2025
DisentTalk: Cross-lingual Talking Face Generation via Semantic Disentangled Diffusion Model.
CoRR, March, 2025
PixelPonder: Dynamic Patch Adaptation for Enhanced Multi-Conditional Text-to-Image Generation.
,
,
,
,
,
,
,
,
,
,
,
CoRR, March, 2025
Language Models Can See Better: Visual Contrastive Decoding For LLM Multimodal Reasoning.
CoRR, February, 2025
Research on the Application of Blockchain Technology in the Security Protection of Sensitive Data in Information Systems.
J. Cyber Secur. Mobil., 2025
2024
Temporal Diversified Self-Contrastive Learning for Generalized Face Forgery Detection.
IEEE Trans. Circuits Syst. Video Technol., December, 2024
Errorless robust JPEG steganography using steganographic polar codes.
EURASIP J. Inf. Secur., December, 2024
Dynamic design of hazardous chemical storage in high-rise R&D building based on numerical simulation.
Simul., 2024
Unveiling tampering traces: Enhancing image reconstruction errors for visualization.
J. Vis. Commun. Image Represent., 2024
An ensemble modeling framework to elucidate the regulatory factors of chlorophyll-a concentrations in the Nanji wetland waters of Poyang Lake.
Ecol. Informatics, 2024
VI3DRM:Towards meticulous 3D Reconstruction from Sparse Views via Photo-Realistic Novel View Synthesis.
CoRR, 2024
VividPose: Advancing Stable Video Diffusion for Realistic Human Image Animation.
CoRR, 2024
On the Performance Bounds of Steganographic Polar Codes.
Proceedings of the 16th International Conference on Wireless Communications and Signal Processing, 2024
OC-SAN: Unsupervised Deepfake Detection for Specific Individual Protection Based on Deep One-Class Classification.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
2023
A novel model compression method based on joint distillation for deepfake video detection.
J. King Saud Univ. Comput. Inf. Sci., October, 2023
Forensic Symmetry for DeepFakes.
IEEE Trans. Inf. Forensics Secur., 2023
Land Surface Eco-Environmental Situation Index (LSEESI) Derived From Remote Sensing.
IEEE Trans. Geosci. Remote. Sens., 2023
Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning.
IEEE Signal Process. Lett., 2023
A novel data-driven seasonal multivariable grey model for seasonal time series forecasting.
Inf. Sci., 2023
UVL: A Unified Framework for Video Tampering Localization.
CoRR, 2023
VIFST: Video Inpainting Localization Using Multi-view Spatial-Frequency Traces.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023
Design of a novel MEMS Interrupter Device.
Proceedings of the 18th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2023
Loitering Missile Environment Information analysis and application in Fuze S&A.
Proceedings of the 18th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2023
Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
2022
Channel Attention Image Steganography With Generative Adversarial Networks.
IEEE Trans. Netw. Sci. Eng., 2022
DGCC-EB: Deep Global Context Construction With an Enabled Boundary for Land Use Mapping of CSMA.
IEEE Trans. Geosci. Remote. Sens., 2022
DSL-BC: Deep Subspace Learning With Boundary Consistency for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2022
Early severity prediction of BPD for premature infants from chest X-ray images using deep learning: A study at the 28th day of oxygen inhalation.
Comput. Methods Programs Biomed., 2022
Design and Simulation of a Resettable MEMS Safety and Arming Device.
Proceedings of the 17th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2022
Visual Explanations for Exposing Potential Inconsistency of Deepfakes.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Manipulated Face Detection and Localization Based on Semantic Segmentation.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
SeedFormer: Patch Seeds Based Point Cloud Completion with Upsample Transformer.
Proceedings of the Computer Vision - ECCV 2022, 2022
Learning to Memorize Feature Hallucination for One-Shot Image Generation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Minimizing Embedding Impact for H.264 Steganography by Progressive Trellis Coding.
IEEE Trans. Inf. Forensics Secur., 2021
Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks.
IEEE Trans. Inf. Forensics Secur., 2021
SDFL-FC: Semisupervised Deep Feature Learning With Feature Consistency for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2021
SLCRF: Subspace Learning With Conditional Random Field for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2021
Land-Use Mapping for High-Spatial Resolution Remote Sensing Image Via Deep Learning: A Review.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021
DFL-LC: Deep Feature Learning With Label Consistencies for Hyperspectral Image Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021
GIFMarking: The robust watermarking for animated GIF based deep learning.
J. Vis. Commun. Image Represent., 2021
A study of the grey relational model of interval numbers for panel data.
Grey Syst. Theory Appl., 2021
Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos.
CoRR, 2021
Forecasting CO<sub>2</sub> emissions from Chinese marine fleets using multivariable trend interaction grey model.
Appl. Soft Comput., 2021
Spectrum-to-Kernel Translation for Accurate Blind Image Super-Resolution.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Stochastic analysis of the elctrothermal microactuator with fabrication error.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021
Research on Motion Characteristics for Latching Mechanism of MEMS Safety and Arming Device under Dual Environmental Forces.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021
A Multi-level Feature Enhancement Network for Image Splicing Localization.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Exploiting Facial Symmetry to Expose Deepfakes.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Frequency Consistent Adaptation for Real World Super Resolution.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Foot-Mounted Pedestrian Navigation Algorithm Based on BOR/MINS Integrated Framework.
IEEE Trans. Ind. Electron., 2020
Latent Relationship Guided Stacked Sparse Autoencoder for Hyperspectral Imagery Classification.
IEEE Trans. Geosci. Remote. Sens., 2020
DML-GANR: Deep Metric Learning With Generative Adversarial Network Regularization for High Spatial Resolution Remote Sensing Image Retrieval.
IEEE Trans. Geosci. Remote. Sens., 2020
CEC: Cluster Embedding Coding for H.264 Steganography.
IEEE Signal Process. Lett., 2020
NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2020
Spatio-temporal Semantic Analysis of Safety Production Accidents in Grain Depot based on Natural Language Processing.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020
3D City Cadaster Data Visualization and Viewer Behavior Analysis in Virtual Reality Environment.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020
Design and Analysis of a Band Pass Setback Arming Mechanism in MEMS Safety and Arming Device.
Proceedings of the 15th IEEE International Conference on Nano/Micro Engineered and Molecular System, 2020
NTIRE 2020 Challenge on Real-World Image Super-Resolution: Methods and Results.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Real-World Super-Resolution via Kernel Estimation and Noise Injection.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
2019
Adversarial Learning for Constrained Image Splicing Detection and Localization Based on Atrous Convolution.
IEEE Trans. Inf. Forensics Secur., 2019
Light Multiscale Conventional Neural Network for MP3 Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
2018
An Improved Heuristic Drift Elimination Method for Indoor Pedestrian Positioning.
Sensors, 2018
Adversarial Learning for Image Forensics Deep Matching with Atrous Convolution.
CoRR, 2018
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Image Forgery Localization based on Multi-Scale Convolutional Neural Networks.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Cover Block Decoupling for Content-Adaptive H.264 Steganography.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
2017
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
IEEE Trans. Inf. Forensics Secur., 2017
Optical Measurement of the Dynamic Contact Process of a MEMS Inertial Switch Under High Shock Loads.
IEEE Trans. Ind. Electron., 2017
Segmentation Based Video Steganalysis to Detect Motion Vector Modification.
Secur. Commun. Networks, 2017
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics.
Int. J. Digit. Crime Forensics, 2017
Unsupervised Diverse Colorization via Generative Adversarial Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017
Information Hiding Using CAVLC: Misconceptions and a Detection Strategy.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Implementation and Current Status of Food Traceability System in Jiangsu China.
Proceedings of the 5th International Conference on Information Technology and Quantitative Management, 2017
A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
2016
Motion vector-based video steganography with preserved local optimality.
Multim. Tools Appl., 2016
Data Hiding in H.264/AVC Video Files Using the Coded Block Pattern.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Video Steganalysis Based on Centralized Error Detection in Spatial Domain.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Full-Duplex Radio for Uplink/Downlink Wireless Access With Spatially Random Nodes.
IEEE Trans. Commun., 2015
Cognitive Beamforming in Underlay Two-Way Relay Networks With Multiantenna Terminals.
IEEE Trans. Cogn. Commun. Netw., 2015
Covert Communication by Compressed Videos Exploiting the Uncertainty of Motion Estimation.
IEEE Commun. Lett., 2015
Outage Analysis of ZFB-MRT/MRC Underlay Two-Way Relay Systems.
IEEE Commun. Lett., 2015
Video Steganalysis Based on Intra Prediction Mode Calibration.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Video Steganography Based on Optimized Motion Estimation Perturbation.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
An adaptive detecting strategy against motion vector-based steganography.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
A Practical Method to Determine Achievable Rates for Secure Steganography.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Motion vector reversion-based steganalysis revisited.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015
2014
Joint Distributed Beamforming and Power Allocation in Underlay Cognitive Two-Way Relay Links Using Second-Order Channel Statistics.
IEEE Trans. Signal Process., 2014
Video steganography with perturbed macroblock partition.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
2013
Distributed beamforming and power allocation in two-way multi-relay networks with second-order channel statistics.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013
Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013
Cloud framework for real-time synchronous physiological streams to support rural and remote Critical Care.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013
2012
Video Steganalysis Exploiting Motion Vector Reversion-Based Features.
IEEE Signal Process. Lett., 2012
2011
Video Steganography with Perturbed Motion Estimation.
Proceedings of the Information Hiding - 13th International Conference, 2011
2009
Entropy codec based on evolutionary MHT and its application in video encryption.
Proceedings of the Multimedia and Security Workshop, 2009
2003
Leakage Power Reduction for Battery-Operated Portable Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Quality-driven design by bitwidth optimization for video applications.
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003
2002
Quality-Driven Design for Video Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002
An Accelerated Datapath Width Optimization Scheme for Area Reduction of Embedded Systems.
Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), 2002
Reducing access energy of on-chip data memory considering active data bitwidth.
Proceedings of the 2002 International Symposium on Low Power Electronics and Design, 2002
2001
A system-level energy minimization approach using datapath width optimization.
Proceedings of the 2001 International Symposium on Low Power Electronics and Design, 2001
2000
Variable size analysis and validation of computation quality.
Proceedings of the IEEE International High-Level Design Validation and Test Workshop 2000, 2000