Yun Cao

Orcid: 0000-0003-3433-0764

According to our database1, Yun Cao authored at least 90 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A novel model compression method based on joint distillation for deepfake video detection.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Forensic Symmetry for DeepFakes.
IEEE Trans. Inf. Forensics Secur., 2023

Land Surface Eco-Environmental Situation Index (LSEESI) Derived From Remote Sensing.
IEEE Trans. Geosci. Remote. Sens., 2023

Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning.
IEEE Signal Process. Lett., 2023

A novel data-driven seasonal multivariable grey model for seasonal time series forecasting.
Inf. Sci., 2023

UVL: A Unified Framework for Video Tampering Localization.
CoRR, 2023

VIFST: Video Inpainting Localization Using Multi-view Spatial-Frequency Traces.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

Design of a novel MEMS Interrupter Device.
Proceedings of the 18th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2023

Loitering Missile Environment Information analysis and application in Fuze S&A.
Proceedings of the 18th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2023

2022
Channel Attention Image Steganography With Generative Adversarial Networks.
IEEE Trans. Netw. Sci. Eng., 2022

DGCC-EB: Deep Global Context Construction With an Enabled Boundary for Land Use Mapping of CSMA.
IEEE Trans. Geosci. Remote. Sens., 2022

DSL-BC: Deep Subspace Learning With Boundary Consistency for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2022

Early severity prediction of BPD for premature infants from chest X-ray images using deep learning: A study at the 28th day of oxygen inhalation.
Comput. Methods Programs Biomed., 2022

Design and Simulation of a Resettable MEMS Safety and Arming Device.
Proceedings of the 17th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2022

Visual Explanations for Exposing Potential Inconsistency of Deepfakes.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Manipulated Face Detection and Localization Based on Semantic Segmentation.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

SeedFormer: Patch Seeds Based Point Cloud Completion with Upsample Transformer.
Proceedings of the Computer Vision - ECCV 2022, 2022

Learning to Memorize Feature Hallucination for One-Shot Image Generation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding.
IEEE Trans. Inf. Forensics Secur., 2021

Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks.
IEEE Trans. Inf. Forensics Secur., 2021

SDFL-FC: Semisupervised Deep Feature Learning With Feature Consistency for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2021

SLCRF: Subspace Learning With Conditional Random Field for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2021

Land-Use Mapping for High-Spatial Resolution Remote Sensing Image Via Deep Learning: A Review.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

DFL-LC: Deep Feature Learning With Label Consistencies for Hyperspectral Image Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

GIFMarking: The robust watermarking for animated GIF based deep learning.
J. Vis. Commun. Image Represent., 2021

A study of the grey relational model of interval numbers for panel data.
Grey Syst. Theory Appl., 2021

Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos.
CoRR, 2021

Forecasting CO<sub>2</sub> emissions from Chinese marine fleets using multivariable trend interaction grey model.
Appl. Soft Comput., 2021

Spectrum-to-Kernel Translation for Accurate Blind Image Super-Resolution.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Stochastic analysis of the elctrothermal microactuator with fabrication error.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Research on Motion Characteristics for Latching Mechanism of MEMS Safety and Arming Device under Dual Environmental Forces.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

A Multi-level Feature Enhancement Network for Image Splicing Localization.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Exploiting Facial Symmetry to Expose Deepfakes.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Frequency Consistent Adaptation for Real World Super Resolution.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Foot-Mounted Pedestrian Navigation Algorithm Based on BOR/MINS Integrated Framework.
IEEE Trans. Ind. Electron., 2020

Latent Relationship Guided Stacked Sparse Autoencoder for Hyperspectral Imagery Classification.
IEEE Trans. Geosci. Remote. Sens., 2020

DML-GANR: Deep Metric Learning With Generative Adversarial Network Regularization for High Spatial Resolution Remote Sensing Image Retrieval.
IEEE Trans. Geosci. Remote. Sens., 2020

CEC: Cluster Embedding Coding for H.264 Steganography.
IEEE Signal Process. Lett., 2020

NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results.
CoRR, 2020

Spatio-temporal Semantic Analysis of Safety Production Accidents in Grain Depot based on Natural Language Processing.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020

3D City Cadaster Data Visualization and Viewer Behavior Analysis in Virtual Reality Environment.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020

Design and Analysis of a Band Pass Setback Arming Mechanism in MEMS Safety and Arming Device.
Proceedings of the 15th IEEE International Conference on Nano/Micro Engineered and Molecular System, 2020


Real-World Super-Resolution via Kernel Estimation and Noise Injection.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Inf. Forensics Secur., 2019

Light Multiscale Conventional Neural Network for MP3 Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
An Improved Heuristic Drift Elimination Method for Indoor Pedestrian Positioning.
Sensors, 2018

Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution.
CoRR, 2018

Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Image Forgery Localization based on Multi-Scale Convolutional Neural Networks.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Cover Block Decoupling for Content-Adaptive H.264 Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Inf. Forensics Secur., 2017

Optical Measurement of the Dynamic Contact Process of a MEMS Inertial Switch Under High Shock Loads.
IEEE Trans. Ind. Electron., 2017

Segmentation Based Video Steganalysis to Detect Motion Vector Modification.
Secur. Commun. Networks, 2017

A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
Int. J. Digit. Crime Forensics, 2017

Unsupervised Diverse Colorization via Generative Adversarial Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Information Hiding Using CAVLC: Misconceptions and a Detection Strategy.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Implementation and Current Status of Food Traceability System in Jiangsu China.
Proceedings of the 5th International Conference on Information Technology and Quantitative Management, 2017

A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
Motion vector-based video steganography with preserved local optimality.
Multim. Tools Appl., 2016

Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Video Steganalysis Based on Centralized Error Detection in Spatial Domain.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Full-Duplex Radio for Uplink/Downlink Wireless Access With Spatially Random Nodes.
IEEE Trans. Commun., 2015

Cognitive Beamforming in Underlay Two-Way Relay Networks With Multiantenna Terminals.
IEEE Trans. Cogn. Commun. Netw., 2015

Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Commun. Lett., 2015

Outage Analysis of ZFB-MRT/MRC Underlay Two-Way Relay Systems.
IEEE Commun. Lett., 2015

Video Steganalysis Based on Intra Prediction Mode Calibration.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Video Steganography Based on Optimized Motion Estimation Perturbation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

An adaptive detecting strategy against motion vector-based steganography.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Practical Method to Determine Achievable Rates for Secure Steganography.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Motion vector reversion-based steganalysis revisited.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Joint Distributed Beamforming and Power Allocation in Underlay Cognitive Two-Way Relay Links Using Second-Order Channel Statistics.
IEEE Trans. Signal Process., 2014

Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
Distributed beamforming and power allocation in two-way multi-relay networks with second-order channel statistics.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

Cloud framework for real-time synchronous physiological streams to support rural and remote Critical Care.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012

2011
Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011

2009
Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009

2003
Leakage Power Reduction for Battery-Operated Portable Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Quality-driven design by bitwidth optimization for video applications.
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003

2002
Quality-Driven Design for Video Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002

An Accelerated Datapath Width Optimization Scheme for Area Reduction of Embedded Systems.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002

Reducing access energy of on-chip data memory considering active data bitwidth.
Proceedings of the 2002 International Symposium on Low Power Electronics and Design, 2002

2001
A system-level energy minimization approach using datapath width optimization.
Proceedings of the 2001 International Symposium on Low Power Electronics and Design, 2001

2000
Variable size analysis and validation of computation quality.
Proceedings of the IEEE International High-Level Design Validation and Test Workshop 2000, 2000


  Loading...