exploiting Modality-Specific Features For Multi-Modal Manipulation Detection And Grounding.
CoRR, 2023

Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023

Aparecium: Revealing Secrets from Physical Photographs.
CoRR, 2023

MotionGPT: Finetuned LLMs are General-Purpose Motion Generators.
CoRR, 2023

HQ-50K: A Large-scale, High-quality Dataset for Image Restoration.
CoRR, 2023

GPT Paternity Test: GPT Generated Text Detection with GPT Genetic Inheritance.
CoRR, 2023

Multi-spectral Class Center Network for Face Manipulation Detection and Localization.
CoRR, 2023

Watermarking Text Generated by Black-Box Language Models.
CoRR, 2023

Clothes-Invariant Feature Learning by Causal Intervention for Clothes-Changing Person Re-identification.
CoRR, 2023

Deep Intellectual Property: A Survey.
CoRR, 2023

VQNet 2.0: A New Generation Machine Learning Framework that Unifies Classical and Quantum.
CoRR, 2023

Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions.
IEEE Commun. Surv. Tutorials, 2023

Discop: Provably Secure Steganography in Practice Based on "Distribution Copies".
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

ProTegO: Protect Text Content against OCR Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Fluid Dynamics-Inspired Network for Infrared Small Target Detection.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Calibration-based Steganalysis for Neural Network Steganography.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion.
Proceedings of the International Conference on Machine Learning, 2023

A Simple Masked Autoencoder Paradigm for Point Cloud.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023

ABMNet: Coupling Transformer with CNN Based on Adams-Bashforth-Moulton Method for Infrared Small Target Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Exploring the Limits of Differentially Private Deep Learning with Group-wise Clipping.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

It Wasn't Me: Irregular Identity in Deepfake Videos.
Proceedings of the IEEE International Conference on Image Processing, 2023

Image Translation-Based Deniable Encryption against Model Extraction Attack.
Proceedings of the IEEE International Conference on Image Processing, 2023

Revisiting TENT for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment.
Proceedings of the Image and Graphics - 12th International Conference, 2023

Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape.
Proceedings of the Image and Graphics - 12th International Conference, 2023

HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Evopose: A Recursive Transformer for 3D Human Pose Estimation with Kinematic Structure Priors.
Proceedings of the IEEE International Conference on Acoustics, 2023

ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2023

Dual-Uncertainty Guided Curriculum Learning and Part-Aware Feature Refinement for Domain Adaptive Person Re-Identification.
Proceedings of the IEEE International Conference on Acoustics, 2023

Dual-Feature Enhancement for Weakly Supervised Temporal Action Localization.
Proceedings of the IEEE International Conference on Acoustics, 2023

Image Adversarial Steganography Based on Joint Distortion.
Proceedings of the IEEE International Conference on Acoustics, 2023

BAUENet: Boundary-Aware Uncertainty Enhanced Network for Infrared Small Target Detection.
Proceedings of the IEEE International Conference on Acoustics, 2023

Compressing the Trees of Canonical Binary AIFV Coding.
Proceedings of the Data Compression Conference, 2023

Diversity-Aware Meta Visual Prompting.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

AutoStegaFont: Synthesizing Vector Fonts for Hiding Information in Documents.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

DeAR: A Deep-Learning-Based Audio Re-recording Resilient Watermarking.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Three-Dimensional Mesh Steganography and Steganalysis: A Review.
IEEE Trans. Vis. Comput. Graph., 2022

JPEG Robust Invertible Grayscale.
IEEE Trans. Vis. Comput. Graph., 2022

Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud.
IEEE Trans. Serv. Comput., 2022

Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis.
IEEE Trans. Multim., 2022

TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability.
IEEE Trans. Multim., 2022

Poison Ink: Robust and Invisible Backdoor Attack.
IEEE Trans. Image Process., 2022

E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion.
IEEE Trans. Image Process., 2022

Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models.
IEEE Trans. Dependable Secur. Comput., 2022

Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix.
IEEE Trans. Circuits Syst. Video Technol., 2022

Fidelity-Guaranteed Entanglement Routing in Quantum Networks.
IEEE Trans. Commun., 2022

A Heuristic Remote Entanglement Distribution Algorithm on Memory-Limited Quantum Paths.
IEEE Trans. Commun., 2022

Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Improving robust adaptive steganography via minimizing channel errors.
Signal Process., 2022

A cluster-based networking approach for large-scale and wide-area quantum key agreement.
Quantum Inf. Process., 2022

Deep Model Intellectual Property Protection via Deep Watermarking.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Efficient Semantic Image Synthesis via Class-Adaptive Normalization.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

An Asynchronous Entanglement Distribution Protocol for Quantum Networks.
IEEE Netw., 2022

Connection-Oriented and Connectionless Remote Entanglement Distribution Strategies in Quantum Networks.
IEEE Netw., 2022

Robustness enhancement against adversarial steganography via steganalyzer outputs.
J. Inf. Secur. Appl., 2022

Online multi-object tracking with unsupervised re-identification learning and occlusion estimation.
Neurocomputing, 2022

Detecting conflict of heterogeneous access control policies.
Digit. Commun. Networks, 2022

Deep 3D mesh watermarking with self-adaptive robustness.
Cybersecur., 2022

CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet.
CoRR, 2022

X-Paste: Revisit Copy-Paste at Scale with CLIP and StableDiffusion.
CoRR, 2022

PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition.
CoRR, 2022

Invertible Mask Network for Face Privacy-Preserving.
CoRR, 2022

Protecting Celebrities with Identity Consistency Transformer.
CoRR, 2022

Self-supervised Transformer for Deepfake Detection.
CoRR, 2022

Certified defense against patch attacks via mask-guided randomized smoothing.
Sci. China Inf. Sci., 2022

Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control.
Proceedings of the IEEE International Conference on Trust, 2022

Multi-view Geometry Distillation for Cloth-Changing Person ReID.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

Cloth-Aware Center Cluster Loss for Cloth-Changing Person Re-identification.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

Privacy-preserving Cost-sensitive Federated Learning from Imbalanced Data.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Towards Intrinsic Common Discriminative Features Learning for Face Forgery Detection Using Adversarial Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Font Watermarking Network for Text Images.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Capturing the Lighting Inconsistency for Deepfake Detection.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Noise Simulation-Based Deep Optical Watermarking.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage.
Proceedings of the IEEE International Conference on Communications, 2022

ADT: Anti-Deepfake Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2022

An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression.
Proceedings of the IEEE International Conference on Acoustics, 2022

Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2022

Privacy-preserving Collaborative Learning with Scalable Image Transformation and Autoencoder.
Proceedings of the IEEE Global Communications Conference, 2022

UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022

Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification.
Proceedings of the Computer Vision - ECCV 2022, 2022

Bootstrapped Masked Autoencoders for Vision BERT Pretraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

Compressing the Tree of Canonical Huffman Coding.
Proceedings of the Data Compression Conference, 2022

HairCLIP: Design Your Hair by Text and Reference Image.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Reduce Information Loss in Transformers for Pluralistic Image Inpainting.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Shape-invariant 3D Adversarial Point Clouds.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Protecting Celebrities from DeepFake with Identity Consistency Transformer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Blacktooth: Breaking through the Defense of Bluetooth in Silence.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images.
Proceedings of the Computer Vision - ACCV 2022, 2022

Tracing Text Provenance via Context-Aware Lexical Substitution.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Feature-Preserving Tensor Voting Model for Mesh Steganalysis.
IEEE Trans. Vis. Comput. Graph., 2021

Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance.
IEEE Trans. Inf. Forensics Secur., 2021

BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2021

Real Time Video Object Segmentation in Compressed Domain.
IEEE Trans. Circuits Syst. Video Technol., 2021

Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry.
IEEE Trans. Circuits Syst. Video Technol., 2021

Deep Template-Based Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2021

Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric.
IEEE Trans. Circuits Syst. Video Technol., 2021

Adversarial batch image steganography against CNN-based pooled steganalysis.
Signal Process., 2021

A practical quantum designated verifier signature scheme for E-voting applications.
Quantum Inf. Process., 2021

An improved QKD protocol without public announcement basis using periodically derived basis.
Quantum Inf. Process., 2021

A General Decoupled Learning Framework for Parameterized Image Operators.
IEEE Trans. Pattern Anal. Mach. Intell., 2021

Explicit Filterbank Learning for Neural Image Style Transfer and Image Processing.
IEEE Trans. Pattern Anal. Mach. Intell., 2021

Motion vector modification distortion analysis-based payload allocation for video steganography.
J. Vis. Commun. Image Represent., 2021

Adversarial steganography based on sparse cover enhancement.
J. Vis. Commun. Image Represent., 2021

Improving UNIWARD distortion function via isotropic construction and hierarchical merging.
J. Vis. Commun. Image Represent., 2021

A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications.
J. Organ. End User Comput., 2021

<i>CDAE</i>: Color decomposition-based adversarial examples for screen devices.
Inf. Sci., 2021

InPPTD: A Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowdsensing Systems.
IEEE Internet Things J., 2021

Demonstration actor critic.
Neurocomputing, 2021

Adversarial defense via self-orthogonal randomization super-network.
Neurocomputing, 2021

Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup.
IACR Cryptol. ePrint Arch., 2021

Face Swapping Consistency Transfer with Neural Identity Carrier.
Future Internet, 2021

PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers.
CoRR, 2021

Unsupervised Finetuning.
CoRR, 2021

Improving Dither Modulation based Robust Steganography by Overflow Suppression.
CoRR, 2021

Deep 3D Mesh Watermarking with Self-Adaptive Robustness.
CoRR, 2021

Poison Ink: Robust and Invisible Backdoor Attack.
CoRR, 2021

Exploring Structure Consistency for Deep Model Watermarking.
CoRR, 2021

Cascaded Residual Density Network for Crowd Counting.
CoRR, 2021

Abnormal Behavior Detection Based on Target Analysis.
CoRR, 2021

A Simple Baseline for StyleGAN Inversion.
CoRR, 2021

Towards Generalizable and Robust Face Manipulation Detection via Bag-of-local-feature.
CoRR, 2021

WiLay: A Two-Layer Human Localization and Activity Recognition System Using WiFi.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Towards Generalizable and Robust Face Manipulation Detection via Bag-of-feature.
Proceedings of the International Conference on Visual Communications and Image Processing, 2021

Nearly Reversible Image-to-Image Translation Using Joint Inter-Frame Coding and Embedding.
Proceedings of the International Conference on Visual Communications and Image Processing, 2021

A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack.
Proceedings of the 20th IEEE International Conference on Trust, 2021

HTCN: Harmonious Text Colorization Network for Visual-Textual Presentation Design.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Convolutional Neural Network-driven Optimal Prediction for Image Reversible Data Hiding.
Proceedings of the 23rd International Workshop on Multimedia Signal Processing, 2021

Efficient Open-Set Adversarial Attacks on Deep Face Recognition.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Content-Independent Online Handwriting Verification Based on Multi-Modal Fusion.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Return-Based Contrastive Representation Learning for Reinforcement Learning.
Proceedings of the 9th International Conference on Learning Representations, 2021

Fsft-Net: Face Transfer Video Generation With Few-Shot Views.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Deepfake Video Detection Using 3D-Attentional Inception Convolutional Neural Network.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Towards More Powerful Multi-column Convolutional Network for Crowd Counting.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Talking Face Video Generation with Editable Expression.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Improve Unsupervised Pretraining for Few-label Transfer.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

ISNet: Integrate Image-Level and Semantic-Level Context for Semantic Segmentation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Adversarial Examples Detection Beyond Image Space.
Proceedings of the IEEE International Conference on Acoustics, 2021

Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble Method.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Multi-Attentional Deepfake Detection.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Improved Image Matting via Real-Time User Clicks and Uncertainty Estimation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Diverse Semantic Image Synthesis via Probability Distribution Modeling.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Undetectable JPEG Image Batch Reversible Data Hiding with Content-adaptive Payload Allocation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

Joint Color-irrelevant Consistency Learning and Identity-aware Modality Adaptation for Visible-infrared Cross Modality Person Re-identification.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Initiative Defense against Facial Manipulation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Temporal ROI Align for Video Object Recognition.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Towards Anti-Interference Human Activity Recognition Based on WiFi Subcarrier Correlation Selection.
IEEE Trans. Veh. Technol., 2020

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud.
IEEE Trans. Serv. Comput., 2020

MichiGAN: multi-input-conditioned hair image generation for portrait editing.
ACM Trans. Graph., 2020

Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks.
IEEE Trans. Multim., 2020

SAFNet: A Semi-Anchor-Free Network With Enhanced Feature Pyramid for Object Detection.
IEEE Trans. Image Process., 2020

Controllable Image Processing via Adaptive FilterBank Pyramid.
IEEE Trans. Image Process., 2020

Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
IEEE Trans. Inf. Forensics Secur., 2020

SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities.
IEEE Trans. Inf. Forensics Secur., 2020

Shortening the Cover for Fast JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

JPEG Steganography With Estimated Side-Information.
IEEE Trans. Circuits Syst. Video Technol., 2020

A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents.
IEEE Trans. Circuits Syst. Video Technol., 2020

Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio.
IEEE Trans. Circuits Syst. Video Technol., 2020

Variants of Golomb Coding and the n-ary Versions.
IEEE Trans. Commun., 2020

Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes.
IEEE Trans. Commun., 2020

A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Fast Encoding Algorithms for Reed-Solomon Codes With Between Four and Seven Parity Symbols.
IEEE Trans. Computers, 2020

Robust adaptive steganography based on generalized dither modulation and expanded embedding domain.
Signal Process., 2020

Real-time attacks on robust watermarking tools in the wild by CNN.
J. Real Time Image Process., 2020

Efficient and privacy-preserving authentication scheme for wireless body area networks.
J. Inf. Secur. Appl., 2020

Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs.
IET Inf. Secur., 2020

Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks.
IACR Cryptol. ePrint Arch., 2020

Are Fewer Labels Possible for Few-shot Learning?
CoRR, 2020

Semantic Image Synthesis via Efficient Class-Adaptive Normalization.
CoRR, 2020

Identity-Driven DeepFake Detection.
CoRR, 2020

Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks.
CoRR, 2020

An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization.
CoRR, 2020

Rethinking Spatially-Adaptive Normalization.
CoRR, 2020

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem.
Comput. Commun., 2020

Passport-aware Normalization for Deep Model Protection.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

GreedyFool: Distortion-Aware Sparse Adversarial Attack.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Defining Embedding Distortion for Sample Adaptive Offset-Based HEVC Video Steganography.
Proceedings of the 22nd IEEE International Workshop on Multimedia Signal Processing, 2020

Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Towards Anti-interference WiFi-based Activity Recognition System Using Interference-Independent Phase Component.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

GSM: Graph Similarity Model for Multi-Object Tracking.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Research on Online Leakage Assessment.
Proceedings of the Data Science, 2020

A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Spatial-Temporal Feature Aggregation Network For Video Object Detection.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Self-Supervised Adversarial Training.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Cross-Modality Person Re-Identification With Shared-Specific Feature Transfer.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Density-Aware Graph for Deep Semi-Supervised Visual Recognition.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Robust Superpixel-Guided Attentional Adversarial Attack.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Self-Robust 3D Point Recognition via Gather-Vector Guidance.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Privacy Preserving on Updated Parameters in Federated Learning.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

Model Watermarking for Image Processing Networks.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

DASOT: A Unified Framework Integrating Data Association and Single Object Tracking for Online Multi-Object Tracking.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019

Distortion Design for Secure Adaptive 3-D Mesh Steganography.
IEEE Trans. Multim., 2019

AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network.
IEEE Trans. Inf. Forensics Secur., 2019

Screen-Shooting Resilient Watermarking.
IEEE Trans. Inf. Forensics Secur., 2019

Defining Cost Functions for Adaptive JPEG Steganography at the Microscale.
IEEE Trans. Inf. Forensics Secur., 2019

Reversible Data Hiding in Color Image With Grayscale Invariance.
IEEE Trans. Circuits Syst. Video Technol., 2019

New Locally Correctable Codes Based on Projective Reed-Muller Codes.
IEEE Trans. Commun., 2019

Content-adaptive reversible visible watermarking in encrypted images.
Signal Process., 2019

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks.
Secur. Commun. Networks, 2019

A no-reference quality assessment for contrast-distorted image based on improved learning method.
Multim. Tools Appl., 2019

Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection.
Multim. Tools Appl., 2019

Object and patch based anomaly detection and localization in crowded scenes.
Multim. Tools Appl., 2019

A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization.
Multim. Tools Appl., 2019

Anomaly residual prediction with spatial-temporal and perceptual constraints.
J. Electronic Imaging, 2019

Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras.
IEEE Internet Things J., 2019

A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks.
IEEE Internet Things J., 2019

Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data.
IEEE Internet Things J., 2019

Using multi-label classification to improve object detection.
Neurocomputing, 2019

Controversial 'pixel' prior rule for JPEG adaptive steganography.
IET Image Process., 2019

Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019

Irregular MDS Array Codes With Fewer Parity Symbols.
IEEE Commun. Lett., 2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret.
CoRR, 2019

A Large Scale Urban Surveillance Video Dataset for Multiple-Object Tracking and Behavior Analysis.
CoRR, 2019

Data Exfiltration via Multipurpose RFID Cards and Countermeasures.
CoRR, 2019

Anonymous authentication scheme for smart home environment with provable security.
Comput. Secur., 2019

Potential risk of IoT device supporting IR remote control.
Comput. Networks, 2019

A Class of In-Place Linear Transformations Possessing the Cache-Oblivious Property.
IEEE Access, 2019

JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds.
IEEE Access, 2019

Real-Time Online Multi-Object Tracking in Compressed Domain.
IEEE Access, 2019

Scale Voting With Pyramidal Feature Fusion Network for Person Search.
IEEE Access, 2019

Learning Pixel-Level and Instance-Level Context-Aware Features for Pedestrian Detection in Crowds.
IEEE Access, 2019

Bitcoin Blockchain Compression Algorithm for Blank Node Synchronization.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

PPML: Metric Learning with Prior Probability for Video Object Segmentation.
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019

Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo).
Proceedings of the IEEE INFOCOM 2019, 2019

UnseenCode: Invisible On-screen Barcode with Image-based Extraction.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Tracking Assisted Faster Video Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Real Time Compressed Video Object Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Query-Free Embedding Attack Against Deep Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

G-SGD: Optimizing ReLU Neural Networks in its Positively Scale-Invariant Space.
Proceedings of the 7th International Conference on Learning Representations, 2019

Cascaded Residual Density Network for Crowd Counting.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Direct Adversarial Attack on Stego Sandwiched Between Black Boxes.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Emerging applications of reversible data hiding.
Proceedings of the 2nd International Conference on Image and Graphics Processing, 2019

Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification.
Proceedings of the Image and Graphics - 10th International Conference, 2019

Enhanced Video Segmentation with Object Tracking.
Proceedings of the Image and Graphics - 10th International Conference, 2019

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Memory-Based Neighbourhood Embedding for Visual Recognition.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Context and Attribute Grounded Dense Captioning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Semantics Disentangling for Text-To-Image Generation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Capacity Control of ReLU Neural Networks by Basis-Path Norm.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Trust Region Evolution Strategies.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models.
IEEE Trans. Multim., 2018

Reversible Data Hiding Under Inconsistent Distortion Metrics.
IEEE Trans. Image Process., 2018

Crowd Tracking by Group Structure Evolution.
IEEE Trans. Circuits Syst. Video Technol., 2018

Reversible data hiding in JPEG image based on DCT frequency and block selection.
Signal Process., 2018

Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing.
IEEE Netw., 2018

A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.
Multim. Tools Appl., 2018

Which gray level should be given the smallest cost for adaptive steganography?
Multim. Tools Appl., 2018

Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification.
Multim. Tools Appl., 2018

Targeted attack and security enhancement on texture synthesis based steganography.
J. Vis. Commun. Image Represent., 2018

Reversible visual transformation via exploring the correlations within color images.
J. Vis. Commun. Image Represent., 2018

Fast Video Stitching for Aerially Captured HD Videos.
Int. J. Image Graph., 2018

Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.
CoRR, 2018

Real-Time Anomaly Detection With HMOF Feature.
CoRR, 2018

Provably Secure Steganography on Generative Media.
CoRR, 2018

CAAD 2018: Iterative Ensemble Adversarial Attack.
CoRR, 2018

CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.
CoRR, 2018

Reversible Adversarial Examples.
CoRR, 2018

Detecting Adversarial Examples Based on Steganalysis.
CoRR, 2018

IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals.
CoRR, 2018

Robust Anomaly Detection via Fusion of Appearance and Motion Features.
Proceedings of the IEEE Visual Communications and Image Processing, 2018

Low-Latency Authentication Against Satellite Compromising for Space Information Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Improving the Embedding Strategy for Batch Adaptive Steganography.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Provably Secure Generative Steganography Based on Autoregressive Model.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A multi-task framework with feature passing module for skin lesion classification and segmentation.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018

Adversarial Examples Against Deep Neural Network based Steganalysis.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Defining Joint Distortion for JPEG Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Real-time Anomaly Detection with HMOF Feature.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

Model-Level Dual Learning.
Proceedings of the 35th International Conference on Machine Learning, 2018

Anomaly Detection and Localization: A Novel Two-Phase Framework Based on Trajectory-Level Characteristics.
Proceedings of the 2018 IEEE International Conference on Multimedia & Expo Workshops, 2018

Flow Guided Siamese Network for Visual Tracking.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Pyramid Sub-Region Sensitive Network for Object Detection.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Binary "proximity patches motion" descriptor for action recognition in videos.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018

Text Semantic Steganalysis Based on Word Embedding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Covert Communication by Exploring Statistical and Linguistical Distortion in Text.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Object-Oriented Anomaly Detection in Surveillance Videos.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Zoom-Net: Mining Deep Feature Interactions for Visual Relationship Recognition.
Proceedings of the Computer Vision - ECCV 2018, 2018

Decouple Learning for Parameterized Image Operators.
Proceedings of the Computer Vision - ECCV 2018, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Robust Audio Watermarking Algorithm Based on Air Channel Characteristics.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Stereoscopic Neural Style Transfer.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Efficient Human Action Recognition Interface for Augmented and Virtual Reality Applications Based on Binary Descriptor.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2018

2017
Large-Scale Online Feature Selection for Ultra-High Dimensional Sparse Data.
ACM Trans. Knowl. Discov. Data, 2017

Comments on "Steganography Using Reversible Texture Synthesis".
IEEE Trans. Image Process., 2017

A New Rule for Cost Reassignment in Adaptive Steganography.
IEEE Trans. Inf. Forensics Secur., 2017

Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving.
IEEE Trans. Inf. Forensics Secur., 2017

Decomposing Joint Distortion for Adaptive Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2017

CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding.
IEEE Trans. Computers, 2017

Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth.
Secur. Commun. Networks, 2017

Unified entropy-based sorting for reversible data hiding.
Multim. Tools Appl., 2017

Optimal structural similarity constraint for reversible data hiding.
Multim. Tools Appl., 2017

Smart motion reconstruction system for golf swing: a DBN model based transportable, non-intrusive and inexpensive golf swing capture and reconstruction system.
Multim. Tools Appl., 2017

Semi-order preserving encryption.
Inf. Sci., 2017

Finite budget analysis of multi-armed bandit problems.
Neurocomputing, 2017

SOL: A library for scalable online learning algorithms.
Neurocomputing, 2017

Enhanced Attacks on Defensively Distilled Deep Neural Networks.
CoRR, 2017

Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators.
CoRR, 2017

Sequence Generation with Target Attention.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Visual Tracking by Deep Discriminative Map.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Anomaly Detection with Passive Aggressive Online Gaussian Model Estimation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Deliberation Networks: Sequence Generation Beyond One-Pass Decoding.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

Receive Buffer Pre-division Based Flow Control for MPTCP.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Dual Inference for Machine Learning.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Asynchronous Stochastic Gradient Descent with Delay Compensation.
Proceedings of the 34th International Conference on Machine Learning, 2017

Dual Supervised Learning.
Proceedings of the 34th International Conference on Machine Learning, 2017

Neural network with saliency based feature selection ability.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Key-Region Representation Learning for Anomaly Detection.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Deep Scale Feature for Visual Tracking.
Proceedings of the Image and Graphics - 9th International Conference, 2017

PPEDNet: Pyramid Pooling Encoder-Decoder Network for Real-Time Semantic Segmentation.
Proceedings of the Image and Graphics - 9th International Conference, 2017

TCCF: Tracking Based on Convolutional Neural Network and Correlation Filters.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Secure Image Denoising over Two Clouds.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Coherent Online Video Style Transfer.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Probability-p Order-Preserving Encryption.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Robust visual tracking with deep feature fusion.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Range Queries on Two Column Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Extracting Sift Keypoints in DCT Domain.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

StyleBank: An Explicit Representation for Neural Image Style Transfer.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

2016
Secure Nonlocal Denoising in Outsourced Images.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Reversible Data Hiding in Encrypted Images by Reversible Image Transformation.
IEEE Trans. Multim., 2016

Monet: A System for Reliving Your Memories by Theme-Based Photo Storytelling.
IEEE Trans. Multim., 2016

Ada-Sal Network: emulate the Human Visual System.
Signal Process. Image Commun., 2016

Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams.
Signal Process., 2016

Improving visual quality of reversible data hiding by twice sorting.
Multim. Tools Appl., 2016

Protecting patient confidential information based on ECG reversible data hiding.
Multim. Tools Appl., 2016

Image camouflage by reversible image transformation.
J. Vis. Commun. Image Represent., 2016

Locality-preserving low-rank representation for graph construction from nonlinear manifolds.
Neurocomputing, 2016

Multi-level visual tracking with hierarchical tree structural constraint.
Neurocomputing, 2016

Reversible data hiding in medical images with enhanced contrast in texture area.
Digit. Signal Process., 2016

Asynchronous Stochastic Gradient Descent with Delay Compensation for Distributed Deep Learning.
CoRR, 2016

Defining cost functions for adaptive steganography at the microscale.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Dual Learning for Machine Translation.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Second Order Perdicting-Error Sorting for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Budgeted Multi-Armed Bandits with Multiple Plays.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016

Anomaly detection via 3D-HOF and fast double sparse representation.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Consistent matching based on boosted salience channels for group re-identification.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Part-based multi-graph ranking for visual tracking.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Reversible image processing via reversible data hiding.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016

Best Action Selection in a Stochastic Environment.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Constructing a Nonnegative Low-Rank and Sparse Graph With Data-Adaptive Features.
IEEE Trans. Image Process., 2015

Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications.
IEEE Trans. Image Process., 2015

Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
IEEE Trans. Inf. Forensics Secur., 2015

Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2015

Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015

MoVieUp: Automatic Mobile Video Mashup.
IEEE Trans. Circuits Syst. Video Technol., 2015

Mobile cloud computing based privacy protection in location-based information survey applications.
Secur. Commun. Networks, 2015

Defining embedding distortion for motion vector-based video steganography.
Multim. Tools Appl., 2015

Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Multi-target Tracking via Max-Entropy Target Selection and Heterogeneous Camera Fusion.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

Thompson Sampling for Budgeted Multi-Armed Bandits.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Person re-identification by the marriage of KISS metric learning and post-rank optimization: KISSPOP.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

Online shared dictionary learning for visual tracking.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

Improve Neural Network Using Saliency.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Cooperative Target Tracking in Dual-Camera System with Bidirectional Information Fusion.
Proceedings of the Image and Graphics - 8th International Conference, 2015

A Robust Occlusion Judgment Scheme for Target Tracking Under the Framework of Particle Filter.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Moving Object Segmentation by Length-Unconstrained Trajectory Analysis.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Economic Costs of Multi-sever Private Information Retrieval in Cloud Computing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

Budgeted Bandit Problems with Continuous Random Costs.
Proceedings of The 7th Asian Conference on Machine Learning, 2015

2014
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics.
IEEE Trans. Computers, 2014

Reversibility improved data hiding in encrypted images.
Signal Process., 2014

Recursive code construction for reversible data hiding in DCT domain.
Multim. Tools Appl., 2014

The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications.
Int. J. Distributed Sens. Networks, 2014

Reversible Data Hiding for DNA Sequences and Its Applications.
Int. J. Digit. Crime Forensics, 2014

Optimizing Non-Local Pixel Predictors for Reversible Data Hiding.
Int. J. Digit. Crime Forensics, 2014

Towards optimal noise distribution for privacy preserving in data aggregation.
Comput. Secur., 2014

Adaptive ±1 Steganography in Extended Noisy Region.
Comput. J., 2014

Moving object detection of dynamic scenes using spatio-temporal context and background modeling.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Optimized Distances for Binary Code Ranking.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Salable Image Search with Reliable Binary Code.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Non-local Denoising in Encrypted Images.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Quadtree-based optimal path routing with the smallest routing table size.
Proceedings of the IEEE Global Communications Conference, 2014

Crowd Tracking with Dynamic Evolution of Group Structures.
Proceedings of the Computer Vision - ECCV 2014, 2014

Fast tamper location of batch DNA sequences based on reversible data hiding.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

Redundant and Relay Assistant Scheduling of Small Satellites.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Incentivizing High-Quality Content from Heterogeneous Users: On the Existence of Nash Equilibrium.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Distributed Hash Table - Theory, Platforms and Applications.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9008-1, 2013

FoCUS: Learning to Crawl Web Forums.
IEEE Trans. Knowl. Data Eng., 2013

Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression.
IEEE Trans. Image Process., 2013

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Inf. Forensics Secur., 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

A Low-Complexity Screen Compression Scheme for Interactive Screen Sharing.
IEEE Trans. Circuits Syst. Video Technol., 2013

Intelligent processing techniques for semantic-based image and video retrieval.
Neurocomputing, 2013

Learning from contextual information of geo-tagged web photos to rank personalized tourism attractions.
Neurocomputing, 2013

Order preserving hashing for approximate nearest neighbor search.
Proceedings of the ACM Multimedia Conference, 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

High precision rotation angle estimation for rotated images.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Online travel destination recommendation with efficient variable memory Markov model.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Large scale image retrieval with visual groups.
Proceedings of the IEEE International Conference on Image Processing, 2013

High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

Moving Object Detection for Moving Cameras on Superpixel Level.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

MOS-Based Channel Allocation Schemes for Mixed Services over Cognitive Radio Networks.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

Toward Optimal Additive Noise Distribution for Privacy Protection in Mobile Statistics Aggregation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Tamper restoration on DNA sequences based on reversible data hiding.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

Word Alignment Modeling with Context Dependent Deep Neural Network.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

2012
Learning Bregman Distance Functions for Semi-Supervised Clustering.
IEEE Trans. Knowl. Data Eng., 2012

Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.
IEEE Trans. Image Process., 2012

Fast Matrix Embedding by Matrix Extending.
IEEE Trans. Inf. Forensics Secur., 2012

Flickr Distance: A Relationship Measure for Visual Concepts.
IEEE Trans. Pattern Anal. Mach. Intell., 2012

Color Image Quality Assessment Based on CIEDE2000.
Adv. Multim., 2012

A Design Method of Saturation Test Image Based on CIEDE2000.
Adv. Multim., 2012

Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data.
Adv. Multim., 2012

FoCUS: learning to crawl web forums.
Proceedings of the 21st World Wide Web Conference, 2012

A low-complexity screen compression scheme.
Proceedings of the 2012 Visual Communications and Image Processing, 2012

Breaking row-column shuffle based image cipher.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Trip Mining and Recommendation from Geo-tagged Photos.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

Image Forensics with Rotation-Tolerant Resampling Detection.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

Efficient Tag Mining via Mixture Modeling for Real-Time Search-Based Image Annotation.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

AMIGO: accurate mobile image geotagging.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

Accelerometer-based single-handed video browsing on mobile devices: design and user studies.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

Non-negative low rank and sparse graph for semi-supervised learning.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

A Ranking-based Approach to Word Reordering for Statistical Machine Translation.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012

A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability.
IEEE Trans. Knowl. Data Eng., 2011

Distance metric learning from uncertain side information for automated photo tagging.
ACM Trans. Intell. Syst. Technol., 2011

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
Int. J. Comput. Commun. Control, 2011

Latent Topic Visual Language Model for Object Categorization.
Proceedings of the SIGMAP 2011, 2011

Regularized Semi-supervised Latent Dirichlet Allocation for Visual Concept Learning.
Proceedings of the Advances in Multimedia Modeling, 2011

Capacity-Approaching Codes for Reversible Data Hiding.
Proceedings of the Information Hiding - 13th International Conference, 2011

Semi-supervised Classification via Low Rank Graph.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Dynamic Background Subtraction Using Spatial-Color Binary Patterns.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

An Automatic Matching Algorithm Based on SIFT Descriptors for Remote Sensing Ship Image.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Tracking Based on SURF and Superpixel.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

ContextRank: Personalized Tourism Recommendation by Exploiting Context Information of Geotagged Web Photos.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

A New Graph Constructor for Semi-supervised Discriminant Analysis via Group Sparsity.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Edge Saliency Map Detection with Texture Suppression.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Complementary hashing for approximate nearest neighbor search.
Proceedings of the IEEE International Conference on Computer Vision, 2011

RandTest: Towards more secure and reliable dataflow processing in cloud computing.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Semantics-Preserving Bag-of-Words Models and Applications.
IEEE Trans. Image Process., 2010

Generalization and Analysis of the Paper Folding Method for Steganography.
IEEE Trans. Inf. Forensics Secur., 2010

People Summarization by Combining Named Entity Recognition and Relation Extraction.
J. Convergence Inf. Technol., 2010

Identifying camera and processing from cropped JPEG photos via tensor analysis.
Proceedings of the IEEE International Conference on Systems, 2010

Soft-Constraint Based Online LDA for Community Recommendation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Photo2Trip: an interactive trip planning system based on geo-tagged photos.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

iLike: integrating visual and textual features for vertical search.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

BioSnowball: automated population of Wikis.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

Camera Model Identification for JPEG Images via Tensor Analysis.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A robust part-based tracker.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Dual linkage refinement for YouTube video topic discovery.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

SVD based linear filtering in DCT domain.
Proceedings of the International Conference on Image Processing, 2010

Rotation robust detection of copy-move forgery.
Proceedings of the International Conference on Image Processing, 2010

CkNN monitoring based on parallel pre-computing.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

A Novel Parallel Traffic Control Mechanism for Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Scale-Invariant Visual Language Modeling for Object Categorization.
IEEE Trans. Multim., 2009

Passive detection of doctored JPEG image via block artifact grid extraction.
Signal Process., 2009

Learning to tag.
Proceedings of the 18th International Conference on World Wide Web, 2009

Learning Bregman Distance Functions and Its Application for Semi-Supervised Clustering.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009

Semantics-preserving bag-of-words models for efficient image annotation.
Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining, 2009

Distance metric learning from uncertain side information with application to automated photo tagging.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

On cross-language image annotations.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

A robust chaos-based image encryption scheme.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Low-Resolution Face Recognition via Sparse Representation of Patches.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Image Classification via Semi-supervised pLSA.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Trajectory simplification method for location-based social networking services.
Proceedings of the 2009 International Workshop on Location Based Social Networks, 2009

Unsupervised Object Learning with AM-pLSA.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Research on Cloud Computing Based on Deep Analysis to Typical Platforms.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

2008
High-performance packet classification algorithm for multithreaded IXP network processor.
ACM Trans. Embed. Comput. Syst., 2008

A comprehensive human computation framework: with application to image labeling.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Flickr distance.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Annotating personal albums via web mining.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Multi-progressive model for web image annotation.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Learning object from small and imbalanced dataset with Boost-BFKO.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Query oriented subspace shifting for near-duplicate image detection.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

SocialRank: A ranking model for web image retrieval in web 2.0.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Tagrank - Measuring tag importance for image annotation.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Doctored JPEG image detection.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Efficient near-duplicate image detection by learning from examples.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Multi-graph similarity reinforcement for image annotation refinement.
Proceedings of the International Conference on Image Processing, 2008

Maximum Margin Clustering with Pairwise Constraints.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Designing Fault Tolerant Networks Topologies Based on Greedy Algorithm.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

Multiple-instance ranking: Learning to rank images for image retrieval.
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008

Feature Annotation for Visual Concept Detection in ImageCLEF 2008.
Proceedings of the Working Notes for CLEF 2008 Workshop co-located with the 12th European Conference on Digital Libraries (ECDL 2008) , 2008

Can phrase indexing help to process non-phrase queries?
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

2007
Accurate 3D Facial Synthesis for Plastic Surgery Simulation.
Proceedings of the Advances in Multimedia Modeling, 2007

Bipartite graph reinforcement model for web image annotation.
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Visual language modeling for image classification.
Proceedings of the 9th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2007

Volume Graph Model for 3D Facial Surface Extraction.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Image Annotation in a Progressive Way.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

A Search-Based Web Image Annotation Method.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

On Detection of Advertising Images.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Image Search Result Clustering and Re-Ranking via Partial Grouping.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Mutually beneficial learning with application to on-line news classification.
Proceedings of the First Ph.D. Workshop in CIKM, 2007

2006
A new nonlinear feature extraction method for face recognition.
Neurocomputing, 2006

Image Annotations Based on Semi-supervised Clustering with Semantic Soft Constraints.
Proceedings of the Advances in Multimedia Information Processing, 2006

Regularized Local Discrimimant Embedding.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

nReader: reading news quickly, deeply and vividly.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Face Recognition Using Neighborhood Preserving Projections.
Proceedings of the Advances in Multimedia Information Processing, 2005

Neighborhood Preserving Projections (NPP): A Novel Linear Dimension Reduction Method.
Proceedings of the Advances in Intelligent Computing, 2005

2004
Traffic engineering with constraint-based routing in DiffServ/MPLS network.
Proceedings of the 13th IEEE Workshop on Local and Metropolitan Area Networks, 2004

Fusion of SVD and LDA for face recognition.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Adaptive color quantization based on perceptive edge protection.
Pattern Recognit. Lett., 2003

On the second-order statistics of the sample covariance.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Performance of channel estimation assisted linear multiuser receivers for downlink CDMA systems with long spreading codes.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

On performance study of data based multiuser detection methods for uplink long-code CDMA systems.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...