Yun Cao

According to our database1, Yun Cao authored at least 45 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Information Forensics and Security, 2019

2018
An Improved Heuristic Drift Elimination Method for Indoor Pedestrian Positioning.
Sensors, 2018

Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution.
CoRR, 2018

Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Image Forgery Localization based on Multi-Scale Convolutional Neural Networks.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Cover Block Decoupling for Content-Adaptive H.264 Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Information Forensics and Security, 2017

Optical Measurement of the Dynamic Contact Process of a MEMS Inertial Switch Under High Shock Loads.
IEEE Trans. Industrial Electronics, 2017

Segmentation Based Video Steganalysis to Detect Motion Vector Modification.
Security and Communication Networks, 2017

A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
IJDCF, 2017

Image Forgery Localization Based on Multi-Scale Convolutional Neural Networks.
CoRR, 2017

Unsupervised Diverse Colorization via Generative Adversarial Networks.
CoRR, 2017

Unsupervised Diverse Colorization via Generative Adversarial Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Information Hiding Using CAVLC: Misconceptions and a Detection Strategy.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Implementation and Current Status of Food Traceability System in Jiangsu China.
Proceedings of the 5th International Conference on Information Technology and Quantitative Management, 2017

A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
Motion vector-based video steganography with preserved local optimality.
Multimedia Tools Appl., 2016

Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Video Steganalysis Based on Centralized Error Detection in Spatial Domain.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Full-Duplex Radio for Uplink/Downlink Wireless Access With Spatially Random Nodes.
IEEE Trans. Communications, 2015

Cognitive Beamforming in Underlay Two-Way Relay Networks With Multiantenna Terminals.
IEEE Trans. Cogn. Comm. & Networking, 2015

Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Communications Letters, 2015

Outage Analysis of ZFB-MRT/MRC Underlay Two-Way Relay Systems.
IEEE Communications Letters, 2015

Full-Duplex Radio for Uplink/Downlink Wireless Access with Spatially Random Nodes.
CoRR, 2015

Video Steganalysis Based on Intra Prediction Mode Calibration.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Video Steganography Based on Optimized Motion Estimation Perturbation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

An adaptive detecting strategy against motion vector-based steganography.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Practical Method to Determine Achievable Rates for Secure Steganography.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Motion vector reversion-based steganalysis revisited.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Joint Distributed Beamforming and Power Allocation in Underlay Cognitive Two-Way Relay Links Using Second-Order Channel Statistics.
IEEE Trans. Signal Processing, 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
Distributed beamforming and power allocation in two-way multi-relay networks with second-order channel statistics.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

Cloud framework for real-time synchronous physiological streams to support rural and remote Critical Care.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012

2011
Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011

2009
Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009

2003
Quality-driven design by bitwidth optimization for video applications.
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003

2002
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002

An Accelerated Datapath Width Optimization Scheme for Area Reduction of Embedded Systems.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002

Reducing access energy of on-chip data memory considering active data bitwidth.
Proceedings of the 2002 International Symposium on Low Power Electronics and Design, 2002

2001
A system-level energy minimization approach using datapath width optimization.
Proceedings of the 2001 International Symposium on Low Power Electronics and Design, 2001

2000
Variable size analysis and validation of computation quality.
Proceedings of the IEEE International High-Level Design Validation and Test Workshop 2000, 2000


  Loading...