Yongjian Hu

Orcid: 0000-0002-7775-3786

According to our database1, Yongjian Hu authored at least 90 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the quasi-stability criteria of monic matrix polynomials.
J. Comput. Appl. Math., March, 2024

Self-Supervised 3D Action Representation Learning With Skeleton Cloud Colorization.
IEEE Trans. Pattern Anal. Mach. Intell., January, 2024

Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Asymmetric Modality Translation for Face Presentation Attack Detection.
IEEE Trans. Multim., 2023

Learnable Information-Preserving Image Resizer for Face Forgery Detection.
IEEE Signal Process. Lett., 2023

Self-Supervised Leaf Segmentation under Complex Lighting Conditions.
Pattern Recognit., 2023

On the relation between Hurwitz stability of matrix polynomials and matrix-valued Stieltjes functions.
J. Comput. Appl. Math., 2023

Deep Learning Techniques for Video Instance Segmentation: A Survey.
CoRR, 2023

S-Adapter: Generalizing Vision Transformer for Face Anti-Spoofing with Statistical Tokens.
CoRR, 2023

Hyperbolic Face Anti-Spoofing.
CoRR, 2023

Rehearsal-Free Domain Continual Face Anti-Spoofing: Generalize More and Forget Less.
CoRR, 2023

Rethinking Vision Transformer and Masked Autoencoder in Multimodal Face Anti-Spoofing.
CoRR, 2023

Detecting Deepfakes in Alternative Color Spaces to Withstand Unseen Corruptions.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023

Exposing Deepfake Frames through Spectral Analysis of Color Channels in Frequency Domain.
Proceedings of the 11th International Workshop on Biometrics and Forensics, 2023

Hybrid Domain Meta-Learning Network for Face Forgery Detection and Localization in Deepfakes.
Proceedings of the International Joint Conference on Neural Networks, 2023

Rehearsal-Free Domain Continual Face Anti-Spoofing: Generalize More and Forget Less.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
One-Class Knowledge Distillation for Face Presentation Attack Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Learning Meta Pattern for Face Anti-Spoofing.
IEEE Trans. Inf. Forensics Secur., 2022

One-Class Knowledge Distillation for Face Presentation Attack Detection.
CoRR, 2022

2021
Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector Prediction.
IEEE Signal Process. Lett., 2021

An HEVC steganalytic approach against motion vector modification using local optimality in candidate list.
Pattern Recognit. Lett., 2021

LIS-Net: An end-to-end light interior search network for speech command recognition.
Comput. Speech Lang., 2021

Double-Stream Segmentation Network with Temporal Self-attention for Deepfake Video Detection.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Exposing Deepfake Videos with Spatial, Frequency and Multi-scale Temporal Artifacts.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Deepfake Detection Using Robust Spatial and Temporal Features from Facial Landmarks.
Proceedings of the 9th IEEE International Workshop on Biometrics and Forensics, 2021

Violence Detection in Videos Based on Fusing Visual and Audio Information.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
The multipoint Padé approximation problem and its Hankel vector.
J. Comput. Appl. Math., 2020

ENF Based Video Forgery Detection Algorithm.
Int. J. Digit. Crime Forensics, 2020

Selection-Channel-Aware Deep Neural Network to Detect Motion Vector Embedding of HEVC Videos.
Proceedings of the IEEE International Conference on Signal Processing, 2020

Exposing Deepfake Videos by Tracking Eye Movements.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

A New Efficient Finger-Vein Verification Based on Lightweight Neural Network Using Multiple Schemes.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

Face Anti-spoofing with a Noise-Attention Network Using Color-Channel Difference Images.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

Deep Learning-based Quantitative Steganalysis to Detect Motion Vector Embedding of HEVC Videos.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU.
Int. J. Parallel Program., 2019

CBC-Based Synthetic Speech Detection.
Int. J. Digit. Crime Forensics, 2019

Auto-Zooming CNN-Based Framework for Real-Time Pedestrian Detection in Outdoor Surveillance Videos.
IEEE Access, 2019

Multi-Label-Based Similarity Learning for Vehicle Re-Identification.
IEEE Access, 2019

Elix: Path-Selective Taint Analysis for Extracting Mobile App Links.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Variational Representation Learning for Vehicle Re-Identification.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

2018
Modelling and developing conflict-aware scheduling on large-scale data centres.
Future Gener. Comput. Syst., 2018

Channel Response Based Multi-Feature Audio Splicing Forgery Detection and Localization.
Proceedings of the International Conference on E-Business, 2018

Static Detection of Event-based Races in Android Apps.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

2017
Detecting and Verifying Event-Driven Races in Mobile Apps.
PhD thesis, 2017

Improving Smartphone Security and Reliability.
J. Interconnect. Networks, 2017

Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Gait recognition based on the golden ratio.
EURASIP J. Image Video Process., 2016

Automatically verifying and reproducing event-based races in Android apps.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

VALERA: an effective and efficient record-and-replay tool for android.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Fuzzy and cross-app replay for smartphone apps.
Proceedings of the 11th International Workshop on Automation of Software Test, 2016

A Novel Online Bayes Classifier.
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016

2015
Fast source camera identification using matching signs between query and reference fingerprints.
Multim. Tools Appl., 2015

Improving the Android development lifecycle with the VALERA record-and-replay approach.
Proceedings of the 3rd International Workshop on Mobile Development Lifecycle, 2015

Versatile yet lightweight record-and-replay for Android.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015

2014
An efficient reversible data hiding scheme using prediction and optimal side information selection.
J. Vis. Commun. Image Represent., 2014

2013
A high capacity lossless data hiding scheme for JPEG images.
J. Syst. Softw., 2013

An improved VLC-based lossless data hiding scheme for JPEG images.
J. Syst. Softw., 2013

Robust face recognition with occlusions in both reference and query images.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

Exposing image forgery through the detection of contrast enhancement.
Proceedings of the IEEE International Conference on Image Processing, 2013

Face recognition with occlusion using Dynamic Image-to-Class Warping (DICW).
Proceedings of the 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, 2013

Audio forensic authentication based on MOCC between ENF and reference signals.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery.
Int. J. Digit. Crime Forensics, 2012

An adaptive system for gait recognition in multi-view environments.
Proceedings of the Multimedia and Security Workshop, 2012

Audio Forgery Detection Based on Max Offsets for Cross Correlation between ENF and Reference Signal.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Fast camera fingerprint search algorithm for source camera identification.
Proceedings of the 5th International Symposium on Communications, 2012

Reversible Data Hiding for Block Truncation Coding Compressed Images Based on Prediction-Error Expansion.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

An Improved Algorithm for Camera Model Identification Using Inter-channel Demosaicking Traces.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Robust Clothing-Invariant Gait Recognition.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Random Subspace Method for Gait Recognition.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

Robust Face Recognition under Varying Illumination and Occlusion Considering Structured Sparsity.
Proceedings of the 2012 International Conference on Digital Image Computing Techniques and Applications, 2012

2011
Source Camera Identification Issues: Forensic Features Selection and Robustness.
Int. J. Digit. Crime Forensics, 2011

Issues on Selecting Image Features for Robust Source Camera Identification.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

Further studies on forensic features for source camera identification.
Proceedings of the 4th International Conference on Imaging for Crime Detection and Prevention, 2011

2010
On classification of source cameras: A graph based approach.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Building fingerprints with information from three color bands for source camera identification.
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, 2010

Using improved imaging sensor pattern noise for source camera identification.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Source camera identification from significant noise residual regions.
Proceedings of the International Conference on Image Processing, 2010

2009
DE-Based Reversible Data Hiding With Improved Overflow Location Map.
IEEE Trans. Circuits Syst. Video Technol., 2009

2008
Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions.
IEEE Trans. Multim., 2008

Design Methodology of Control System with Mutual Exclusion.
Proceedings of the PACIIA 2008, 2008

Curve Watermarking Technique for Fingerprinting Digital Maps.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Reversible Data Hiding Using Prediction Error Values Embedding.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

2006
An algorithm for removable visible watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2006

Reversible Visible Watermarking and Lossless Recovery of Original Images.
IEEE Trans. Circuits Syst. Video Technol., 2006

Analysis and Comparison of Typical Reversible Watermarking Methods.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Reversible Visible Watermarking Technique for Images.
Proceedings of the International Conference on Image Processing, 2006

2004
A generalized Bezoutian matrix with respect to a polynomial sequence of interpolatory type.
IEEE Trans. Autom. Control., 2004

Using invisible watermarks to protect visibly watermarked images.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

2003
Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

An image fusion based visible watermarking algorithm.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
The Design and Application of DWT-Domain Optimum Decoders.
Proceedings of the Digital Watermarking, First International Workshop, 2002


  Loading...