Nenghai Yu
Orcid: 0000-0003-4417-9316
According to our database1,
Nenghai Yu
authored at least 618 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
Q-CSKDF: A Continuous and Security Key Derivation Function for Quantum Key Distribution.
IEEE Netw., September, 2024
REDP: Reliable Entanglement Distribution Protocol Design for Large-Scale Quantum Networks.
IEEE J. Sel. Areas Commun., July, 2024
IEEE Trans. Knowl. Data Eng., June, 2024
IEEE Trans. Commun., April, 2024
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability.
Multim. Tools Appl., April, 2024
Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition.
IEEE Trans. Artif. Intell., March, 2024
Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks.
IEEE/ACM Trans. Netw., February, 2024
Efficient Remote Entanglement Distribution in Quantum Networks: A Segment-Based Method.
IEEE Trans. Netw. Serv. Manag., February, 2024
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024
IEEE Netw., January, 2024
J. Imaging, January, 2024
An Efficient Scheduling Scheme of Swapping and Purification Operations for End-to-End Entanglement Distribution in Quantum Networks.
IEEE Trans. Netw. Sci. Eng., 2024
Joint Identity-Aware Mixstyle and Graph-Enhanced Prototype for Clothes-Changing Person Re-Identification.
IEEE Trans. Multim., 2024
Exploring the Application of Large-Scale Pre-Trained Models on Adverse Weather Removal.
IEEE Trans. Image Process., 2024
IEEE Trans. Image Process., 2024
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Geosci. Remote. Sens., 2024
IEEE Trans. Geosci. Remote. Sens., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Binary Code Similarity Detection via Graph Contrastive Learning on Intermediate Representations.
CoRR, 2024
Deciphering Cross-Modal Alignment in Large Vision-Language Models with Modality Integration Rate.
CoRR, 2024
CamLoPA: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis.
CoRR, 2024
Mixture-of-Noises Enhanced Forgery-Aware Predictor for Multi-Face Manipulation Detection and Localization.
CoRR, 2024
\copyright Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model.
CoRR, 2024
How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Detect Text Forgery with Non-forged Image Features: A Framework for Detection and Grounding of Image-Text Manipulation.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
SemGIR: Semantic-Guided Image Regeneration Based Method for AI-generated Image Detection and Attribution.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Transferable Facial Privacy Protection against Blind Face Restoration via Domain-Consistent Adversarial Obfuscation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
A Distributed Routing Protocol Based on Key Reservation in Quantum Key Distribution Networks.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
DSIS: A Novel (K, N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery.
Proceedings of the IEEE International Conference on Acoustics, 2024
Exploiting Modality-Specific Features for Multi-Modal Manipulation Detection and Grounding.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
A Geometric Distortion Immunized Deep Watermarking Framework with Robustness Generalizability.
Proceedings of the Computer Vision - ECCV 2024, 2024
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Unifying Multi-Modal Uncertainty Modeling and Semantic Alignment for Text-to-Image Person Re-identification.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
TCI-Former: Thermal Conduction-Inspired Transformer for Infrared Small Target Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Swapping-Based Entanglement Routing Design for Congestion Mitigation in Quantum Networks.
IEEE Trans. Netw. Serv. Manag., December, 2023
A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks.
IEEE Commun. Mag., December, 2023
Enhancing image steganography via adversarial optimization of the stego distribution.
Signal Process., November, 2023
IEEE J. Sel. Top. Signal Process., November, 2023
Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks.
IEEE Trans. Artif. Intell., October, 2023
IEEE Trans. Circuits Syst. Video Technol., September, 2023
IEEE Netw., September, 2023
High-fidelity video reversible data hiding using joint spatial and temporal prediction.
Signal Process., July, 2023
IEEE Trans. Pattern Anal. Mach. Intell., May, 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
IEEE Trans. Multim., 2023
F<sup>2</sup>Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Commun., 2023
Signal Process., 2023
Comput. Syst. Sci. Eng., 2023
CoRR, 2023
Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023
CoRR, 2023
Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023
CoRR, 2023
Multi-spectral Class Center Network for Face Manipulation Detection and Localization.
CoRR, 2023
Clothes-Invariant Feature Learning by Causal Intervention for Clothes-Changing Person Re-identification.
CoRR, 2023
VQNet 2.0: A New Generation Machine Learning Framework that Unifies Classical and Quantum.
CoRR, 2023
Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions.
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion.
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023
ABMNet: Coupling Transformer with CNN Based on Adams-Bashforth-Moulton Method for Infrared Small Target Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Exploring the Limits of Differentially Private Deep Learning with Group-wise Clipping.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Revisiting TENT for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment.
Proceedings of the Image and Graphics - 12th International Conference, 2023
Proceedings of the Image and Graphics - 12th International Conference, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Evopose: A Recursive Transformer for 3D Human Pose Estimation with Kinematic Structure Priors.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Dual-Uncertainty Guided Curriculum Learning and Part-Aware Feature Refinement for Domain Adaptive Person Re-Identification.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
BAUENet: Boundary-Aware Uncertainty Enhanced Network for Infrared Small Target Detection.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Data Compression Conference, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Vis. Comput. Graph., 2022
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud.
IEEE Trans. Serv. Comput., 2022
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis.
IEEE Trans. Multim., 2022
TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability.
IEEE Trans. Multim., 2022
IEEE Trans. Image Process., 2022
Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection.
IEEE Trans. Inf. Forensics Secur., 2022
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Commun., 2022
A Heuristic Remote Entanglement Distribution Algorithm on Memory-Limited Quantum Paths.
IEEE Trans. Commun., 2022
Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection.
IEEE Trans. Biom. Behav. Identity Sci., 2022
Signal Process., 2022
A cluster-based networking approach for large-scale and wide-area quantum key agreement.
Quantum Inf. Process., 2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
IEEE Netw., 2022
Connection-Oriented and Connectionless Remote Entanglement Distribution Strategies in Quantum Networks.
IEEE Netw., 2022
J. Inf. Secur. Appl., 2022
Online multi-object tracking with unsupervised re-identification learning and occlusion estimation.
Neurocomputing, 2022
Digit. Commun. Networks, 2022
CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet.
CoRR, 2022
CoRR, 2022
Sci. China Inf. Sci., 2022
Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
Towards Intrinsic Common Discriminative Features Learning for Face Forgery Detection Using Adversarial Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Privacy-preserving Collaborative Learning with Scalable Image Transformation and Autoencoder.
Proceedings of the IEEE Global Communications Conference, 2022
UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection.
Proceedings of the Computer Vision - ECCV 2022, 2022
Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification.
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the Data Compression Conference, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Computer Vision - ACCV 2022, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Vis. Comput. Graph., 2021
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance.
IEEE Trans. Inf. Forensics Secur., 2021
BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Signal Process., 2021
Quantum Inf. Process., 2021
An improved QKD protocol without public announcement basis using periodically derived basis.
Quantum Inf. Process., 2021
IEEE Trans. Pattern Anal. Mach. Intell., 2021
IEEE Trans. Pattern Anal. Mach. Intell., 2021
Motion vector modification distortion analysis-based payload allocation for video steganography.
J. Vis. Commun. Image Represent., 2021
J. Vis. Commun. Image Represent., 2021
Improving UNIWARD distortion function via isotropic construction and hierarchical merging.
J. Vis. Commun. Image Represent., 2021
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications.
J. Organ. End User Comput., 2021
Inf. Sci., 2021
InPPTD: A Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowdsensing Systems.
IEEE Internet Things J., 2021
Neurocomputing, 2021
IACR Cryptol. ePrint Arch., 2021
Future Internet, 2021
CoRR, 2021
Towards Generalizable and Robust Face Manipulation Detection via Bag-of-local-feature.
CoRR, 2021
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Proceedings of the International Conference on Visual Communications and Image Processing, 2021
Nearly Reversible Image-to-Image Translation Using Joint Inter-Frame Coding and Embedding.
Proceedings of the International Conference on Visual Communications and Image Processing, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021
Convolutional Neural Network-driven Optimal Prediction for Image Reversible Data Hiding.
Proceedings of the 23rd International Workshop on Multimedia Signal Processing, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Deepfake Video Detection Using 3D-Attentional Inception Convolutional Neural Network.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble Method.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Undetectable JPEG Image Batch Reversible Data Hiding with Content-adaptive Payload Allocation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021
Joint Color-irrelevant Consistency Learning and Identity-aware Modality Adaptation for Visible-infrared Cross Modality Person Re-identification.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Towards Anti-Interference Human Activity Recognition Based on WiFi Subcarrier Correlation Selection.
IEEE Trans. Veh. Technol., 2020
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud.
IEEE Trans. Serv. Comput., 2020
ACM Trans. Graph., 2020
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks.
IEEE Trans. Multim., 2020
SAFNet: A Semi-Anchor-Free Network With Enhanced Feature Pyramid for Object Detection.
IEEE Trans. Image Process., 2020
IEEE Trans. Image Process., 2020
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
IEEE Trans. Inf. Forensics Secur., 2020
SecGrid: A Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio.
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Commun., 2020
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Fast Encoding Algorithms for Reed-Solomon Codes With Between Four and Seven Parity Symbols.
IEEE Trans. Computers, 2020
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain.
Signal Process., 2020
J. Real Time Image Process., 2020
Efficient and privacy-preserving authentication scheme for wireless body area networks.
J. Inf. Secur. Appl., 2020
Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs.
IET Inf. Secur., 2020
Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization.
CoRR, 2020
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem.
Comput. Commun., 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Defining Embedding Distortion for Sample Adaptive Offset-Based HEVC Video Steganography.
Proceedings of the 22nd IEEE International Workshop on Multimedia Signal Processing, 2020
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Towards Anti-interference WiFi-based Activity Recognition System Using Interference-Independent Phase Component.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
DASOT: A Unified Framework Integrating Data Association and Single Object Tracking for Online Multi-Object Tracking.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019
IEEE Trans. Multim., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
IEEE Trans. Commun., 2019
Signal Process., 2019
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks.
Secur. Commun. Networks, 2019
A no-reference quality assessment for contrast-distorted image based on improved learning method.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization.
Multim. Tools Appl., 2019
J. Electronic Imaging, 2019
IEEE Internet Things J., 2019
A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks.
IEEE Internet Things J., 2019
Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data.
IEEE Internet Things J., 2019
IET Image Process., 2019
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019
A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret.
CoRR, 2019
A Large Scale Urban Surveillance Video Dataset for Multiple-Object Tracking and Behavior Analysis.
CoRR, 2019
Comput. Secur., 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Learning Pixel-Level and Instance-Level Context-Aware Features for Pedestrian Detection in Crowds.
IEEE Access, 2019
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019
Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo).
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the 7th International Conference on Learning Representations, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the 2nd International Conference on Image and Graphics Processing, 2019
Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification.
Proceedings of the Image and Graphics - 10th International Conference, 2019
Proceedings of the Image and Graphics - 10th International Conference, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
IEEE Trans. Multim., 2018
IEEE Trans. Image Process., 2018
IEEE Trans. Circuits Syst. Video Technol., 2018
Signal Process., 2018
Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing.
IEEE Netw., 2018
A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
J. Vis. Commun. Image Represent., 2018
CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.
CoRR, 2018
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals.
CoRR, 2018
Proceedings of the IEEE Visual Communications and Image Processing, 2018
Low-Latency Authentication Against Satellite Compromising for Space Information Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
A multi-task framework with feature passing module for skin lesion classification and segmentation.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 2nd International Conference on Video and Image Processing, 2018
Proceedings of the 35th International Conference on Machine Learning, 2018
Anomaly Detection and Localization: A Novel Two-Phase Framework Based on Trajectory-Level Characteristics.
Proceedings of the 2018 IEEE International Conference on Multimedia & Expo Workshops, 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018
Proceedings of the Computer Vision - ECCV 2018, 2018
Proceedings of the Computer Vision - ECCV 2018, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
Efficient Human Action Recognition Interface for Augmented and Virtual Reality Applications Based on Binary Descriptor.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2018
2017
ACM Trans. Knowl. Discov. Data, 2017
IEEE Trans. Image Process., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Circuits Syst. Video Technol., 2017
CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding.
IEEE Trans. Computers, 2017
Secur. Commun. Networks, 2017
Multim. Tools Appl., 2017
Smart motion reconstruction system for golf swing: a DBN model based transportable, non-intrusive and inexpensive golf swing capture and reconstruction system.
Multim. Tools Appl., 2017
CoRR, 2017
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
Proceedings of the 34th International Conference on Machine Learning, 2017
Proceedings of the 34th International Conference on Machine Learning, 2017
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
PPEDNet: Pyramid Pooling Encoder-Decoder Network for Real-Time Semantic Segmentation.
Proceedings of the Image and Graphics - 9th International Conference, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism.
Proceedings of the IEEE International Conference on Computer Vision, 2017
Proceedings of the IEEE International Conference on Computer Vision, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
IEEE Trans. Multim., 2016
IEEE Trans. Multim., 2016
Signal Process. Image Commun., 2016
Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams.
Signal Process., 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
J. Vis. Commun. Image Represent., 2016
Locality-preserving low-rank representation for graph construction from nonlinear manifolds.
Neurocomputing, 2016
Neurocomputing, 2016
Digit. Signal Process., 2016
Asynchronous Stochastic Gradient Descent with Delay Compensation for Distributed Deep Learning.
CoRR, 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016
Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
2015
IEEE Trans. Image Process., 2015
Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications.
IEEE Trans. Image Process., 2015
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
IEEE Trans. Inf. Forensics Secur., 2015
Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2015
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015
IEEE Trans. Circuits Syst. Video Technol., 2015
Mobile cloud computing based privacy protection in location-based information survey applications.
Secur. Commun. Networks, 2015
Multim. Tools Appl., 2015
Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Multi-target Tracking via Max-Entropy Target Selection and Heterogeneous Camera Fusion.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Person re-identification by the marriage of KISS metric learning and post-rank optimization: KISSPOP.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015
Proceedings of the Image and Graphics - 8th International Conference, 2015
Cooperative Target Tracking in Dual-Camera System with Bidirectional Information Fusion.
Proceedings of the Image and Graphics - 8th International Conference, 2015
A Robust Occlusion Judgment Scheme for Target Tracking Under the Framework of Particle Filter.
Proceedings of the Image and Graphics - 8th International Conference, 2015
Proceedings of the Image and Graphics - 8th International Conference, 2015
Proceedings of the International Conference on Cloud Computing and Big Data, 2015
Proceedings of The 7th Asian Conference on Machine Learning, 2015
2014
Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics.
IEEE Trans. Computers, 2014
Multim. Tools Appl., 2014
The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications.
Int. J. Distributed Sens. Networks, 2014
Int. J. Digit. Crime Forensics, 2014
Int. J. Digit. Crime Forensics, 2014
Comput. Secur., 2014
Moving object detection of dynamic scenes using spatio-temporal context and background modeling.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
Proceedings of the Internet of Vehicles - Technologies and Services, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Computer Vision - ECCV 2014, 2014
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Incentivizing High-Quality Content from Heterogeneous Users: On the Existence of Nash Equilibrium.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9008-1, 2013
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression.
IEEE Trans. Image Process., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Circuits Syst. Video Technol., 2013
Neurocomputing, 2013
Learning from contextual information of geo-tagged web photos to rank personalized tourism attractions.
Neurocomputing, 2013
Proceedings of the ACM Multimedia Conference, 2013
Proceedings of the Media Watermarking, 2013
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013
Online travel destination recommendation with efficient variable memory Markov model.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the Seventh International Conference on Image and Graphics, 2013
Proceedings of the Seventh International Conference on Image and Graphics, 2013
MOS-Based Channel Allocation Schemes for Mixed Services over Cognitive Radio Networks.
Proceedings of the Seventh International Conference on Image and Graphics, 2013
Toward Optimal Additive Noise Distribution for Privacy Protection in Mobile Statistics Aggregation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.
IEEE Trans. Image Process., 2012
IEEE Trans. Pattern Anal. Mach. Intell., 2012
Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data.
Adv. Multim., 2012
Proceedings of the 21st World Wide Web Conference, 2012
Proceedings of the 2012 Visual Communications and Image Processing, 2012
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012
Efficient Tag Mining via Mixture Modeling for Real-Time Search-Based Image Annotation.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012
Accelerometer-based single-handed video browsing on mobile devices: design and user studies.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012
2011
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability.
IEEE Trans. Knowl. Data Eng., 2011
Distance metric learning from uncertain side information for automated photo tagging.
ACM Trans. Intell. Syst. Technol., 2011
Int. J. Comput. Commun. Control, 2011
Latent Topic Visual Language Model for Object Categorization.
Proceedings of the SIGMAP 2011, 2011
Proceedings of the Advances in Multimedia Modeling, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
An Automatic Matching Algorithm Based on SIFT Descriptors for Remote Sensing Ship Image.
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
ContextRank: Personalized Tourism Recommendation by Exploiting Context Information of Geotagged Web Photos.
Proceedings of the Sixth International Conference on Image and Graphics, 2011
A New Graph Constructor for Semi-supervised Discriminant Analysis via Group Sparsity.
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the IEEE International Conference on Computer Vision, 2011
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011
2010
IEEE Trans. Image Process., 2010
IEEE Trans. Inf. Forensics Secur., 2010
J. Convergence Inf. Technol., 2010
Proceedings of the IEEE International Conference on Systems, 2010
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010
Proceedings of the 18th International Conference on Multimedia 2010, 2010
Proceedings of the 18th International Conference on Multimedia 2010, 2010
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010
Proceedings of the Cloud Computing, Second International Conference, 2010
2009
IEEE Trans. Multim., 2009
Signal Process., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Learning Bregman Distance Functions and Its Application for Semi-Supervised Clustering.
Proceedings of the Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, 2009
Proceedings of the First ACM workshop on Large-scale multimedia retrieval and mining, 2009
Distance metric learning from uncertain side information with application to automated photo tagging.
Proceedings of the 17th International Conference on Multimedia 2009, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the Fifth International Conference on Image and Graphics, 2009
Proceedings of the Fifth International Conference on Image and Graphics, 2009
Proceedings of the 2009 International Workshop on Location Based Social Networks, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009
2008
High-performance packet classification algorithm for multithreaded IXP network processor.
ACM Trans. Embed. Comput. Syst., 2008
Proceedings of the 16th International Conference on Multimedia 2008, 2008
Proceedings of the 16th International Conference on Multimedia 2008, 2008
Proceedings of the 16th International Conference on Multimedia 2008, 2008
Proceedings of the 16th International Conference on Multimedia 2008, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the International Conference on Image Processing, 2008
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008
Proceedings of the Working Notes for CLEF 2008 Workshop co-located with the 12th European Conference on Digital Libraries (ECDL 2008) , 2008
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008
2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the 15th International Conference on Multimedia 2007, 2007
Proceedings of the 9th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the First Ph.D. Workshop in CIKM, 2007
2006
Image Annotations Based on Semi-supervised Clustering with Semantic Soft Constraints.
Proceedings of the Advances in Multimedia Information Processing, 2006
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
2005
Proceedings of the Advances in Multimedia Information Processing, 2005
Neighborhood Preserving Projections (NPP): A Novel Linear Dimension Reduction Method.
Proceedings of the Advances in Intelligent Computing, 2005
2004
Proceedings of the 13th IEEE Workshop on Local and Metropolitan Area Networks, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
2003
Pattern Recognit. Lett., 2003
Proceedings of the IEEE 14th International Symposium on Personal, 2003
Performance of channel estimation assisted linear multiuser receivers for downlink CDMA systems with long spreading codes.
Proceedings of the IEEE 14th International Symposium on Personal, 2003
On performance study of data based multiuser detection methods for uplink long-code CDMA systems.
Proceedings of the IEEE 14th International Symposium on Personal, 2003