Min Long
Orcid: 0000-0001-5938-5070
According to our database1,
Min Long
authored at least 116 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Feature Interaction-Based Face De-Morphing Factor Prediction for Restoring Accomplice's Facial Image.
Sensors, September, 2024
Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024
IEEE Trans. Biom. Behav. Identity Sci., July, 2024
Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network.
Comput. Secur., February, 2024
Separable Reversible Data Hiding for Encrypted 3D Mesh Models Based on Octree Subdivision and Multi-MSB Prediction.
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IET Image Process., 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
Semi-Fragile Reversible Watermarking for 3D Models Using Spherical Crown Volume Division.
IEEE Trans. Circuits Syst. Video Technol., November, 2023
Dynamic Residual Distillation Network for Face Anti-Spoofing With Feature Attention Learning.
IEEE Trans. Biom. Behav. Identity Sci., October, 2023
A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics.
ACM Trans. Multim. Comput. Commun. Appl., 2023
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy.
IEEE Trans. Multim., 2023
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning.
IEEE Trans. Dependable Secur. Comput., 2023
Int. J. Syst. Sci., 2023
HEGrid: A high efficient multi-channel radio astronomical data gridding framework in heterogeneous computing environments.
Future Gener. Comput. Syst., 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Proceedings of the 9th International Conference on Systems and Informatics, 2023
Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality.
Proceedings of the International Conference on Computing, Networking and Communications, 2023
PRISM: A Blockchain-Enabled Reputation-Based Consensus for Enhancing Scientific Workflow Provenance.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023
2022
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study.
ACM Trans. Priv. Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
BDC-GAN: Bidirectional Conversion Between Computer-Generated and Natural Facial Images for Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Semi-Fragile Reversible Watermarking for Authenticating 3D Models in Dual Domains Based on Variable Direction Double Modulation.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation.
IEEE Trans. Circuits Syst. Video Technol., 2022
Signal Process. Image Commun., 2022
Presentation attack detection based on two-stream vision transformers with self-attention fusion.
J. Vis. Commun. Image Represent., 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Face Morphing Detection Based on a Two-Stream Network with Channel Attention and Residual of Multiple Color Spaces.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
SciLedger: A Blockchain-based Scientific Workflow Provenance and Data Sharing Platform.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022
2021
A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region Nesting.
IEEE Trans. Circuits Syst. Video Technol., 2021
A General Region Nesting-Based Semi-Fragile Reversible Watermarking for Authenticating 3D Mesh Models.
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Comput. Soc. Syst., 2021
Low Visual Distortion and Robust Morphing Attacks Based on Partial Face Image Manipulation.
IEEE Trans. Biom. Behav. Identity Sci., 2021
Identifying natural images and computer-generated graphics based on convolutional neural network.
Int. J. Auton. Adapt. Commun. Syst., 2021
Detection of radio frequency interference using an improved generative adversarial network.
Astron. Comput., 2021
S-Box Design Based on Discrete Chaotic Map and Improved Artificial Bee Colony Algorithm.
IEEE Access, 2021
MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
VAULT: A Scalable Blockchain-Based Protocol for Secure Data Access and Collaboration.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
CGR-GAN: CG Facial Image Regeneration for Antiforensics Based on Generative Adversarial Network.
IEEE Trans. Multim., 2020
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling.
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting.
Signal Process. Image Commun., 2020
A separable reversible data hiding scheme for encrypted images based on Tromino scrambling and adaptive pixel value ordering.
Signal Process., 2020
Performance optimization of non-equilibrium ionization simulations from MapReduce and GPU acceleration.
Parallel Comput., 2020
Face presentation attack detection based on chromatic co-occurrence of local binary pattern and ensemble learning.
J. Vis. Commun. Image Represent., 2020
基于区块链的环境监测数据安全传输方案 (Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain).
计算机科学, 2020
Int. J. Bifurc. Chaos, 2020
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
IEEE Trans. Reliab., 2019
Reversible Data Hiding in Encrypted 2D Vector Graphics Based on Reversible Mapping Model for Real Numbers.
IEEE Trans. Inf. Forensics Secur., 2019
A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion.
Signal Process. Image Commun., 2019
A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates.
Multim. Tools Appl., 2019
Identifying natural images and computer generated graphics based on binary similarity measures of PRNU.
Multim. Tools Appl., 2019
基于用户间接信任及高斯填充的推荐算法 (Recommendation Methods Considering User Indirect Trust and Gaussian Filling).
计算机科学, 2019
Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-Node of AVL Tree.
Int. J. Digit. Crime Forensics, 2019
IET Commun., 2019
Comput. Secur., 2019
FD-GAN: Face De-Morphing Generative Adversarial Network for Restoring Accomplice's Facial Image.
IEEE Access, 2019
2018
IEEE Trans. Multim., 2018
A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting.
IEEE Trans. Inf. Forensics Secur., 2018
Outage performance of double-relay cooperative transmission network with energy harvesting.
Phys. Commun., 2018
Multim. Tools Appl., 2018
Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination.
J. Vis. Commun. Image Represent., 2018
J. Real Time Image Process., 2018
Int. J. Digit. Crime Forensics, 2018
A Format-Compliant Encryption for Secure HEVC Video Sharing in Multimedia Social Network.
Int. J. Digit. Crime Forensics, 2018
FIPIP: A novel fine-grained parallel partition based intra-frame prediction on heterogeneous many-core systems.
Future Gener. Comput. Syst., 2018
FD-GAN: Face-demorphing generative adversarial network for restoring accomplice's facial image.
CoRR, 2018
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
A reversible watermarking for authenticating 2D vector graphics based on bionic spider web.
Signal Process. Image Commun., 2017
A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017
J. Vis. Commun. Image Represent., 2017
A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping.
Int. J. Digit. Crime Forensics, 2017
Integrity Verification for Multiple Data Copies in Cloud Storage Based on Spatiotemporal Chaos.
Int. J. Bifurc. Chaos, 2017
A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
A competition on generalized software-based face presentation attack detection in mobile scenarios.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
Content-Independent Face Presentation Attack Detection with Directional Local Binary Pattern.
Proceedings of the Biometric Recognition - 12th Chinese Conference, 2017
2016
Multim. Tools Appl., 2016
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016
POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2016
Source Camera Identification Based on Guided Image Estimation and Block Weighted Average.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the 23rd International Conference on Telecommunications, 2016
2015
A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization.
Int. J. Digit. Crime Forensics, 2015
Identification of Natural Images and Computer Generated Graphics Using Multi-fractal Differences of PRNU.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
IEEE Trans. Veh. Technol., 2014
Evaluation of generalised relay selection in the presence of feedback delay for multi-hop relaying.
IET Commun., 2014
Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting.
Comput. Aided Des., 2014
Proceedings of the 24th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2014
Identifying photographic images and photorealistic computer graphics using multifractal spectrum features of PRNU.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
2013
IEEE Trans. Veh. Technol., 2013
IEEE Trans. Inf. Forensics Secur., 2013
A reversible watermark scheme for 2D vector map based on reversible contrast mapping.
Secur. Commun. Networks, 2013
Securing data services: a security architecture design for private storage cloud based on HDFS.
Int. J. Grid Util. Comput., 2013
Int. J. Digit. Crime Forensics, 2013
Collision Analysis and Improvement of a Parallel Hash Function based on Chaotic Maps with Changeable Parameters.
Int. J. Digit. Crime Forensics, 2013
IET Commun., 2013
IEEE Commun. Lett., 2013
2012
Existence and Exponential Stability of Multiple Periodic Solutions for a Multidirectional Associative Memory Neural Network.
Neural Process. Lett., 2012
Identification of Natural Images and Computer Generated Graphics Based on Hybrid Features.
Int. J. Digit. Crime Forensics, 2012
IET Commun., 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
IEEE Commun. Lett., 2011
A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011
2010
A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation.
Comput. Aided Des., 2010
2009
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation.
Proceedings of the Information Security and Digital Forensics, 2009
2008
A Strength Variable Encryption Algorithm for 2D Engineering Graphic Based on Discrete Cosine Descriptors and Chaos Scrambling.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Proceedings of the Frontiers in the Convergence of Bioscience and Information Technologies 2007, 2007
2006
Proceedings of the Advances in Web-Age Information Management, 2006