2025
Dynamic frequency domain trigger backdoor attack with steganography against deep neural networks.
Inf. Sci., 2025

2024
Invisible backdoor attack with attention and steganography.
Comput. Vis. Image Underst., 2024

Invisible Backdoor Attack Through Singular Value Decomposition.
CoRR, 2024

Invisible Backdoor Attack Through Singular Value Decomposition.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

2022
Video anomaly detection based on 3D convolutional auto-encoder.
Signal Image Video Process., 2022

2018
The co-contraction features of the lumbar muscle in patients with and without low back pain during multi-movements.
Proceedings of the 15th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2018

2017
Analysis of whole genome sequence and genome-wide SNPs in highly inbred pigs.
Proceedings of the 7th IEEE International Conference on Computational Advances in Bio and Medical Sciences, 2017

Analysis of Electroencephalogram of patients with specific low back pain with the massage treatment.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

A laboratory study on trunk angle in patients with lumbar disc herniation during bending exercises based on motion sensors.
Proceedings of the 14th IEEE International Conference on Wearable and Implantable Body Sensor Networks, 2017

2013
Iterative graph cuts segmentation with local constraints.
Proceedings of the Ninth International Conference on Natural Computation, 2013

2012
Influencing Factors of CFO Compensation of Listed Companies: Evidence from China Listed Companies.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2009
Dimensioning of the IP-based UTRAN with Multiple Node Bs for Elastic Traffic using DiffServ QoS.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009