Yan Ke

Orcid: 0000-0003-4440-9660

According to our database1, Yan Ke authored at least 60 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EMFANet: a lightweight network with efficient multi-scale feature aggregation for real-time semantic segmentation.
J. Real Time Image Process., April, 2024

Skeleton Ground Truth Extraction: Methodology, Annotation Tool and Benchmarks.
Int. J. Comput. Vis., April, 2024

2023
Doing More With Moiré Pattern Detection in Digital Photos.
IEEE Trans. Image Process., 2023

PVDet: Towards pedestrian and vehicle detection on gigapixel-level images.
Eng. Appl. Artif. Intell., 2023

Hiding Functions within Functions: Steganography by Implicit Neural Representations.
CoRR, 2023

MarkNerf: Watermarking for Neural Radiance Field.
CoRR, 2023

Steganography for Neural Radiance Fields by Backdooring.
CoRR, 2023

The Realizations of Steganography in Encrypted Domain.
CoRR, 2023

ECSFF: Exploring Efficient Cross-Scale Feature Fusion for Medical Image Segmentation.
Proceedings of the 28th International Conference on Automation and Computing, 2023

MDCN: Multi-scale Dilated Convolutional Enhanced Residual Network for Traffic Sign Detection.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem.
IEEE Trans. Circuits Syst. Video Technol., 2022

Image steganalysis based on attention augmented convolution.
Multim. Tools Appl., 2022

Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism.
CoRR, 2022

ADN: ATSS-based Deep Network for Pedestrian Detection on High-Resolution Images.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching.
Int. J. Digit. Crime Forensics, 2021

2020
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Circuits Syst. Video Technol., 2020

Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU.
IEEE Access, 2020

Recent Advances of Image Steganography With Generative Adversarial Networks.
IEEE Access, 2020

CFAD: Coarse-to-Fine Action Detector for Spatiotemporal Action Localization.
Proceedings of the Computer Vision - ECCV 2020, 2020

PIoU Loss: Towards Accurate Oriented Object Detection in Complex Environments.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Generative steganography with Kerckhoffs' principle.
Multim. Tools Appl., 2019

High-fidelity reversible data hiding using dynamic prediction and expansion.
J. Electronic Imaging, 2019

Recent Advances of Image Steganography with Generative Adversarial Networks.
CoRR, 2019

Generative Steganography by Sampling.
IEEE Access, 2019

Reversible Data Hiding Algorithm in Homomorphic Encrypted Domain Based on EC-EG.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019

Three-Phase Inverters Open-Circuit Fault Diagnostic Based on Voltage Residual.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

2018
A multilevel reversible data hiding scheme in encrypted domain based on LWE.
J. Vis. Commun. Image Represent., 2018

Generative Steganography by Sampling.
CoRR, 2018

The Reincarnation of Grille Cipher.
CoRR, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
CoRR, 2018

Steganography Security: Principle and Practice.
IEEE Access, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

2017
Coverless Information Hiding Based on Generative adversarial networks.
CoRR, 2017

Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks.
CoRR, 2017

2016
Location Privacy Preserving Scheme Based on Attribute Encryption.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Separable Multiple Bits Reversible Data Hiding in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
An Introduction to Entity Recommendation and Understanding.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

2010
Volumetric Features for Video Event Detection.
Int. J. Comput. Vis., 2010

A pattern tree-based approach to learning URL normalization rules.
Proceedings of the 19th International Conference on World Wide Web, 2010

2008
Fast Motion Consistency through Matrix Quantization.
Proceedings of the British Machine Vision Conference 2008, Leeds, UK, September 2008, 2008

2007
Event Detection in Crowded Videos.
Proceedings of the IEEE 11th International Conference on Computer Vision, 2007

Spatio-temporal Shape and Flow Correlation for Action Recognition.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

2006
Semantic Learning for Audio Applications: A Computer Vision Approach.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2006

The Design of High-Level Features for Photo Quality Assessment.
Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), 2006

2005
Evaluating keypoint methods for content-based copyright protection of digital images.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Efficient Visual Event Detection Using Volumetric Features.
Proceedings of the 10th IEEE International Conference on Computer Vision (ICCV 2005), 2005

SOLAR: sound object localization and retrieval in complex audio environments.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Computer Vision for Music Identification: Video Demonstration.
Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), 2005

Computer Vision for Music Identification.
Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), 2005

2004
Multi-fidelity storage.
Proceedings of the ACM 2nd International Workshop on Video Surveillance & Sensor Networks, 2004

An efficient parts-based near-duplicate and sub-image retrieval system.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

PCA-SIFT: A More Distinctive Representation for Local Image Descriptors.
Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2004), with CD-ROM, 27 June, 2004

2003
IrisNet: An Architecture for a Worldwide Sensor Web.
IEEE Pervasive Comput., 2003

IrisNet: An Architecture for Internet-scale Sensing Services.
Proceedings of 29th International Conference on Very Large Data Bases, 2003

2002
Enhancing foreign language tutors - In search of the golden speaker.
Speech Commun., 2002

1990
A Journey into the Fourth Dimension.
Proceedings of the 1st IEEE Visualization Conference, 1990

1989
Computing the Kernel of a Point Set in a Polygon (Extended Abstract).
Proceedings of the Algorithms and Data Structures, 1989

An Efficient Algorithm for Link-Distance Problems.
Proceedings of the Fifth Annual Symposium on Computational Geometry, 1989

1988
Lower Bounds on Moving a Ladder in Two and Three Dimensions.
Discret. Comput. Geom., 1988

1987
Moving a Ladder in Three Dimensions: Upper and Lower Bounds.
Proceedings of the Third Annual Symposium on Computational Geometry, 1987


  Loading...