Wei Sun

Affiliations:
  • Sun Yat-sen University, School of Electronics and Information Technology, Key Laboratory of Information Technology (Ministry of Education), Guangzhou, China
  • Sun Yat-Sen University, School of Software, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China


According to our database1, Wei Sun authored at least 57 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Unsupervised Intrinsic Image Decomposition Using Internal Self-Similarity Cues.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics.
Comput. Secur., 2022

Space-correlated Contrastive Representation Learning with Multiple Instances.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

A Hybrid Intrusion Detection System for for In-Vehicle CAN Bus.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

2021
A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics.
Multim. Syst., 2021

Joint regression and learning from pairwise rankings for personalized image aesthetic assessment.
Comput. Vis. Media, 2021

Towards multi-operation image anti-forensics with generative adversarial networks.
Comput. Secur., 2021

Cross-Architecture Intemet-of-Things Malware Detection Based on Graph Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
A Generative Adversarial Network Framework for JPEG Anti-Forensics.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

Densely Connected Convolutional Network for Audio Spoofing Detection.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
Copy-move forgery detection using combined features and transitive matching.
Multim. Tools Appl., 2019

Region duplication detection based on hybrid feature and evaluative clustering.
Multim. Tools Appl., 2019

Defocus blur detection based on multiscale SVD fusion in gradient domain.
J. Vis. Commun. Image Represent., 2019

A Method and Application for Constructing a Authentic Data Space.
Proceedings of the 2019 IEEE International Conference on Internet of Things and Intelligence System, 2019

2018
Region duplication detection based on image segmentation and keypoint contexts.
Multim. Tools Appl., 2018

2017
Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching.
Multim. Tools Appl., 2017

2016
Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Signal Process. Image Commun., 2016

Meaningful (2, <i>i n f i n i t y</i>) secret image sharing scheme based on flipping operations.
Multim. Tools Appl., 2016

2015
Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture.
IEEE Trans. Inf. Forensics Secur., 2015

Non-expansible XOR-based visual cryptography scheme with meaningful shares.
Signal Process., 2015

High payload image steganography with minimum distortion based on absolute moment block truncation coding.
Multim. Tools Appl., 2015

Novel steganographic method based on generalized K-distance N-dimensional pixel matching.
Multim. Tools Appl., 2015

User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion.
J. Vis. Commun. Image Represent., 2015

Binary image steganalysis based on pixel mesh Markov transition matrix.
J. Vis. Commun. Image Represent., 2015

Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Extended Capabilities for XOR-Based Visual Cryptography.
IEEE Trans. Inf. Forensics Secur., 2014

High-capacity reversible data hiding in encrypted images by prediction error.
Signal Process., 2014

Improved tagged visual cryptography by random grids.
Signal Process., 2014

Reversible AMBTC-based secret sharing scheme with abilities of two decryptions.
J. Vis. Commun. Image Represent., 2014

Content-Adaptive Residual for Steganalysis.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Steganography Based on High-Dimensional Reference Table.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Generalized Random Grid and Its Applications in Visual Cryptography.
IEEE Trans. Inf. Forensics Secur., 2013

Improving the visual quality of random grid-based visual secret sharing.
Signal Process., 2013

Random grid-based visual secret sharing with abilities of OR and XOR decryptions.
J. Vis. Commun. Image Represent., 2013

Improving the visual quality of random grid-based visual secret sharing via error diffusion.
J. Vis. Commun. Image Represent., 2013

Region duplication detection based on Harris corner points and step sector statistics.
J. Vis. Commun. Image Represent., 2013

Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform.
J. Syst. Softw., 2013

Robust copyright protection scheme for digital images using overlapping DCT and SVD.
Appl. Soft Comput., 2013

Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Improved Tagged Visual Cryptograms by Using Random Grids.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

XOR-based meaningful visual secret sharing by generalized random grids.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Digital image splicing detection based on Markov features in DCT and DWT domain.
Pattern Recognit., 2012

Novel robust image watermarking based on subsampling and DWT.
Multim. Tools Appl., 2012

Random grid-based visual secret sharing for general access structures with cheat-preventing ability.
J. Syst. Softw., 2012

A user-friendly secret image sharing scheme with reversible steganography based on cellular automata.
J. Syst. Softw., 2012

Visual secret sharing for general access structures by random grids.
IET Inf. Secur., 2012

2011
Digital image splicing detection based on approximate run length.
Pattern Recognit. Lett., 2011

Revealing digital fakery using multiresolution decomposition and higher order statistics.
Eng. Appl. Artif. Intell., 2011

Improved Run Length Based Detection of Digital Image Splicing.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

2010
Watermark-based digital fake image detection.
Int. J. Comput. Appl. Technol., 2010

Blind image watermark analysis using higher order statistics.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Data Hiding in Block Truncation Coding.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Robust watermarking based on DWT and nonnegative matrix factorization.
Comput. Electr. Eng., 2009

Enriched Gabor Feature Based PCA for Face Recognition with One Training Image per Person.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Blind Image Watermark Analysis Using Feature Fusion and Neural Network Classifier.
Proceedings of the Advances in Neural Networks, 2008

2006
Matching 2D Shapes Using U Descriptors.
Proceedings of the Advances in Computer Graphics, 2006


  Loading...