2025
Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement.
Multim. Tools Appl., March, 2025
Artificial intelligence assisted real-time recognition of intra-abdominal metastasis during laparoscopic gastric cancer surgery.
,
,
,
,
,
,
,
,
,
,
,
,
npj Digit. Medicine, 2025
Second FRCSyn-onGoing: Winning solutions and post-challenge analysis to improve face recognition with synthetic data.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Inf. Fusion, 2025
An Innovative Lightweight Symmetric Encryption Algorithm Integrating NeoAlzette ARX S-box and XCR CSPRNG.
IACR Cryptol. ePrint Arch., 2025
Identification and dissection of prostate cancer grounded on fatty acid metabolism-correlative features for predicting prognosis and assisting immunotherapy.
,
,
,
,
,
,
,
,
,
,
Comput. Biol. Chem., 2025
2024
Cover Selection in Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., December, 2024
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment.
IEEE Trans. Circuits Syst. Video Technol., August, 2024
Clinical large language models with misplaced focus.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Nat. Mac. Intell., 2024
S2TD-Face: Reconstruct a Detailed 3D Face with Controllable Texture from a Single Sketch.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Second Edition FRCSyn Challenge at CVPR 2024: Face Recognition Challenge in the Era of Synthetic Data.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
Melnikov analysis in a cubic system with a multiple line of critical points.
Appl. Math. Lett., November, 2023
Digital-Enabled Public Service Innovation in China's eHealth Sector: An Institutional Logics Perspective.
IEEE Trans. Engineering Management, April, 2023
Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2.
Symmetry, April, 2023
A New Performance Evaluation Method of Cross-Border E-Commerce Supply Chain based on LMBP Algorithm.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023
2022
Nontrivial Limit Cycles in a Kind of Piecewise Smooth Generalized Abel Equation.
Int. J. Bifurc. Chaos, 2022
Limit Cycles Bifurcating from a Class of Cubic Hamiltonian Systems.
Int. J. Bifurc. Chaos, 2022
Analysis of Crucial Factors Affecting Contact Force of PCB Spring Terminals Based on Simulation and Rank Correlation.
IEEE Access, 2022
Improving Machine Translation Formality Control with Weakly-Labelled Data Augmentation and Post Editing Strategies.
Proceedings of the 19th International Conference on Spoken Language Translation, 2022
Research on Data Processing and Visualization of Simulation System.
Proceedings of the 5th International Conference on Big Data Technologies, 2022
2021
Performance Limit and Coding Schemes for Resistive Random-Access Memory Channels.
IEEE Trans. Commun., 2021
Double linear regression prediction based reversible data hiding in encrypted images.
Multim. Tools Appl., 2021
Limit Cycles in Discontinuous Planar Piecewise Linear Systems Separated by a Nonregular Line of Center-Center Type.
Int. J. Bifurc. Chaos, 2021
A Chi-MIC Based Adaptive Multi-Branch Decision Tree.
IEEE Access, 2021
2020
Manufacturing strategies for the ecosystem-based manufacturing system in the context of 3D printing.
Int. J. Prod. Res., 2020
Centers and Limit Cycles of a Generalized Cubic Riccati System.
Int. J. Bifurc. Chaos, 2020
Second Order Melnikov Functions of Piecewise Hamiltonian Systems.
Int. J. Bifurc. Chaos, 2020
Intelligent and Ubiquitous Positioning Framework in 5G Edge Computing Scenarios.
IEEE Access, 2020
Coding for Resistive Random-Access Memory Channels.
Proceedings of the IEEE Global Communications Conference, 2020
Dynamic Trajectory for Visual Perception of Abnormal Behavior.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT Coefficients.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Research on Simulation Method of 5G Location Based on Channel Modeling.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
2019
一种基于CSI的非合作式人体行为识别方法 (Non-cooperative Human Behavior Recognition Method Based on CSI).
计算机科学, 2019
Poincaré Maps of " <"-Shape Planar Piecewise Linear Dynamical Systems with a Saddle.
Int. J. Bifurc. Chaos, 2019
Field-of-view prediction in 360-degree videos with attention-based neural encoder-decoder networks.
Proceedings of the 11th ACM Workshop on Immersive Mixed and Virtual Environment Systems, 2019
2018
Technological innovation systems and IT industry sustainability in China: A case study of mobile system innovation.
Telematics Informatics, 2018
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018
A Modulation Recognition Method Based on Bispectrum and DNN.
Proceedings of the Communications, Signal Processing, and Systems, 2018
Model of Decision Making for Agents Based on Relationship Coefficient.
Proceedings of the Applications and Techniques in Information Security, 2018
2017
Research on Initial Rotor Position Estimation and Anti-Reverse Startup Methods for DSEM.
IEEE Trans. Ind. Electron., 2017
一种改进的自适应全双工中继系统中继策略 (Improved Adaptive Relaying Strategy for Full Duplex Relay System).
计算机科学, 2017
Reversible data hiding in encrypted images with auxiliary syndrome.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017
Improved detection for copy-move forgery with multi-scale sliding windows.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017
A Positioning Method Based on RSSI and Power Spectrum Waveform Distinction.
Proceedings of the Communications and Networking, 2017
Understanding a moderating effect of physicians' endorsement to online workload: An empirical study in online health-care communities.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Predictive Power Control of Matrix Converter With Active Damping Function.
IEEE Trans. Ind. Electron., 2016
Spatial Steganalysis Using Contrast of Residuals.
IEEE Signal Process. Lett., 2016
Digital image steganalysis based on local textural features and double dimensionality reduction.
Secur. Commun. Networks, 2016
Spatial steganalysis using redistributed residuals and diverse ensemble classifier.
Multim. Tools Appl., 2016
AC-coefficient histogram-based retrieval for encrypted JPEG images.
Multim. Tools Appl., 2016
Encrypted JPEG image retrieval using block-wise feature comparison.
J. Vis. Commun. Image Represent., 2016
基于断裂结构线匹配模型的大破损区域图像修复算法 (Large Damaged Area Image Inpainting Algorithm Based on Matching Model for Broken Structure Line).
计算机科学, 2016
Markov process-based retrieval for encrypted JPEG images.
EURASIP J. Inf. Secur., 2016
2015
Local structure preserving discriminative projections for RGB-D sensor-based scene classification.
Inf. Sci., 2015
Multiple Description Coding for Encrypted Images.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Reversible visible watermark embedded in encrypted domain.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015
A high efficient hardware architecture for multiview 3DTV.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015
2014
Modelling and analysis of protection and control applications in smart substation.
Int. J. Wirel. Mob. Comput., 2014
On the Limit Cycles of the Polynomial Differential Systems with a Linear Node and Homogeneous Nonlinearities.
Int. J. Bifurc. Chaos, 2014
Adaptive JPEG steganography with new distortion function.
Ann. des Télécommunications, 2014
2013
Nurturing business ecosystems to deal with industry uncertainties.
Ind. Manag. Data Syst., 2013
Linking business ecosystem lifecycle with platform strategy: a triple view of technology, application and organisation.
Int. J. Technol. Manag., 2013
On the sliding bifurcation of a Class of Planar Filippov Systems.
Int. J. Bifurc. Chaos, 2013
2012
Building virtual network for high-tech industry clusters: lessons from China.
Int. J. Netw. Virtual Organisations, 2012
2011
From 3G to 4G: technology evolution and path dynamics in China's mobile telecommunication sector.
Technol. Anal. Strateg. Manag., 2011
Distributed Greedy Synchronization with Memory in Self-Organized.
J. Next Gener. Inf. Technol., 2011
Building collaboration networks for 3G system development, attempts from China.
Int. J. Inf. Technol. Manag., 2011
Opportunistic Cooperative Multicast Based on Coded Cooperation.
IEICE Trans. Commun., 2011
Optimization of Vehicles Arrangement in Distribution Center.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 2, Beijing, China, 8, 2011
QoS Guarantee in Tomcat Web Server: A Feedback Control Approach.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011
2010
Developing effective strategies to address complex challenges: evidence from local high-tech firms in China.
Int. J. Technol. Manag., 2010
Has China caught up in IT?
Commun. ACM, 2010
Cryptographic Key Agreement Protocol Simulation.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010
A Based-on A* Algorithm for Scheduling Application Tasks in Simulation Grid.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010
FDCT-Based Digital Watermarking Algorithm for Gray Images.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
2009
A Scalable Testing Framework for Location-Based Services.
J. Comput. Sci. Technol., 2009
Detecting academic experts by topic-sensitive link analysis.
Frontiers Comput. Sci. China, 2009
Product Integrated Innovation Based on Function.
Proceedings of the Growth and Development of Computer-Aided Innovation, 2009
Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata Corpus.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009
2008
Evaluating 3G Licensing Patterns for an Indigenous Standard in China.
Int. J. Inf. Technol. Decis. Mak., 2008
Self-Organized Synchronization in Wireless Network.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008
An Application of Pansystems Methodology to Path's Searching Problem Solving.
Proceedings of the 2008 International Conference on Foundations of Computer Science, 2008
2007
MIMO-OFDM Transmission Adaptation using Rank.
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Recommending Expert System of Project Reviewing Based on CBR.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007
2006
A dynamic caching algorithm based on internal popularity distribution of streaming media.
Multim. Syst., 2006
Variable Rate Caching for Video Delivery in Heterogeneous Environment.
Proceedings of IEEE International Conference on Communications, 2006
Internal popularity of streaming video and its implication on caching.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
A low-power multi-bit ΣΔ modulator in 90-nm digital CMOS without DEM.
IEEE J. Solid State Circuits, 2005
The evolution of China's mobile telecommunications industry: past, present and future.
Int. J. Mob. Commun., 2005
The strategic roles of government in e-infrastructure development: case studies of China and Korea.
Electron. Gov. an Int. J., 2005
A novel space-borne antenna anti-jamming technique based on immunity genetic algorithm-maximum likelihood.
Sci. China Ser. F Inf. Sci., 2005
Agile Testing of Location Based Services.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005
The national champion in ICT standard competition: evidence from an emerging country.
Proceedings of the Weapons and Wires, 2005
2004
Building innovative capability in firms of developing countries to face the domestic global competition.
Proceedings of the International Symposium on Technology and Society, 2004
2003
Air Canon Design of Projection-Based Olfactory Display.
Proceedings of the Online Proceeding of the 13th International Conference on Artificial Reality and Telexistence, 2003