Jeng-Shyang Pan

Orcid: 0000-0002-3128-9025

Affiliations:
  • Shandong University of Science and Technology, College of Computer Science and Engineering, Qingdao, China
  • Dalian Maritime University, Department of Intelligence Science and Technology, Dalian, China
  • Fujian University of Technology, College of Information Science and Engineering, Fuzhou, China
  • Harbin Institute of Technology, Shenzhen Graduate School, China
  • National Kaohsiung University of Applied Sciences, Department of Electronic Engineering, Taiwan
  • Kaohsiung Institute of Technology, Department of Electronic Engineering, Taiwan
  • University of Edinburgh, Centre for Communication Interface Research, UK (PhD 1996)


According to our database1, Jeng-Shyang Pan authored at least 663 papers between 1995 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Feature-matching method based on keypoint response constraint using binary encoding of phase congruency.
Pattern Recognit., 2025

A Transformer-based network with adaptive spatial prior for visual tracking.
Neurocomputing, 2025

2024
FPGA Accelerated Implementation of 3D Mesh Secret Sharing Based on Symmetric Similarity of Model.
ACM Trans. Reconfigurable Technol. Syst., December, 2024

Weighted least squares twin support vector machine based on density peaks.
Pattern Anal. Appl., September, 2024

An efficient surrogate-assisted Taguchi salp swarm algorithm and its application for intrusion detection.
Wirel. Networks, May, 2024

FPGA implementation of secret sharing for textured 3D mesh model based on texture vertex correlation.
J. Real Time Image Process., May, 2024

A Task Offloading Method Based on User Satisfaction in C-RAN With Mobile Edge Computing.
IEEE Trans. Mob. Comput., April, 2024

FPGA-Based Compact Differential Evolution for General-Purpose Optimization in Resource-Constrained Devices.
IEEE Trans. Ind. Informatics, April, 2024

DWSR: an architecture optimization framework for adaptive super-resolution neural networks based on meta-heuristics.
Artif. Intell. Rev., February, 2024

Road surface semantic segmentation for autonomous driving.
PeerJ Comput. Sci., 2024

A parallel compact Marine Predators Algorithm applied in time series prediction of Backpropagation neural network (BNN) and engineering optimization.
Math. Comput. Simul., 2024

Artificial Protozoa Optimizer (APO): A novel bio-inspired metaheuristic algorithm for engineering optimization.
Knowl. Based Syst., 2024

New feature attribution method for explainable aspect-based sentiment classification.
Knowl. Based Syst., 2024

Non-iterative reversible information hiding in the secret sharing domain.
J. Vis. Commun. Image Represent., 2024

Recent Advances on Semantic IoT Data Integration.
Internet Technol. Lett., 2024

A decomposition framework based on memorized binary search for large-scale optimization problems.
Inf. Sci., 2024

Improved object detection method for unmanned driving based on Transformers.
Frontiers Neurorobotics, 2024

A novel Discrete Artificial Bee Colony algorithm combined with adaptive filtering to extract Fetal Electrocardiogram signals.
Expert Syst. Appl., 2024

Flexible margins and multiple samples learning to enhance lexical semantic similarity.
Eng. Appl. Artif. Intell., 2024

Analysis on fetal phonocardiography segmentation problem by hybridized classifier.
Eng. Appl. Artif. Intell., 2024

Hierarchical learning multi-objective firefly algorithm for high-dimensional feature selection.
Appl. Soft Comput., 2024

Surrogate-assisted fully-informed particle swarm optimization for high-dimensional expensive optimization.
Appl. Soft Comput., 2024

An activity level based surrogate-assisted evolutionary algorithm for many-objective optimization.
Appl. Soft Comput., 2024

A multi-strategy surrogate-assisted social learning particle swarm optimization for expensive optimization and applications.
Appl. Soft Comput., 2024

A Hybrid Parallel Willow Catkin Optimization Algorithm Applied for Engineering Optimization Problems.
IEEE Access, 2024

Concept-Level Interpretable SOM for Visual Analysis of High-Dimensional Non-dominated Solution Set.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

A Multi-objective Evolutionary Algorithm based on Hierarchical Grouping for Large-scale Multi-objective Optimization.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2024

HMANet: Hybrid Multi-Axis Aggregation Network for Image Super-Resolution.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
An enhanced dynamic differential annealed algorithm for global optimization and feature selection.
J. Comput. Des. Eng., December, 2023

Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City.
ACM Trans. Internet Techn., November, 2023

Application of Diversity-Maintaining Adaptive Rafflesia Optimization Algorithm to Engineering Optimisation Problems.
Symmetry, November, 2023

An Entropy-Balanced Orthogonal Learning Bamboo Forest Growth Optimization Algorithm with Quasi-Affine Transformation Evolutionary and Its Application in Capacitated Vehicle Routing Problem.
Entropy, November, 2023

Cluster head selection strategy of WSN based on binary multi-objective adaptive fish migration optimization algorithm.
Appl. Soft Comput., November, 2023

Multi-objective firefly algorithm with adaptive region division.
Appl. Soft Comput., November, 2023

A multi-strategy surrogate-assisted competitive swarm optimizer for expensive optimization problems.
Appl. Soft Comput., November, 2023

An Enhanced Food Digestion Algorithm for Mobile Sensor Localization.
Sensors, September, 2023

Quantum meaningful visual cryptography.
Quantum Inf. Process., August, 2023

FPGA acceleration of secret sharing for 3D data cubes.
J. Real Time Image Process., August, 2023

An energy-adaptive clustering method based on Taguchi-based-GWO optimizer for wireless sensor networks with a mobile sink.
Computing, August, 2023

Density peaks clustering algorithm based on fuzzy and weighted shared neighbor for uneven density datasets.
Pattern Recognit., July, 2023

Minimizing traffic cost of content distribution and storage allocation in cloud radio access networks.
Comput. Networks, July, 2023

Multitone reconstruction visual cryptography based on phase periodicity.
J. Vis. Commun. Image Represent., May, 2023

A surrogate-assisted bi-swarm evolutionary algorithm for expensive optimization.
Appl. Intell., May, 2023

Enhanced Equilibrium Optimizer algorithm applied in job shop scheduling problem.
J. Intell. Manuf., April, 2023

A Lossless-Recovery Secret Distribution Scheme Based on QR Codes.
Entropy, April, 2023

A Quasi-Affine Transformation Evolutionary Algorithm Enhanced by Hybrid Taguchi Strategy and Its Application in Fault Detection of Wireless Sensor Network.
Symmetry, March, 2023

Surrogate-assisted Phasmatodea population evolution algorithm applied to wireless sensor networks.
Wirel. Networks, February, 2023

Adaptive smoothness evaluation and multiple asymmetric histogram modification for reversible data hiding.
J. Vis. Commun. Image Represent., February, 2023

Surrogate-Assisted Hybrid Meta-Heuristic Algorithm with an Add-Point Strategy for a Wireless Sensor Network.
Entropy, February, 2023

Binary Bamboo Forest Growth Optimization Algorithm for Feature Selection Problem.
Entropy, February, 2023

Willow Catkin Optimization Algorithm Applied in the TDOA-FDOA Joint Location Problem.
Entropy, January, 2023

Equilibrium optimizer of interswarm interactive learning strategy.
Enterp. Inf. Syst., January, 2023

Parallel Binary Rafflesia Optimization Algorithm and Its Application in Feature Selection Problem.
Symmetry, 2023

An Opposition-Based Learning Black Hole Algorithm for Localization of Mobile Sensor Network.
Sensors, 2023

Optimization of MSFs for watermarking using DWT-DCT-SVD and fish migration optimization with QUATRE.
Multim. Tools Appl., 2023

Improved butterfly optimization algorithm applied to prediction of combined cycle power plant.
Math. Comput. Simul., 2023

A parallel Archimedes optimization algorithm based on Taguchi method for application in the control of variable pitch wind turbine.
Math. Comput. Simul., 2023

Parallel binary arithmetic optimization algorithm and its application for feature selection.
Knowl. Based Syst., 2023

A sinusoidal social learning swarm optimizer for large-scale optimization.
Knowl. Based Syst., 2023

FPGA implementation of QUasi-Affine TRansformation evolutionary algorithm.
Knowl. Based Syst., 2023

Improved Equilibrium Optimizer for Short-Term Traffic Flow Prediction.
J. Database Manag., 2023

Analysis on population-based algorithm optimized filter for non-invasive fECG extraction.
Appl. Soft Comput., 2023

A survey on binary metaheuristic algorithms and their engineering applications.
Artif. Intell. Rev., 2023

Equilibrium Optimizer for Emotion Classification From English Speech Signals.
IEEE Access, 2023

Orthogonal Learning Rafflesia Optimization Algorithm with Quasi-Affine Transformation Evolutionary and Its Application in Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Web Intelligence and Intelligent Agent Technology, 2023

A Parallel Gannet Optimization Algorithm for Image Segmentation.
Proceedings of the IEEE International Conference on Web Intelligence and Intelligent Agent Technology, 2023

Diagnosing Rolling-Element Bearing Faults in the Real World: Problem Solved?
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

2022
A fake threshold visual cryptography of QR code.
Multim. Tools Appl., November, 2022

Improved fish migration optimization with the opposition learning based on elimination principle for cluster head selection.
Wirel. Networks, 2022

Correction to: Improved DV-Hop based on parallel and compact whale optimization algorithm for localization in wireless sensor networks.
Wirel. Networks, 2022

Improved DV-Hop based on parallel and compact whale optimization algorithm for localization in wireless sensor networks.
Wirel. Networks, 2022

Hybrid algorithm optimization for coverage problem in wireless sensor networks.
Telecommun. Syst., 2022

Maximum Profit of Real-Time IoT Content Retrieval by Joint Content Placement and Storage Allocation in C-RANs.
IEEE Trans. Cloud Comput., 2022

Information Hiding Based on Two-Level Mechanism and Look-Up Table Approach.
Symmetry, 2022

Multi-group discrete symbiotic organisms search applied in traveling salesman problems.
Soft Comput., 2022

Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm.
Sensors, 2022

Multi-Group Gorilla Troops Optimizer with Multi-Strategies for 3D Node Localization of Wireless Sensor Networks.
Sensors, 2022

A novel quantum image watermarking scheme for tamper localization and self-recovery.
Quantum Inf. Process., 2022

A novel quantum color image steganography algorithm based on turtle shell and LSB.
Quantum Inf. Process., 2022

A new hybrid algorithm based on golden eagle optimizer and grey wolf optimizer for 3D path planning of multiple UAVs in power inspection.
Neural Comput. Appl., 2022

Using color QR codes for QR code secret sharing.
Multim. Tools Appl., 2022

A novel perfect contrast XOR-based visual cryptography scheme for multiple secrets.
Multim. Tools Appl., 2022

Gannet optimization algorithm : A new metaheuristic algorithm for solving engineering optimization problems.
Math. Comput. Simul., 2022

Golden eagle optimizer with double learning strategies for 3D path planning of UAV in power inspection.
Math. Comput. Simul., 2022

A competitive mechanism based multi-objective differential evolution algorithm and its application in feature selection.
Knowl. Based Syst., 2022

Parallel fish migration optimization with compact technology based on memory principle for wireless sensor networks.
Knowl. Based Syst., 2022

Visual cryptography scheme for secret color images with color QR codes.
J. Vis. Commun. Image Represent., 2022

Robust digital watermarking with parallel compact sparrow search algorithm applied for QR code.
J. Inf. Hiding Multim. Signal Process., 2022

Multi-group multi-verse optimizer for energy efficient for routing algorithm in wireless sensor network.
J. Intell. Fuzzy Syst., 2022

Multi-strategy improved parallel antlion algorithm and applied to feature selection.
J. Intell. Fuzzy Syst., 2022

An adaptive multi-group slime mould algorithm for node localisation in wireless sensor networks.
Int. J. Sens. Networks, 2022

A novel Fruit Fly Optimization Algorithm with quasi-affine transformation evolutionary for numerical optimization and application.
Int. J. Distributed Sens. Networks, 2022

A software-defined multi-modal wireless sensor network for ocean monitoring.
Int. J. Distributed Sens. Networks, 2022

An adaptive stochastic central force optimisation algorithm for node localisation in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Behaviour-based grey wolf optimiser for a wireless sensor network deployment problem.
Int. J. Ad Hoc Ubiquitous Comput., 2022

A compact GBMO applied to modify DV-Hop based on layers in a wireless sensor network.
Int. J. Ad Hoc Ubiquitous Comput., 2022

Improved Binary Grasshopper Optimization Algorithm for Feature Selection Problem.
Entropy, 2022

Efficient Network Architecture Search Using Hybrid Optimizer.
Entropy, 2022

A Mahalanobis Surrogate-Assisted Ant Lion Optimization and Its Application in 3D Coverage of Wireless Sensor Networks.
Entropy, 2022

A Parallelizable Task Offloading Model with Trajectory-Prediction for Mobile Edge Networks.
Entropy, 2022

Energy-Efficient Clustering Mechanism of Routing Protocol for Heterogeneous Wireless Sensor Network Based on Bamboo Forest Growth Optimizer.
Entropy, 2022

A parallel compact firefly algorithm for the control of variable pitch wind turbine.
Eng. Appl. Artif. Intell., 2022

Corrigendum to "A parallel compact cuckoo search algorithm for three-dimensional path planning" [Appl. Soft Comput. 94 (2020) 106443].
Appl. Soft Comput., 2022

Multi-surrogate assisted binary particle swarm optimization algorithm and its application for feature selection.
Appl. Soft Comput., 2022

Software and hardware co-design and implementation of intelligent optimization algorithms.
Appl. Soft Comput., 2022

Modified Communication Parallel Compact Firefly Algorithm and Its Application.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

A Hybrid Parallel Algorithm With Multiple Improved Strategies.
Proceedings of the Intelligent Information Processing XI, 2022

A Novel Feature Selection Algorithm Based on Aquila Optimizer for COVID-19 Classification.
Proceedings of the Intelligent Information Processing XI, 2022

2021
A parallel compact cat swarm optimization and its application in DV-Hop node localization for wireless sensor network.
Wirel. Networks, 2021

Hybrid Strategy of Multiple Optimization Algorithms Applied to 3-D Terrain Node Coverage of Wireless Sensor Network.
Wirel. Commun. Mob. Comput., 2021

A parallel compact sine cosine algorithm for TDOA localization of wireless sensor network.
Telecommun. Syst., 2021

Compact Sine Cosine Algorithm applied in vehicle routing problem with time window.
Telecommun. Syst., 2021

Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images.
Symmetry, 2021

Improved ECC-Based Three-Factor Multiserver Authentication Scheme.
Secur. Commun. Networks, 2021

A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks.
Secur. Commun. Networks, 2021

An advanced gradient texture feature descriptor based on phase information for infrared and visible image matching.
Multim. Tools Appl., 2021

Fuzzy Hierarchical Surrogate Assists Probabilistic Particle Swarm Optimization for expensive high dimensional problem.
Knowl. Based Syst., 2021

SinGAN-Based Asteroid Surface Image Generation.
J. Database Manag., 2021

Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm.
Inf. Sci., 2021

An efficient surrogate-assisted hybrid optimization algorithm for expensive optimization problems.
Inf. Sci., 2021

Parallel cuckoo search for cognitive wireless sensor networks.
Int. J. Sens. Networks, 2021

A Novel Binary Slime Mould Algorithm with AU Strategy for Cognitive Radio Spectrum Allocation.
Int. J. Comput. Intell. Syst., 2021

A multi-group dragonfly algorithm for application in wireless sensor network deployment problem.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Digital watermarking with improved SMS applied for QR code.
Eng. Appl. Artif. Intell., 2021

Application of generated mask method based on Mask R-CNN in classification and detection of melanoma.
Comput. Methods Programs Biomed., 2021

Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm.
Clust. Comput., 2021

A two-phase quasi-affine transformation evolution with feedback for parameter identification of photovoltaic models.
Appl. Soft Comput., 2021

Improved binary pigeon-inspired optimization and its application for feature selection.
Appl. Intell., 2021

A PID Parameter Tuning Method Based on the Improved QUATRE Algorithm.
Algorithms, 2021

Rounding Algorithm of Minimizing Executing and Transmitting Time in Multiple CRANs.
IEEE Access, 2021

Optimal Design and Simulation for PID Controller Using Fractional-Order Fish Migration Optimization Algorithm.
IEEE Access, 2021

An Image Compression Algorithm Based on Quantization and DWT-BP Neural Network.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2020
A Node Location Method in Wireless Sensor Networks Based on a Hybrid Optimization Algorithm.
Wirel. Commun. Mob. Comput., 2020

Foreword to the special issue on intelligent vehicular network and applications.
Telecommun. Syst., 2020

Image-matching framework based on region partitioning for target image location.
Telecommun. Syst., 2020

Diversity Teams in Soccer League Competition Algorithm for Wireless Sensor Network Deployment Problem.
Symmetry, 2020

Securing Fingerprint Template Using Blockchain and Distributed Storage System.
Symmetry, 2020

3-D Terrain Node Coverage of Wireless Sensor Network Using Enhanced Black Hole Algorithm.
Sensors, 2020

Reversible data hiding in dual encrypted halftone images using matrix embedding.
Multim. Tools Appl., 2020

An efficient surrogate-assisted quasi-affine transformation evolutionary algorithm for expensive optimization problems.
Knowl. Based Syst., 2020

Improved Binary Grey Wolf Optimizer and Its application for feature selection.
Knowl. Based Syst., 2020

An Optimizing Cross-Entropy Thresholding for Image Segmentation based on Improved Cockroach Colony Optimization.
J. Inf. Hiding Multim. Signal Process., 2020

An Improvement of Embedding Efficiency for Watermarking Based on Genetic Algorithm.
J. Inf. Hiding Multim. Signal Process., 2020

Applying Adaptive and Self Assessment Fish Migration Optimization on Localization of Wireless Sensor Network on 3-D Te rrain.
J. Inf. Hiding Multim. Signal Process., 2020

A parameter adaptive DE algorithm on real-parameter optimization.
J. Intell. Fuzzy Syst., 2020

A hybridized parallel bats algorithm for combinatorial problem of traveling salesman.
J. Intell. Fuzzy Syst., 2020

Internal search of the evolution matrix in QUasi-Affine TRansformation Evolution (QUATRE) algorithm.
J. Intell. Fuzzy Syst., 2020

A novel pigeon-inspired optimization with QUasi-Affine TRansformation evolutionary algorithm for DV-Hop in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

Agent-based middleware framework using distributed CPS for improving resource utilization in smart city.
Future Gener. Comput. Syst., 2020

Identifying correctness data scheme for aggregating data in cluster heads of wireless sensor network based on naive Bayes classification.
EURASIP J. Wirel. Commun. Netw., 2020

A parallel WOA with two communication strategies applied in DV-Hop localization method.
EURASIP J. Wirel. Commun. Netw., 2020

Differential evolution utilizing a handful top superior individuals with bionic bi-population structure for the enhancement of optimization performance.
Enterp. Inf. Syst., 2020

Content placement for minimizing transmission cost in multiple cloud radio access networks.
Comput. Networks, 2020

A parallel compact cuckoo search algorithm for three-dimensional path planning.
Appl. Soft Comput., 2020

A Parallel Multi-Verse Optimizer for Application in Multilevel Image Segmentation.
IEEE Access, 2020

A Kernel-Based Probabilistic Collaborative Representation for Face Recognition.
IEEE Access, 2020

A Hybrid Differential Evolution Algorithm and Its Application in Unmanned Combat Aerial Vehicle Path Planning.
IEEE Access, 2020

A Scheme of Color Image Multithreshold Segmentation Based on Improved Moth-Flame Algorithm.
IEEE Access, 2020

An Improved Slime Mold Algorithm and its Application for Optimal Operation of Cascade Hydropower Stations.
IEEE Access, 2020

Time Difference Penalized Traffic Signal Timing by LSTM Q-Network to Balance Safety and Capacity at Intersections.
IEEE Access, 2020

Quasi-Affine Transformation Evolutionary Algorithm With Communication Schemes for Application of RSSI in Wireless Sensor Networks.
IEEE Access, 2020

Improved Binary Symbiotic Organism Search Algorithm With Transfer Functions for Feature Selection.
IEEE Access, 2020

Identification Failure Data for Cluster Heads Aggregation in WSN Based on Improving Classification of SVM.
IEEE Access, 2020

Energy Saving Technology of 5G Base Station Based on Internet of Things Collaborative Control.
IEEE Access, 2020

Data Filtering Method for the Optimization of Mobile Positioning Based on Deep Learning.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

A Probability-Based Analytical Model Based on Deep Learning for Traffic Information Estimation.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

Power Load Forecasting Based on VMD and Attention-LSTM.
Proceedings of the 3rd International Conference on Data Science and Information Technology, 2020

Study of PSO Optimized BP Neural Network and Smith Predictor for MOCVD Temperature Control in 7 nm 5G Chip Process.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2020

2019
Novel Systolization of Subquadratic Space Complexity Multipliers Based on Toeplitz Matrix-Vector Product Approach.
IEEE Trans. Very Large Scale Integr. Syst., 2019

An Improved Integer Transform Combining with an Irregular Block Partition.
Symmetry, 2019

An Adaptation Multi-Group Quasi-Affine Transformation Evolutionary Algorithm for Global Optimization and Its Application in Node Localization in Wireless Sensor Networks.
Sensors, 2019

Feature Point Matching Based on Distinct Wavelength Phase Congruency and Log-Gabor Filters in Infrared and Visible Images.
Sensors, 2019

Beautified QR code with high storage capacity using sequential module modulation.
Multim. Tools Appl., 2019

PaDE: An enhanced Differential Evolution algorithm with novel control parameter adaptation schemes for numerical optimization.
Knowl. Based Syst., 2019

Node Coverage Optimization Strategy Based on Ions Motion Optimization.
J. Netw. Intell., 2019

A Parallel Quasi-Affine Transformation Evolution Algorithm for Global Optimization.
J. Netw. Intell., 2019

Print-Scan Resistant Two-Level QR Code.
J. Inf. Hiding Multim. Signal Process., 2019

Diversity Enhanced Ion Motion Optimization for Localization in Wireless Sensor Network.
J. Inf. Hiding Multim. Signal Process., 2019

A Novel Improved Bat Algorithm Based on Hybrid Parallel and Compact for Balancing an Energy Consumption Problem.
Inf., 2019

A new finite-time cooperative control algorithm for uncertain multi-agent systems.
Int. J. Syst. Sci., 2019

Special issue HAIS 2014: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems.
Neurocomputing, 2019

Human motion recognition based on SVM in VR art media interaction environment.
Hum. centric Comput. Inf. Sci., 2019

A bi-population QUasi-Affine TRansformation Evolution algorithm for global optimization and its application to dynamic deployment in wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2019

Mice endplate segmentation from micro-CT data through graph-based trabecula recognition.
EURASIP J. Image Video Process., 2019

Bilinear discriminant feature line analysis for image feature extraction.
CoRR, 2019

An Improved Flower Pollination Algorithm for Optimizing Layouts of Nodes in Wireless Sensor Network.
IEEE Access, 2019

HARD-DE: Hierarchical ARchive Based Mutation Strategy With Depth Information of Evolution for the Enhancement of Differential Evolution on Numerical Optimization.
IEEE Access, 2019

Adaptive Unified Data Embedding and Scrambling for Three-Dimensional Mesh Models.
IEEE Access, 2019

CS-DE: Differential Evolution with Cooperative Strategy for numerical optimization.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

A novel Differential Evolution approach to scheduling the freight trains in intervals of passenger trains.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

The QUATRE structure: An efficient approach to tackling the structure bias in Differential Evolution.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Chaotic Cuckoo Search Algorithm for Solving Unmanned Combat Aerial Vehicle Path Planning Problems.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

Research on Optimizing Parameters of Pitch Angle Controller Based on Genetic Algorithm.
Proceedings of the Genetic and Evolutionary Computing, 2019

Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

Research on the Status Quo and Problems of Power Grid Production in China.
Proceedings of the Genetic and Evolutionary Computing, 2019

Improvement of Chromatographic Peaks Qualitative Analysis for Power Transformer Base on Decision Tree.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

Analysis of Dynamic Movement of Elevator Doors Based on Semantic Segmentation.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Review of the Development and Application of Natural Language Processing.
Proceedings of the Genetic and Evolutionary Computing, 2019

An Improved Bat Algorithm Based on Hybrid with Ant Lion Optimizer.
Proceedings of the Genetic and Evolutionary Computing, 2019

Insulation Faults Diagnosis of Power Transformer by Decision Tree with Fuzzy Logic.
Proceedings of the Genetic and Evolutionary Computing, 2019

Study on Health Protection Behavior Based on the Big Data of High-Tech Factory Production Line.
Proceedings of the Genetic and Evolutionary Computing, 2019

Study on Hazardous Scenario Analysis of High-Tech Facilities and Emergency Response Mechanism of Science and Technology Parks Based on IoT.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Parallel Strategy Applied to APSO.
Proceedings of the Genetic and Evolutionary Computing, 2019

2018
An energy-aware routing protocol for wireless sensor network based on genetic algorithm.
Telecommun. Syst., 2018

Pairwise IPVO-based reversible data hiding.
Multim. Tools Appl., 2018

Parameters with Adaptive Learning Mechanism (PALM) for the enhancement of Differential Evolution.
Knowl. Based Syst., 2018

QUasi-Affine TRansformation Evolution with External ARchive (QUATRE-EAR): An enhanced structure for Differential Evolution.
Knowl. Based Syst., 2018

A Compact Co-Evolutionary Algorithm for sensor ontology meta-matching.
Knowl. Inf. Syst., 2018

Security Analysis of Rhee et al.'s Public Encryption with Keyword Search Schemes: A Review.
J. Netw. Intell., 2018

An Improving Data Compression Capability in Sensor Node to Support SensorML-Compatible for Internet-of-Things.
J. Netw. Intell., 2018

Improvement on a Chaotic Map-based Mutual Anonymous Authentication Protocol.
J. Inf. Sci. Eng., 2018

Parallel bat algorithm for optimizing makespan in job shop scheduling problems.
J. Intell. Manuf., 2018

Many-Objective Instance Matching in Linked Open Data.
J. Inf. Hiding Multim. Signal Process., 2018

An Overview on Evolutionary Algorithm based Ontology Matching.
J. Inf. Hiding Multim. Signal Process., 2018

FPGA Demonstration for WLAN-OFDM Baseband Receiver.
J. Inf. Hiding Multim. Signal Process., 2018

Finite-Wordlength Analysis of ADC and Receiving Filter for OFDM Baseband Transceiver.
J. Inf. Hiding Multim. Signal Process., 2018

Comments on Recent Proposed Cui Et Al.'s KASE and Lu Et Al.'s dIBEKS Schemes.
J. Inf. Hiding Multim. Signal Process., 2018

Security Analysis and Improvement of An Image Encryption Scheme Based on Chaotic Tent Map.
J. Inf. Hiding Multim. Signal Process., 2018

A Novel Information Imbedding and Recovering Method for QR Code based on Module Subdivision.
J. Inf. Hiding Multim. Signal Process., 2018

Hierarchical Routing Strategy for Wireless Sensor Network.
J. Inf. Hiding Multim. Signal Process., 2018

Load balancing for mitigating hotspot problem in wireless sensor network based on enhanced diversity pollen.
J. Inf. Telecommun., 2018

Finite-time boundedness of Markovain jump nonlinear systems with incomplete information.
Int. J. Syst. Sci., 2018

Efficient digit-serial modular multiplication algorithm on FPGA.
IET Circuits Devices Syst., 2018

Efficiently updating the discovered high average-utility itemsets with transaction insertion.
Eng. Appl. Artif. Intell., 2018

Training samples-optimizing based dictionary learning algorithm for MR sparse superresolution reconstruction.
Biomed. Signal Process. Control., 2018

Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Watermarking Method for Printed QR Code Based on Module Expansion.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

A Public Auditing Scheme with Data Recovery.
Proceedings of the Genetic and Evolutionary Computing, 2018

Generalized Benford's Distribution for Data Defined on Irregular Grid.
Proceedings of the Genetic and Evolutionary Computing, 2018

Improved Whale Optimization Algorithm and Its Application to UCAV Path Planning Problem.
Proceedings of the Genetic and Evolutionary Computing, 2018

External Hierarchical Archive Based Differential Evolution.
Proceedings of the Genetic and Evolutionary Computing, 2018

A Multi-population QUasi-Affine TRansformation Evolution Algorithm for Global Optimization.
Proceedings of the Genetic and Evolutionary Computing, 2018

Reversible Watermarking Based on Adaptive Prediction Error Expansion.
Proceedings of the Genetic and Evolutionary Computing, 2018

Study on Information and Integrated of MES Big Data and Semiconductor Process Furnace Automation.
Proceedings of the Genetic and Evolutionary Computing, 2018

Visual QR Code with Beautication and Self-recovery Based on Data Hiding.
Proceedings of the Genetic and Evolutionary Computing, 2018

2017
An Energy Balancing Strategy Based on Hilbert Curve and Genetic Algorithm for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017

Monkey King Evolution: an enhanced ebb-tide-fish algorithm for global optimization and its application in vehicle navigation under wireless sensor network environment.
Telecommun. Syst., 2017

Superimposed Sparse Parameter Classifiers for Face Recognition.
IEEE Trans. Cybern., 2017

A genetic-based effective approach to path-planning of autonomous underwater glider with upstream-current avoidance in variable oceans.
Soft Comput., 2017

Development of a Three-Dimensional Multimode Visual Immersive System With Applications in Telepresence.
IEEE Syst. J., 2017

Reversible data hiding based on the local smoothness estimator and optional embedding strategy in four prediction modes.
Multim. Tools Appl., 2017

Online and offline based load balance algorithm in cloud computing.
Knowl. Based Syst., 2017

A segment-based approach for large-scale ontology matching.
Knowl. Inf. Syst., 2017

Optimal PPVO-based reversible data hiding.
J. Vis. Commun. Image Represent., 2017

Clustering Formation in Wireless Sensor Networks: A Survey.
J. Netw. Intell., 2017

A Semi-automatic Segmentation for Tooth on Cone Beam CT Volume Following the Anatomic Guidance.
J. Inf. Hiding Multim. Signal Process., 2017

Knowledge Graph Embedding Translation Based on Constraints.
J. Inf. Hiding Multim. Signal Process., 2017

Novel Artificial Bee Colony Algorithm Based Load Balance Method In Cloud Computing.
J. Inf. Hiding Multim. Signal Process., 2017

A Parse Tree-Based NoSQL Injection Attacks Detection Mechanism.
J. Inf. Hiding Multim. Signal Process., 2017

An Automatic Colonies Counting Based on Piecewise Circle Fitting.
J. Inf. Hiding Multim. Signal Process., 2017

SVQR : A Novel Secure Visual Quick Response Code and Its Anti-counterfeiting Solution.
J. Inf. Hiding Multim. Signal Process., 2017

Low-Space Complexity Digit-Serial Multiplier Based on Modified Polynomial Basis Over GF(2m).
J. Inf. Hiding Multim. Signal Process., 2017

An Improvement of Flower Pollination Algorithm for Node Localization Optimization in WSN.
J. Inf. Hiding Multim. Signal Process., 2017

Optimal path planning for motion robots based on bees pollen optimization algorithm.
J. Inf. Telecommun., 2017

Low-latency digit-serial dual basis multiplier for lightweight cryptosystems.
IET Inf. Secur., 2017

Efficiently mining of skyline frequent-utility patterns.
Intell. Data Anal., 2017

State estimation for discrete-time Markov jump linear systems with time-correlated and mode-dependent measurement noise.
Autom., 2017

A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System.
IEEE Access, 2017

Comments on a privacy preserving public auditing mechanism for shared cloud data.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

On the Security of a Certificateless Public Key Encryption with Keyword Search.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Base on Transmission Line Model to Investigate the Power Margins of Main Transformers.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Capacity Reduction of Distribution Transformer by Harmonic Effect.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Optimal Economic Dispatch of Fuel Cost Based on Intelligent Monkey King Evolutionary Algorithm.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Development of Optical Fiber Stress Sensor Based on OTDR.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

A Matrix-Based Implementation of DE Algorithm: The Compensation and Deficiency.
Proceedings of the Advances in Artificial Intelligence: From Theory to Practice, 2017

Research on Temperature Rising Prediction of Distribution Transformer by Artificial Neural Networks.
Proceedings of the Genetic and Evolutionary Computing, 2017

Comments on Islam Et Al.'s Certificateless Designated Server Based Public Key Encryption with Keyword Search Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2017

An efficient FPGA-based accelerator design for convolution.
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017

Hardware implementation of double basis multiplier using TMVP approach over GF (2<sup>m</sup>).
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017

Digital Certificate Based Security Payment for QR Code Applications.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Comments on Yu et al's Shared Data Integrity Verification Protocol.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

A Hybrid BPSO-GA Algorithm for 0-1 Knapsack Problems.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

The Optimal Reactive Power Compensation of Feeders by Using Fuzzy Method.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

QUATRE Algorithm with Sort Strategy for Global Optimization in Comparison with DE and PSO Variants.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Day and Night Image Stitching and Rendering.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

The QUasi-Affine TRansformation Evolution (QUATRE) Algorithm: An Overview.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Relay Node Selection Strategy for Wireless Sensor Network.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

Nearest Neighbor Search Techniques Applied in the Nearest Feature Line Classifier.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

2016
Cognitive Wireless Networks Using the CSS Technology.
Lecture Notes in Electrical Engineering 384, Springer, ISBN: 978-3-319-31094-7, 2016

A new meta-heuristic ebb-tide-fish-inspired algorithm for traffic navigation.
Telecommun. Syst., 2016

Reversible watermarking based on two embedding Schemes.
Multim. Tools Appl., 2016

Novel image authentication scheme with fine image quality for BTC-based compressed images.
Multim. Tools Appl., 2016

QUasi-Affine TRansformation Evolutionary (QUATRE) algorithm: A cooperative swarm based algorithm for global optimization.
Knowl. Based Syst., 2016

Monkey King Evolution: A new memetic evolutionary algorithm and its application in vehicle fuel consumption optimization.
Knowl. Based Syst., 2016

Integer transform based reversible watermarking incorporating block selection.
J. Vis. Commun. Image Represent., 2016

Reversible data hiding based on flexible block-partition and adaptive block-modification strategy.
J. Vis. Commun. Image Represent., 2016

Invariability of Remainder Based Reversible Watermarking.
J. Netw. Intell., 2016

Sink Node Placement Strategies based on Cat Swarm Optimization Algorithm.
J. Netw. Intell., 2016

Optimization Localization in Wireless Sensor Network Based on Multi-Objective Firefly Algorithm.
J. Netw. Intell., 2016

Development of a Wearable Motor-Imagery-Based Brain-Computer Interface.
J. Medical Syst., 2016

Undulating Swarm Intelligence Agents in Wave Increasing Evolved Bat Algorithm.
J. Inf. Hiding Multim. Signal Process., 2016

NSCT-Based Multimodal Medical Image Fusion With Sparse Representation and Pulse Coupled Neural Network.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Reversible Data Hiding Method for Color Images Based on Dynamic Payload Partition and Cross-Channel Correlation.
J. Inf. Hiding Multim. Signal Process., 2016

A Novel Ontology Matching Technology Based on NSGA-II.
J. Inf. Hiding Multim. Signal Process., 2016

Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps.
J. Inf. Hiding Multim. Signal Process., 2016

An Efficient Human-Verifiable Key Agreement Scheme with Privacy Preserving with Human Bond Communication for Mobile Devices.
J. Inf. Hiding Multim. Signal Process., 2016

Directional Derivative and Feature Line Based Subspace Learning Algorithm for Classification.
J. Inf. Hiding Multim. Signal Process., 2016

Contourlet and Nearest Feature Line Based Feature Extraction Approach for One Prototype Sample Problem.
J. Inf. Hiding Multim. Signal Process., 2016

Road Network Modeling with Layered Abstraction for Path Discovery in Vehicle Navigation Systems.
J. Inf. Hiding Multim. Signal Process., 2016

Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding.
Inf. Sci., 2016

Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format.
IET Image Process., 2016

Association rule hiding based on evolutionary multi-objective optimization.
Intell. Data Anal., 2016

Polyhedron Volume-Ratio-based Classification for Image Recognition.
CoRR, 2016

Preface.
Appl. Intell., 2016

Novel Non-Contact Control System for Medical Healthcare of Disabled Patients.
IEEE Access, 2016

A Competitive QUasi-Affine TRansformation Evolutionary (C-QUATRE) Algorithm for global optimization.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

QUasi-Affine TRansformation Evolution (QUATRE) Algorithm: A New Simple and Accurate Structure for Global Optimization.
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016

The Research of Chinese License Plates Recognition Based on CNN and Length_Feature.
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016

A Comprehensive Evaluation Model for Traffic Rule.
Proceedings of the Genetic and Evolutionary Computing, 2016

On the Security of a Certificateless Searchable Public Key Encryption Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2016

Hierarchical PSO Clustering on MapReduce for Scalable Privacy Preservation in Big Data.
Proceedings of the Genetic and Evolutionary Computing, 2016

A Fully-Automated Zebra Animal Identification Approach Based on SIFT Features.
Proceedings of the Genetic and Evolutionary Computing, 2016

Alzheimer's Disease Diagnosis Based on Moth Flame Optimization.
Proceedings of the Genetic and Evolutionary Computing, 2016

Breast Cancer Diagnosis Approach Based on Meta-Heuristic Optimization Algorithm Inspired by the Bubble-Net Hunting Strategy of Whales.
Proceedings of the Genetic and Evolutionary Computing, 2016

Compact Particle Swarm Optimization for Optimal Location of Base Station in Wireless Sensor Network.
Proceedings of the Genetic and Evolutionary Computing, 2016

Handwritten Arabic Manuscript Image Binarization Using Sine Cosine Optimization Algorithm.
Proceedings of the Genetic and Evolutionary Computing, 2016

Passenger Hailing Safety PASW Modeler and Big Data Statistical Analysis Study.
Proceedings of the Intelligent Data Analysis and Applications, 2016

Tooth Segmentation from Cone Beam Computed Tomography Images Using the Identified Root Canal and Harmonic Fields.
Proceedings of the Intelligent Data Analysis and Applications, 2016

Utilizing Cat Swarm Optimization in Allocating the Sink Node in the Wireless Sensor Network Environment.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

Low Space Complexity Multiplier for Even-Type Gaussian Normal Basis over GF(2m).
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

Time Competition Flooding in High-Density Wireless Sensor Network.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

A Compact Flower Pollination Algorithm Optimization.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

QUasi-affine TRansformation Evolutionary (QUATRE) algorithm: A parameter-reduced differential evolution algorithm for optimization problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

A Behavioral Action Sequences Process Design.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2016

A Hybrid Krill-ANFIS Model for Wind Speed Forecasting.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2016

Detection and Recognition of Speed Limit Sign from Video.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Bees and Pollens with Communication Strategy for Optimization.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Dynamic Diversity Population Based Flower Pollination Algorithm for Multimodal Optimization.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

BRBA: A Blocking-Based Association Rule Hiding Method.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Metaheuristics for the deployment of 5G.
IEEE Wirel. Commun., 2015

Novel Noncontact Dry Electrode With Adaptive Mechanical Design for Measuring EEG in a Hairy Site.
IEEE Trans. Instrum. Meas., 2015

Neighborhood Feature Line Segment for Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2015

Adaptive reversible data hiding based on a local smoothness estimator.
Multim. Tools Appl., 2015

Dual watermarking algorithm based on the Fractional Fourier Transform.
Multim. Tools Appl., 2015

Image steganography based on subsampling and compressive sensing.
Multim. Tools Appl., 2015

Metaheuristics for the deployment problem of WSN: A review.
Microprocess. Microsystems, 2015

Optimal SNR of Audio Watermarking by Wavelet and Compact PSO Methods.
J. Inf. Hiding Multim. Signal Process., 2015

Improving Swarm Intelligence Accuracy with Cosine Functions for Evolved Bat Algorithm.
J. Inf. Hiding Multim. Signal Process., 2015

A Real-time Action Detection System for Surveillance Videos Using Template Matching.
J. Inf. Hiding Multim. Signal Process., 2015

Image Blur Assessment with Feature Points.
J. Inf. Hiding Multim. Signal Process., 2015

Polar Linear Canonical Transform in Quaternion Domain.
J. Inf. Hiding Multim. Signal Process., 2015

Vision-based Vehicle Forward Collision Warning System Using Optical Flow Algorithm.
J. Inf. Hiding Multim. Signal Process., 2015

A Balanced Power Consumption Algorithm Based on Enhanced Parallel Cat Swarm Optimization for Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

Subquadratic space complexity Gaussian normal basis multipliers over GF(2<sup>m</sup>) based on Dickson-Karatsuba decomposition.
IET Circuits Devices Syst., 2015

Hide Association Rules with Fewer Side Effects.
IEICE Trans. Inf. Syst., 2015

Manage the Tradeoff in Data Sanitization.
IEICE Trans. Inf. Syst., 2015

Design of novel non-contact multimedia controller for disability by using visual stimulus.
Comput. Methods Programs Biomed., 2015

An Improved A* Algorithm for Traffic Navigation in Real-Time Environment.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Deceleration Convergence Strategy for Evolved Bat Algorithm.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Vision Based Front and Rear Vehicle Collision Warning System.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

An Improved JPS Algorithm in Symmetric Graph.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Diversity Enhanced Optimization Based on Communication Strategy Particles and Pollens.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

On the Security of a Mutual Authentication and Key Agreement Protocol Based on Chaotic Maps.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Efficient subquadratic parallel multiplier based on modified SPB of GF(2<sup>m</sup>).
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Bilinear Feature Line Analysis for Face Recognition.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Fuzzy Extended Feature Line Classifier for Image Classification.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A Swarm-Based Sanitization Approach for Hiding Confidential Itemsets.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Evolved Bat Algorithm with Increase-Wave Strategy.
Proceedings of the Genetic and Evolutionary Computing, 2015

Improving the Searching Capacity of Evolved Bat Algorithm by the Periodic Signal.
Proceedings of the Genetic and Evolutionary Computing, 2015

A Novel Load Balance Algorithm for Cloud Computing.
Proceedings of the Genetic and Evolutionary Computing, 2015

An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2015

Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015

A Sanitization Approach of Privacy Preserving Utility Mining.
Proceedings of the Genetic and Evolutionary Computing, 2015

Image Segmentation Using KFTBES.
Proceedings of the Genetic and Evolutionary Computing, 2015

Applications of Cloud Model in Digital Watermarking.
Proceedings of the Intelligent Data Analysis and Applications, 2015

Research on Heuristic Based Load Balancing Algorithms in Cloud Computing.
Proceedings of the Intelligent Data Analysis and Applications, 2015

A Power Consumption Balancing Algorithm Based on Evolved Bat Algorithm for Wireless Sensor Network.
Proceedings of the Intelligent Data Analysis and Applications, 2015

A Dual Watermarking Scheme by Using Compressive Sensing and Subsampling.
Proceedings of the Intelligent Data Analysis and Applications, 2015

A Unified Framework of Single Image Haze Removal under Different Weather Conditions.
Proceedings of the Intelligent Data Analysis and Applications, 2015

2014
A Novel Approach on Behavior of Sleepy Lizards Based on K-Nearest Neighbor Algorithm.
Proceedings of the Social Networks: A Framework of Computational Intelligence, 2014

A Collaborative Computing Framework of Cloud Network and WBSN Applied to Fall Detection and 3-D Motion Reconstruction.
IEEE J. Biomed. Health Informatics, 2014

Low-Complexity Digit-Serial and Scalable SPB/GPB Multipliers Over Large Binary Extension Fields Using (b, 2)-Way Karatsuba Decomposition.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014

Low-Latency Digit-Serial Systolic Double Basis Multiplier over $\mbi GF{(2^m})$ Using Subquadratic Toeplitz Matrix-Vector Product Approach.
IEEE Trans. Computers, 2014

Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes.
IEEE Syst. J., 2014

Interactive Artificial Bee Colony Supported Passive Continuous Authentication System.
IEEE Syst. J., 2014

Reversible watermarking based on multiple prediction modes and adaptive watermark embedding.
Multim. Tools Appl., 2014

Reversible Watermarking Based on Eight Improved Prediction Modes.
J. Inf. Hiding Multim. Signal Process., 2014

A Fast Algorithm of Temporal Median Filter for Background Subtraction.
J. Inf. Hiding Multim. Signal Process., 2014

Multi-strategy ensemble artificial bee colony algorithm.
Inf. Sci., 2014

No-Reference Quality Metric of Blocking Artifacts Based on Color Discontinuity Analysis.
IEICE Trans. Inf. Syst., 2014

Bio-inspired Evolutionary Computing with Context-Awareness and Collective-Effect.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2014

Privacy Preserving Association Rule Mining Using Binary Encoded NSGA-II.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2014

Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control.
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014

Novel Reversible Data Hiding Scheme for AMBTC-Compressed Images by Reference Matrix.
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014

Updating the Built FUSP Trees with Sequence Deletion Based on Prelarge Concept.
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014

Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Novel Watermarked Multiple Description Scalar Quantization Coding Framework.
Proceedings of the Modern Advances in Applied Intelligence, 2014

A Framework to Evolutionary Path Planning for Autonomous Underwater Glider.
Proceedings of the Modern Advances in Applied Intelligence, 2014

Driving Behavior Analysis of Multiple Information Fusion Based on SVM.
Proceedings of the Modern Advances in Applied Intelligence, 2014

Feature Curve Metric for Image Classification.
Proceedings of the Modern Advances in Applied Intelligence, 2014

Towards SQL Injection Attacks Detection Mechanism Using Parse Tree.
Proceedings of the Genetic and Evolutionary Computing, 2014

No-Reference Image Quality Assessment in Spatial Domain.
Proceedings of the Genetic and Evolutionary Computing, 2014

Interaction Artificial Bee Colony Based Load Balance Method in Cloud Computing.
Proceedings of the Genetic and Evolutionary Computing, 2014

A Simple and Accurate Global Optimizer for Continuous Spaces Optimization.
Proceedings of the Genetic and Evolutionary Computing, 2014

Driving Behavior Analysis of Multiple Information Fusion Based on AdaBoost.
Proceedings of the Genetic and Evolutionary Computing, 2014

A Guidable Bat Algorithm Based on Doppler Effect to Improve Solving Efficiency for Optimization Problems.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2014

Completely hide sensitive association rules using EMO by deleting transactions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Use EMO to protect sensitive knowledge in association rule mining by adding items.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Towards Time-Bound Hierarchical Key Management in Cloud Computing.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

Reversible Watermarking Based on Position Determination and Three-Pixel Block Difference.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

Feature Line-Based Local Discriminant Analysis for Image Feature Extraction.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

Hybrid Bat Algorithm with Artificial Bee Colony.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

Compact Bat Algorithm.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

An Echo-Aided Bat Algorithm to Construct Topology of Spanning Tree in Wireless Sensor Networks.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

Use EMO to protect sensitive knowledge in association rule mining by removing items.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

An improved k-subset algorithm for load balance problems in Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

Incrementally Updating High-Utility Itemsets with Transaction Insertion.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

Association Rule Hiding Based on Evolutionary Multi-Objective Optimization by Removing Items.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
A Scalable Transitive Human-Verifiable Authentication Protocol for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2013

Fuzzy Rules Interpolation for Sparse Fuzzy Rule-Based Systems Based on Interval Type-2 Gaussian Fuzzy Sets and Genetic Algorithms.
IEEE Trans. Fuzzy Syst., 2013

Fuzzy Forecasting Based on Two-Factors Second-Order Fuzzy-Trend Logical Relationship Groups and Particle Swarm Optimization Techniques.
IEEE Trans. Cybern., 2013

Low-Latency Digit-Serial and Digit-Parallel Systolic Multipliers for Large Binary Extension Fields.
IEEE Trans. Circuits Syst. I Regul. Pap., 2013

A new non-exact Aho-Corasick framework for ECG classification.
SIGARCH Comput. Archit. News, 2013

A Transmission Power Optimization with a Minimum Node Degree for Energy-Efficient Wireless Sensor Networks with Full-Reachability.
Sensors, 2013

Face recognition based on fusion of multi-resolution Gabor features.
Neural Comput. Appl., 2013

The evolutionary random interval fingerprint for a more secure wireless communication.
Mob. Inf. Syst., 2013

An Efficient Scheme for Detecting Copy-move Forged Images by Local Binary Patterns.
J. Inf. Hiding Multim. Signal Process., 2013

A new fitness estimation strategy for particle swarm optimization.
Inf. Sci., 2013

Diversity enhanced particle swarm optimization with neighborhood search.
Inf. Sci., 2013

From the idea of "sparse representation" to a representation-based transformation method for feature extraction.
Neurocomputing, 2013

An Echo-Aided Bat Algorithm to Support Measurable Movement for Optimization Efficiency.
Proceedings of the IEEE International Conference on Systems, 2013

Digit-Serial GNB Multiplier Based on TMVP Approach over GF(2m).
Proceedings of the Second International Conference on Robot, Vision and Signal Processing, 2013

A Novel Feature Extraction Algorithm Based on Joint Learning.
Proceedings of the Second International Conference on Robot, Vision and Signal Processing, 2013

Fast Image Blending and Deghosting for Panoramic Video.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Feature Extraction Based on Nearest Feature Line and Compressive Sensing.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Novel Up-Sampling Based Watermarking Multiple Description Coding Frame.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A Novel Brain-Computer Interface Controller Scheme for Multimedia Control.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Detection of Region Duplication Forgery in Images under Affine Transforms.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A New Moment Based Image Quality Metric.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Data Hiding Based on Subsampling and Compressive Sensing.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Hierarchical Gradient Diffusion Algorithm for Wireless Sensor Networks.
Proceedings of the Recent Trends in Applied Artificial Intelligence, 2013

Design of a monocular simultaneous localisation and mapping system with ORB feature.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

Two classifiers based on nearest feature plane for recognition.
Proceedings of the IEEE International Conference on Image Processing, 2013

Quantification-Based Ant Colony System for TSP.
Proceedings of the Genetic and Evolutionary Computing, 2013

Directional Discriminant Analysis for Image Feature Extraction.
Proceedings of the Genetic and Evolutionary Computing, 2013

Hybrid Digit-Serial Multiplier for Shifted Polynomial Basis of GF(2 m ).
Proceedings of the Genetic and Evolutionary Computing, 2013

Nearest Feature Line and Extended Nearest Feature Line with Half Face.
Proceedings of the Genetic and Evolutionary Computing, 2013

Adaptively Nearest Feature Point Classifier for Face Recognition.
Proceedings of the Innovations in Bio-inspired Computing and Applications, 2013

An Energy-Aware Routing Protocol Using Cat Swarm Optimization for Wireless Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Similarity-based evolution control for fitness estimation in particle swarm optimization.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments, 2013

2012
Reversible Watermark Combining Pre-processing Operation and Histogram Shifting.
J. Inf. Hiding Multim. Signal Process., 2012

Multiple Viewpoints Based Overview for Face Recognition.
J. Inf. Hiding Multim. Signal Process., 2012

Restricted Nearest Feature Line with Ellipse for Face Recognition.
J. Inf. Hiding Multim. Signal Process., 2012

Special issue: Swarm intelligence and its applications.
Inf. Sci., 2012

Geometrically invariant image watermarking using Polar Harmonic Transforms.
Inf. Sci., 2012

Novel Watermarked MDC System Based on SFQ Algorithm.
IEICE Trans. Commun., 2012

Adaptively weighted sub-directional two-dimensional linear discriminant analysis for face recognition.
Future Gener. Comput. Syst., 2012

Enhanced parallel cat swarm optimization based on the Taguchi method.
Expert Syst. Appl., 2012

Adaptive Weighted Nearest Feature Space Analysis and Its Application to Feature Extraction.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2012

Discriminant Analysis Based on Nearest Feature Line.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

A New Statistical-based Algorithm for ECG Identification.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Novel FRFT Watermarking Algorithm Based on the Gray Relational Analysis.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Application of Belief Learning Model Based Socio-rational Secret Sharing Scheme on Cloud Storage.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Dominant Points Based Hand Finger Counting for Recognition under Skin Color Extraction in Hand Gesture Control System.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Image Restoration for Linear Local Motion-Blur Based on Cepstrum.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Nearest Feature Line Discriminant Analysis in DFRCT Domain for Image Feature Extraction.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

A Genetic Algorithm with Elite Mutation to Optimize Cruise Area of Mobile Sinks in Hierarchical Wireless Sensor Networks.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

Directional Discriminant Analysis Based on Nearest Feature Line.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Implementation of Indoor Positioning Using Signal Strength from Infrastructures.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

A Research on Behavior of Sleepy Lizards Based on KNN Algorithm.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Generalized playfield segmentation of sport videos using color features.
Pattern Recognit. Lett., 2011

The Structure Optimization of Main Beam for Bridge Crane Based on An Improved PSO.
J. Comput., 2011

An improved vector particle swarm optimization for constrained optimization problems.
Inf. Sci., 2011

Tabu search based multi-watermarks embedding algorithm with multiple description coding.
Inf. Sci., 2011

Kernel Self-optimized Locality Preserving Discriminant Analysis for feature extraction and recognition.
Neurocomputing, 2011

Compatible Stereo Video Coding with Adaptive Prediction Structure.
IEICE Trans. Inf. Syst., 2011

High Capacity Watermark Embedding Based on Invariant Regions of Visual Saliency.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A New Robust Watermarking Scheme Based on Shuffled Frog Leaping Algorithm.
Intell. Autom. Soft Comput., 2011

A new scheme of ant colony system algorithm to discovery optimal solution with flip-flop search.
Proceedings of the IEEE International Conference on Systems, 2011

A Parallel Hybrid Evolutionary Particle Filter for Nonlinear State Estimation.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

PSO with Constraint-Preserving Mechanism for Mixed-Variable Optimization Problems.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

Indoor Water-Dispensing Robot with Two-Stage Localization.
Proceedings of the First International Conference on Robot, Vision and Signal Processing, 2011

Wavelet-Based Entropy for Digital Audio Watermarking.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Reduce Identical Event Transmission Algorithm for Wireless Sensor Networks.
Proceedings of the Third International Conference on Intelligent Human Computer Interaction (IHCI 2011), 2011

Symmetry Auto-detection Based on Contour and Corner Models.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Biometric Electrocardiogram Card for Access Control System.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Evolutionary Interval Fingerprint for Wireless Network.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

New Anti-phishing Method with Two Types of Passwords in OpenID System.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Overview of Algorithms for Swarm Intelligence.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2011

Neighborhood Discriminant Nearest Feature Line Analysis for Face Recognition.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

Solving Constrained Optimization Problems by an Improved Particle Swarm Optimization.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

An optimization of adaptive transmission with guarantee connection degree for wireless sensor networks.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Biometric driven initiative system for passive continuous authentication.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Distributed Multiple Description Coding - Principles, Algorithms and Systems.
Springer, ISBN: 978-1-447-12247-0, 2011

2010
Guest Editorial.
J. Networks, 2010

Error-Resilient Triple-Watermarking with Multiple Description Coding.
J. Networks, 2010

Rotation invariant watermark embedding based on scale-adapted characteristic regions.
Inf. Sci., 2010

Automation Power Energy Management Strategy for Mobile Telecom Industry.
IEICE Trans. Commun., 2010

Fast k-nearest neighbor search algorithm based on pyramid structure of wavelet transform and its application to texture classification.
Digit. Signal Process., 2010

Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Directional two-dimensional principal component analysis for face recognition.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A scaffolding M-learning framework with IMS based IPTV PVR service.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

Dimensionality reduction based on nonparametric discriminant analysis with kernels for feature extraction and recognition.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

The open source IPTV service development environment: IPTV service execution environment.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

High capacity watermark embedding based on local invariant features.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Reversible Watermarking Based on Invariant Relation of Three Pixels.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

Geometrically Invariant Image Watermarking Using Scale-Invariant Feature Transform and K-Means Clustering.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

A Novel Embedded Coding Algorithm Based on the Reconstructed DCT Coefficients.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

GOP-Flexible Distributed Multiview Video Coding with Adaptive Side Information.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

Audio Watermarking with HOS-Based Cepstrum Feature.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

An Effective Image Enhancement Method for Electronic Portal Images.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

An Extensible Particles Swarm Optimization for Energy-Effective Cluster Management of Underwater Sensor Networks.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

A new approach based on XMPP and OSGi technology to home automation on Web.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

Two-dimensional Exponential Discriminant Analysis and its Application to Face Recognition.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

Power Reduction of Wireless Sensor Networks Using Ant Colony Optimization.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Innovations in Digital Watermarking Techniques
Studies in Computational Intelligence 232, Springer, ISBN: 978-3-642-03186-1, 2009

Weighted Fuzzy Interpolative Reasoning Based on Weighted Increment Transformation and Weighted Ratio Transformation Techniques.
IEEE Trans. Fuzzy Syst., 2009

Guest editorial: bio-inspired information hiding.
Soft Comput., 2009

The optimized copyright protection system with genetic watermarking.
Soft Comput., 2009

Face recognition using Gabor-based complete Kernel Fisher Discriminant analysis with fractional power polynomial models.
Neural Comput. Appl., 2009

Kernel optimization-based discriminant analysis for face recognition.
Neural Comput. Appl., 2009

Forecasting enrollments using automatic clustering techniques and fuzzy logical relationships.
Expert Syst. Appl., 2009

Lossless data hiding based on prediction-error adjustment.
Sci. China Ser. F Inf. Sci., 2009

Research and Implementation of Service-oriented Architecture Supporting Locationbased Services on Sensor Networks.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

An Adaptive Approach Based on Genetic Algorithm to Information Hiding for Halftone Images.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

An Improved Particle Swarm Optimization with Feasibility-Based Rules for Constrained Optimization Problems.
Proceedings of the Next-Generation Applied Intelligence, 2009

The triple-watermarking algorithm with multiple description coding over lossy communication networks.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

RBF Neural Network Based on Fuzzy Evolution Kalman Filtering and Application in Mine Safety Monitoring.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Particle Swarm Optimization with Feasibility-Based Rules for Mixed-Variable Optimization Problems.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Image Segmentation Based on GC-CV.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A New Vector Particle Swarm Optimization for Constrained Optimization Problems.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

The Application and Study of Graph Cut in Motion Segmentation.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs.
IEEE Signal Process. Lett., 2008

Information Hiding and Multimedia Signal Processing.
J. Digit. Inf. Manag., 2008

Discriminant Parallel Feature Fusion Based on Maximum Margin Criterion for Pattern Classification.
J. Digit. Inf. Manag., 2008

Kernel class-wise locality preserving projection.
Inf. Sci., 2008

A new measure of index assignment in dynamic channels.
Inf. Sci., 2008

Adaptive quasiconformal kernel discriminant analysis.
Neurocomputing, 2008

Improved search strategies and extensions to k-medoids-based clustering algorithms.
Int. J. Bus. Intell. Data Min., 2008

MR-MIL: Manifold Ranking Based Multiple-Instance Learning for Automatic Image Annotation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Self Embedding Watermarking Scheme Using Halftone Image.
IEICE Trans. Inf. Syst., 2008

A Subsampling-Based Digital Image Watermarking Scheme Resistant to Permutation Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Video Watermarking by Space-Time Interest Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

An efficient hybrid distributed video coding.
IEICE Electron. Express, 2008

Scale-Space Feature Based Image Watermarking in Contourlet Domain.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A Novel Image Annotation Scheme Based on Neural Network.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Lossless and Lossy Image Secret Sharing for Data Transmission.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Reversible Watermarking Based on the Invariant Sum Value.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Efficient Scalable Distributed Video Coding Based on Residual SW-SPIHT.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A GA-Based Image Halftoning Technique.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Robust Audio Watermarking Algorithm Based on DCT and Vector Quantization.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Robust Image Watermarking Using Mean Quantization in DTCWT Domain.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Multiple Description Image Coding Based on DSC and Pixel Interleaving.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Face Recognition Algorithm Decreasing the Effect of Illumination.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Halftone Image Data Hiding with Reference to Original Multitone Image.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Information Hiding Scheme for the MDC-OFDM Wireless Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Double-Domains-Based Covert Communication Scheme for a RS-Code-Based Multiple Description Image Coding System.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

MRS-MIL: Minimum reference set based multiple instance learning for automatic image annotation.
Proceedings of the International Conference on Image Processing, 2008

Reversible watermarking based on PMO of triplets.
Proceedings of the International Conference on Image Processing, 2008

A Double Domain Based Robust Digital Image Watermarking Scheme.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2008

Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement Multitoning.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Reversible Watermarking Techniques.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

Tabu Search Based Multi-Watermarking over Lossy Networks.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

An Introduction to Intelligent Multimedia Data Hiding.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

VQ-based watermarking scheme with genetic codebook partition.
J. Netw. Comput. Appl., 2007

Rotation-based Three Dimensional Shape Descriptor.
J. Digit. Inf. Manag., 2007

Multiuser-based shadow watermark extraction system.
Inf. Sci., 2007

Hadamard transform based fast codeword search algorithm for high-dimensional VQ encoding.
Inf. Sci., 2007

Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images.
Informatica, 2007

Reversible watermarking resistant to cropping attack.
IET Inf. Secur., 2007

Lossless Data Hiding Based on Companding Technique and Difference Expansion of Triplets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Visible Watermarking for Halftone Images.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Attacking Phase Shift Keying Based Watermarking.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Content Adaptive Visible Watermarking during Ordered Dithering.
IEICE Trans. Inf. Syst., 2007

A More Robust Subsampling-Based Image Watermarking.
IEICE Trans. Inf. Syst., 2007

Multiple Watermarking in Visual Cryptography.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Face Recognition from a Single Image per Person Using Common Subfaces Method.
Proceedings of the Advances in Neural Networks, 2007

Watermarking-Based Transparency Authentication in Visual Cryptography.
Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, 2007

Laplacian Discriminant Projection with Optimized Kernels for Supervised Feature Extraction and Classification.
Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, 2007

Generalized Discrete Fractional Hadamard Transformation and its Application on the Image Encryption.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Hiding Multiple Watermarks in Transparencies of Visual Cryptography.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Covert Communication Scheme for the DCT Based Image Multiple Description Coding System.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2D(PC)2 A for Face Recognition with One Training Image per Person.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Reversible Data Hiding Base on Histogram Shift for 3D Vertex.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Optimized Copyright Protection Systems with Genetic-Based Robust Watermarking.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Information Protection and Recovery with Reversible Data Hiding.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Novel High-Capacity Reversiblewatermarking Scheme.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

A Novel Reversible Watermarking Based on an Integer Transform.
Proceedings of the International Conference on Image Processing, 2007

Locally Discriminant Projection with Kernels for Feature Extraction.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

A Criterion for Learning the Data-Dependent Kernel for Classification.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

2006
Intelligent Parallel Particle Swarm Optimization Algorithms.
Proceedings of the Parallel Evolutionary Computations, 2006

Robust observers for neutral jumping systems with uncertain information.
Inf. Sci., 2006

Adaptive Kernel Discriminant Analysis and its Applications on Pattern Recognition.
Int. J. Inf. Acquis., 2006

Index assignment for MDVQ over memoryless binary symmetric channel with packet erasure.
IEICE Electron. Express, 2006

Robust VQ-Based Digital Image Watermarking for Mobile Wireless Channel.
Proceedings of the IEEE International Conference on Systems, 2006

An Efficient Reformative Kernel Discriminant Analysis for Face Recognition.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2006

Cat Swarm Optimization.
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006

Reversible Watermarking for Error Diffused Halftone Images Using Statistical Features.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A New 3D Shape Descriptor Based on Rotation.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Complete Kernel Fisher discriminant analysis of Gabor features with fractional power polynomial models for face recognition.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

Joint Halftoning and Visible Watermarking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Reversible Data Hiding for 3D Point Cloud Model.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

An Information Hiding Scheme for OFDM Wireless Networks.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Subsampling and PSK Based Watermarking Scheme Resisted the Permutation Attacking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Interlacing Domain Partition for Fractal Watermarking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Novel Matrix Norm Based Gaussian Kernel for Feature Extraction of Images.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Discriminant Feature Fusion Strategy for Supervised Learning.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Fire-Alarming Method Based on Video Processing.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Subsampling and Quantization Based Watermarking Scheme Resisted the Permutation Attacking.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Robust VQ-Based Digital Image Watermarking for Noisy Channel.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Robust Image Watermarking Algorithm Based on Predictive Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Image Watermarking Robust to Print and Generation Copy.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

An Improved Digital Watermarking Scheme in the Domain of Vector Quantization.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
A Parallel Particle Swarm Optimization Algorithm with Communication Strategies.
J. Inf. Sci. Eng., 2005

Statistical Analysis of Two Polarity Detection Schemes in Speech Watermarking.
Proceedings of the 17th Conference on Computational Linguistics and Speech Processing, 2005

Speech Authentication by Semi-fragile Watermarking.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Reversible Watermarking Based on Improved Patchwork Algorithm and Symmetric Modulo Operation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Shadow Watermark Extraction System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image Retrieval.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Lossless Watermarking Technique for Halftone Images.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Improved Image Coding with Classified VQ and Side-Match VQ.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Print and Generation Copy Image Watermarking Based on Spread Spectrum Technique.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Shadow watermark embedding system.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Hiding watermark in watermark [image watermarking].
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Multipurpose image watermarking in DCT domain using subsampling.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Multiple description watermarking for lossy network.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
Genetic watermarking based on transform-domain techniques.
Pattern Recognit., 2004

Novel multi-centroid, multi-run sampling schemes for K-medoids-based algorithms.
Int. J. Knowl. Based Intell. Eng. Syst., 2004

Optimization of HMM by the Tabu Search Algorithm.
J. Inf. Sci. Eng., 2004

Ant colony system with communication strategies.
Inf. Sci., 2004

Vq-Based Gray Watermark Embedding Scheme With Genetic Index Assignment.
Int. J. Comput. Intell. Appl., 2004

A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Constrained Ant Colony Optimization for Data Clustering.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004

VQ-Based Gray Watermark Hiding Scheme and Genetic Index Assignment.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Robust VQ-based digital watermarking for memoryless binary symmetric channel.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A VQ-based image-in-image data hiding scheme.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Design of hierarchical keys for a multi-user-based watermarking system.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Improved partial distance search for k nearest-neighbor classification.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Hadamard transform based equal-average equal-variance equal-norm nearest neighbor codeword search algorithm.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

2003
An efficient encoding algorithm for vector quantization based on subvector technique.
IEEE Trans. Image Process., 2003

An Embedding Algorithm for Multiple Watermarks.
J. Inf. Sci. Eng., 2003

Parallel Ant Colony Systems.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

A Novel VQ-Based Watermarking Scheme with Genetic Codebook Partition.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003

2002
A VQ-Based Robust Multi-Watermarking Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Multi-user Based Watermarking System with Two-Security-Level Keys.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A Multistage VQ Based Watermarking Technique with Fake Watermarks.
Proceedings of the Digital Watermarking, First International Workshop, 2002

An Efficient K -Medoids-Based Algorithm Using Previous Medoid Index, Triangular Inequality Elimination Criteria, and Partial Distance Search.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

2001
Vector quantization based on genetic simulated annealing.
Signal Process., 2001

A Tabu Seach Based Maximum Descent Algorithm for VQ Codebook Design.
J. Inf. Sci. Eng., 2001

Optimiztion of HMM by the Tabu Search Algorithm.
Proceedings of the 14th Conference on Computational Linguistics and Speech Processing, 2001

2000
Evolutionary Feature Selection for Texture Classification Using Multiwavelets.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2000), 2000

Image Coding Using SMVQ with Two-level Block Classifier.
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000

A new inequality for VQ image coding.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

A fast image coding algorithm using variable-rate mean-match correlation vector quantization.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

VQ Image Coding Using Sub-Vector Techniques.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
A Training Approach for Efficient VQ Codeword Search.
J. Inf. Sci. Eng., 1999

Evaluation of fuzzy rule bases under delayed reinforcement.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999

Non-redundant VQ channel coding using modified tabu search approach with simulated annealing.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999

A novel channel distortion measure for vector quantization and a fuzzy model for codebook index assignment.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999

1998
A new vector quantization image coding algorithm based on the extension of the bound for Minkowski metric.
Pattern Recognit., 1998

2-D Non-Separable Wavelet Bases for Texture Classification with Genetic Feature Selection.
Proceedings of IAPR Workshop on Machine Vision Applications, 1998

Comparison study on VQ codevector index assignment.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998

1996
Fast clustering algorithms for vector quantization.
Pattern Recognit., 1996

VQ codevector index assignment using genetic algorithms for noisy channels.
Proceedings of the 4th International Conference on Spoken Language Processing, 1996

1995
Bound for minkowski metric based on LP distortion measure.
Proceedings of the Fourth European Conference on Speech Communication and Technology, 1995


  Loading...