Chun-Shien Lu

Orcid: 0000-0002-5900-0019

According to our database1, Chun-Shien Lu authored at least 168 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adversarial Robustness Overestimation and Instability in TRADES.
CoRR, 2024

Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models.
CoRR, 2024

Exploring Robustness of Visual State Space model against Backdoor Attacks.
CoRR, 2024

LookupForensics: A Large-Scale Multi-Task Dataset for Multi-Phase Image-Based Fact Verification.
CoRR, 2024

Towards Efficient Transferable Preemptive Adversarial Defense.
CoRR, 2024

Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off.
CoRR, 2024

Attention-Guided Prototype Mixing: Diversifying Minority Context on Imbalanced Whole Slide Images Classification Learning.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

On the Higher Moment Disparity of Backdoor Attacks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Robust Image Deepfake Detection with Perceptual Hashing.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Defending against Clean-Image Backdoor Attack in Multi-Label Classification.
Proceedings of the IEEE International Conference on Acoustics, 2024

Test-Time Stain Adaptation with Diffusion Models for Histopathology Image Classification.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network.
CoRR, 2023

Extremely Lightweight Neural Network for Large-Scale Image Compressive Sensing.
Proceedings of the 31st European Signal Processing Conference, 2023

RankMix: Data Augmentation for Weakly Supervised Learning of Classifying Whole Slide Images with Diverse Sizes and Imbalanced Categories.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Dynamic Network Tomography with Sparse Recovery-based Link Delay Estimation.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Sparse Trigger Pattern Guided Deep Learning Model Watermarking.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

QISTA-ImageNet: A Deep Compressive Image Sensing Framework Solving ℓ <sub>q</sub>-Norm Optimization Problem.
Proceedings of the Computer Vision - ECCV 2022, 2022

DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
GPX-ADMM-Net: Interpretable Deep Neural Network for Image Compressive Sensing.
IEEE Access, 2021

QISTA-Net-Audio: Audio Super-Resolution via Non-Convex ℓ_q-Norm Minimization.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021

Graphic QR code Combined with Stamp.
Proceedings of the 4th IEEE International Conference on Knowledge Innovation and Invention, 2021

Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation With Manipulable Semantics.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Distributed Compressive Sensing: Performance Analysis With Diverse Signal Ensembles.
IEEE Trans. Signal Process., 2020

Privacy Aware Data Deduplication for Side Channel in Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Greedy Algorithms for Hybrid Compressed Sensing.
IEEE Signal Process. Lett., 2020

Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation.
CoRR, 2020

QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing.
CoRR, 2020

QISTA-Net: DNN Architecture to Solve $\ell_{Q}$-Norm Minimization Problem.
Proceedings of the 30th IEEE International Workshop on Machine Learning for Signal Processing, 2020

Difference-Seeking Generative Adversarial Network-Unseen Sample Generation.
Proceedings of the 8th International Conference on Learning Representations, 2020

Exploring the Integrated Application of Aesthetic QR Code in Video.
Proceedings of the 3rd IEEE International Conference on Knowledge Innovation and Invention, 2020

GPX-ADMM-Net: ADMM-based Neural Network with Generalized Proximal Operator.
Proceedings of the 28th European Signal Processing Conference, 2020

Automated Graph Generation at Sentence Level for Reading Comprehension Based on Conceptual Graphs.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2018
Compressive Sensing Matrix Design for Fast Encoding and Decoding via Sparse FFT.
IEEE Signal Process. Lett., 2018

Fast computing position of maximum of circulant convolution.
Digit. Signal Process., 2018

Link Delay Estimation Using Sparse Recovery for Dynamic Network Tomography.
CoRR, 2018

Performance Analysis of Joint-Sparse Recovery from Multiple Measurement Vectors via Convex Optimization: Which Prior Information is Better?
IEEE Access, 2018

A Secure Compressive Sensing-Based Data Gathering System via Cloud Assistance.
IEEE Access, 2018

Simple Deep Learning Network via Tensor-Train Haar-wavelet Decomposition without Retraining.
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018

Integration of Graphic QR code and Identity Documents by Laser Perforation to Enhance Anti-Counterfeiting Features.
Proceedings of the 2018 IEEE International Conference on Multimedia & Expo Workshops, 2018

2017
Tree Structure Sparsity Pattern Guided Convex Optimization for Compressive Sensing of Large-Scale Images.
IEEE Trans. Image Process., 2017

SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks.
Comput. Commun., 2017

Theoretical stopping criteria guided Greedy Algorithm for Compressive Cooperative Spectrum Sensing.
Comput. Commun., 2017

2016
Compressed Sensing-Based Clone Identification in Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication.
J. Vis. Commun. Image Represent., 2016

Fast Binary Embedding via Circulant Downsampled Matrix - A Data-Independent Approach.
CoRR, 2016

Fast binary embedding via circulant downsampled matrix.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Performance analysis of joint-sparse recovery from multiple measurement vectors with prior information via convex optimization.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
A Necessary and Sufficient Condition for Generalized Demixing.
IEEE Signal Process. Lett., 2015

Compressive image sensing for fast recovery from limited samples: A variation on compressive sensing.
Inf. Sci., 2015

Compressive Sensing of Large-Scale Images: An Assumption-Free Approach.
CoRR, 2015

Performance Analysis of Joint-Sparse Recovery from Multiple Measurements and Prior Information via Convex Optimization.
CoRR, 2015

Fast Template Matching by Subsampled Circulant Matrix.
CoRR, 2015

Fast Greedy Approaches for Compressive Sensing of Large-Scale Signals.
CoRR, 2015

Phase transition of joint-sparse recovery from multiple measurements via convex optimization.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Compressive large-scale image sensing.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Privacy-preserving data collection and recovery of compressive sensing.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Sparse Fast Fourier Transform for Exactly and Generally K-Sparse Signals by Downsampling and Sparse Recovery.
CoRR, 2014

A practical subspace multiple measurement vectors algorithm for cooperative spectrum sensing.
Proceedings of the IEEE Global Communications Conference, 2014

2D sparse dictionary learning via tensor decomposition.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Fast compressive sensing of high-dimensional signals with tree-structure sparsity pattern.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Multi-camera invariant appearance modeling for non-rigid object identification in a real-time environment.
J. Vis. Commun. Image Represent., 2013

Optimal sensing matrix design with hardware friendliness.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Sparse Fast Fourier Transform by downsampling.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT.
IEEE Trans. Image Process., 2012

Low-complexity video coding via power-rate-distortion optimization.
J. Vis. Commun. Image Represent., 2012

Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems.
IEEE Commun. Lett., 2012

Fast OMP: Reformulating OMP via iteratively refining ℓ2-norm solutions.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

CSI: Compressed sensing-based clone identification in sensor networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Constraint-optimized keypoint inhibition/insertion attack: security threat to scale-space image feature extraction.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Sparsity cue in image copy detection.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Content authentication of halftone video via flickering as sparse signal.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Privacy- and integrity-preserving range query in wireless sensor networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Fast compressed image sensing based on sampling matrix design.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

Session MP8a2: Signal processing and adaptive systems i.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
Feature-Based Sparse Representation for Image Similarity Assessment.
IEEE Trans. Multim., 2011

Constrained Function-Based Message Authentication for Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks.
Int. J. Sens. Networks, 2011

Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction.
Proceedings of the Media Forensics and Security III, 2011

Secure transcoding for compressive multimedia sensing.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
Noninteractive pairwise key establishment for sensor networks.
IEEE Trans. Inf. Forensics Secur., 2010

Acquiring Authentic Data in Unattended Wireless Sensor Networks.
Sensors, 2010

Dynamic measurement rate allocation for distributed compressive video sensing.
Proceedings of the Visual Communications and Image Processing 2010, 2010

NTNU-Academia Sinica at TRECVID 2010 Content Based Copy Detection.
Proceedings of the TRECVID 2010 workshop participants notebook papers, 2010

Dictionary learning-based distributed compressive video sensing.
Proceedings of the Picture Coding Symposium, 2010

Secure SIFT-based sparse representation for image copy detection and recognition.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Secure and robust sift with resistance to chosen-plaintext attack.
Proceedings of the International Conference on Image Processing, 2010

2009
Video JET: packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data.
Multim. Tools Appl., 2009

Constrained Function Based En-Route Filtering for Sensor Networks
CoRR, 2009

Secure Multidimensional Queries in Tiered Sensor Networks
CoRR, 2009

A constrained function based message authentication scheme for sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Power-rate-distortion model for low-complexity video coding.
Proceedings of the 2009 Picture Coding Symposium, 2009

A DoS-resilient en-route filtering scheme for sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Secure and robust SIFT.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Compressive sensing-based image hashing.
Proceedings of the International Conference on Image Processing, 2009

Secure image hashing via minimum distortion estimation.
Proceedings of the International Conference on Image Processing, 2009

Distributed compressive video sensing.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions.
Signal Process. Image Commun., 2008

Mobile Sensor Network Resilient Against Node Replication Attacks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Power-scalable multi-layer halftone video display for electronic paper.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Unequal authenticity protection of video multicasting.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Compression of halftone video for electronic paper.
Proceedings of the International Conference on Image Processing, 2008

2007
JitterPath: Probing Noise Resilient One-Way Delay Jitter-Based Available Bandwidth Estimation.
IEEE Trans. Multim., 2007

Visual Sensor Networks.
EURASIP J. Adv. Signal Process., 2007

Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Video Halftoning Preserving Temporal Consistency.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Multi-View Distributed Video Coding with Low-Complexity Inter-Sensor Communication Over Wireless Video Sensor Networks.
Proceedings of the International Conference on Image Processing, 2007

Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
Media Hash-Dependent Image Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks Based on False Positive-Oriented Detection.
IEEE Trans. Multim., 2006

Available bandwidth estimation via one-way delay jitter and queuing delay propagation model.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Low-Complexity Wyner-Ziv Video Coding Based on Robust Media Hashing.
Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing, 2006

Joint Screening Halftoning and Visual Cryptography for Image Protection.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Wyner-Ziv Video Coding with Coding Mode-Aided Motion Compensation.
Proceedings of the International Conference on Image Processing, 2006

Informed Authentication Watermarking Via Stego Data Reconstruction.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Fragile watermarking for authenticating 3-D polygonal meshes.
IEEE Trans. Multim., 2005

Real-time frame-dependent video watermarking in VLC domain.
Signal Process. Image Commun., 2005

Towards robust image watermarking: combining content-dependent key, moment normalization, and side-informed embedding.
Signal Process. Image Commun., 2005

Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication.
Multim. Syst., 2005

Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Robust non-interactive zero-knowledge watermarking scheme against cheating prover.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Near-perfect cover image recovery anti-multiple watermark embedding approaches.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Joint Image Halftoning and Watermarking in High-Resolution Digital Form.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Media Hash-dependent Image Watermarking Resilent Against Both Geometric Attacks and Estimation Attacks Based on Fals Positive-Oriented Detection.
Proceedings of the 3rd International Conference on Digital Archive Technologies, 2005

2004
A significant motion vector protection-based error-resilient scheme in H.264.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Geometric distortion-resilient image hashing system and its application scalability.
Proceedings of the 6th workshop on Multimedia & Security, 2004

On the security of structural information extraction/embedding for images.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Robust mesh-based hashing for copy detection and tracing of images.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Content-dependent multipurpose watermarking resistant against generalized copy attack.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Resistance of content-dependent video watermarking to watermark-estimation attacks.
Proceedings of IEEE International Conference on Communications, 2004

Reliable available bandwidth estimation based on distinguishing queuing regions and resolving false estimations [video transmission].
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Structural digital signature for image authentication: an incidental distortion resistant scheme.
IEEE Trans. Multim., 2003

A new iterated two-band diffusion equation: theory and its application.
IEEE Trans. Image Process., 2003

A message-based cocktail watermarking system.
Pattern Recognit., 2003

Content-Dependent Anti-disclosure Image Watermark.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Authentication of 3-D Polygonal Meshes.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Dual security-based image steganography.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector.
IEEE Trans. Image Process., 2002

Real-Time MPEG2 Video Watermarking in the VLC Domain.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

Block DCT-Based Robust Watermarking Using Side Information Extracted by Mean Filtering.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

Wireless multimedia error resilience via a data hiding technique.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Characterization of abrupt/gradual video shot transitions as unsmoothed/smoothed singularity.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Audio fingerprinting based on analyzing time-frequency localization of signals.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

2001
Multipurpose watermarking for image authentication and protection.
IEEE Trans. Image Process., 2001

Segmentation of Perspective Textured Planes through the Ridges of Continuous Wavelet Transform.
J. Vis. Commun. Image Represent., 2001

Digital Watermarking: A Communications with Side Information Perspective.
Proceedings of the Advances in Multimedia Information Processing, 2001

A new watermarking scheme resistant to denoising and copy attacks.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

An Oblivious And Robust Watermarking Scheme Using Communications-With-Side-Information Mechanism.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Video object-based watermarking: a rotation and flipping resilient scheme.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
Cocktail Watermarking for Digital Image Protection.
IEEE Trans. Multim., 2000

Multipurpose Audio Watermarking.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

Combined Watermarking for Image Authentication and Protection.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Mean Quantization Blind Watermarking for Image Authentication.
Proceedings of the 2000 International Conference on Image Processing, 2000

Dyadic Wavelet-Based Nonlinear Conduction Equation: Theory and Applications.
Proceedings of the 2000 International Conference on Image Processing, 2000

Oblivious Cocktail Watermarking by Sparse Code Shrinkage: A Regional- and Global-Based Scheme.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Highly Robust Image Watermarking Using Complementary Modulations.
Proceedings of the Information Security, Second International Workshop, 1999

Cocktail Watermarking on Images.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Shape from texture: estimation of planar surface orientation through the ridge surfaces of continuous wavelet transform.
IEEE Trans. Image Process., 1998

Wold features for unsupervised texture segmentation.
Proceedings of the Fourteenth International Conference on Pattern Recognition, 1998

1997
Unsupervised texture segmentation via wavelet transform.
Pattern Recognit., 1997

Segmentation of 3-D Textured Images Using Continuous Wavelet Transform.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
Shape from texture based on the ridge of continuous wavelet transform.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996


  Loading...