Wei Sun
Affiliations:- Sun Yat-sen University, School of Electronics and Information Technology, Key Laboratory of Information Technology (Ministry of Education), Guangzhou, China
- Sun Yat-Sen University, School of Software, Guangdong Key Laboratory of Information Security Technology, Guangzhou, China
According to our database1,
Wei Sun
authored at least 60 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Flare: An FPGA-Based Full Precision Low Power CNN Accelerator with Reconfigurable Structure.
Sensors, April, 2024
2023
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics.
Comput. Secur., 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022
2021
A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics.
Multim. Syst., 2021
Joint regression and learning from pairwise rankings for personalized image aesthetic assessment.
Comput. Vis. Media, 2021
Comput. Secur., 2021
Cross-Architecture Intemet-of-Things Malware Detection Based on Graph Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2021
2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020
2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
J. Vis. Commun. Image Represent., 2019
Proceedings of the 2019 IEEE International Conference on Internet of Things and Intelligence System, 2019
2018
Multim. Tools Appl., 2018
2017
Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching.
Multim. Tools Appl., 2017
2016
Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Signal Process. Image Commun., 2016
Meaningful (2, <i>i n f i n i t y</i>) secret image sharing scheme based on flipping operations.
Multim. Tools Appl., 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Signal Process., 2015
High payload image steganography with minimum distortion based on absolute moment block truncation coding.
Multim. Tools Appl., 2015
Novel steganographic method based on generalized K-distance N-dimensional pixel matching.
Multim. Tools Appl., 2015
User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion.
J. Vis. Commun. Image Represent., 2015
J. Vis. Commun. Image Represent., 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Signal Process., 2014
J. Vis. Commun. Image Represent., 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Signal Process., 2013
J. Vis. Commun. Image Represent., 2013
Improving the visual quality of random grid-based visual secret sharing via error diffusion.
J. Vis. Commun. Image Represent., 2013
Region duplication detection based on Harris corner points and step sector statistics.
J. Vis. Commun. Image Represent., 2013
Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform.
J. Syst. Softw., 2013
Appl. Soft Comput., 2013
Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
2012
Pattern Recognit., 2012
Multim. Tools Appl., 2012
Random grid-based visual secret sharing for general access structures with cheat-preventing ability.
J. Syst. Softw., 2012
A user-friendly secret image sharing scheme with reversible steganography based on cellular automata.
J. Syst. Softw., 2012
IET Inf. Secur., 2012
2011
Pattern Recognit. Lett., 2011
Revealing digital fakery using multiresolution decomposition and higher order statistics.
Eng. Appl. Artif. Intell., 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
2010
Proceedings of the Sixth International Conference on Natural Computation, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Comput. Electr. Eng., 2009
Enriched Gabor Feature Based PCA for Face Recognition with One Training Image per Person.
Proceedings of the Fifth International Conference on Natural Computation, 2009
2008
Proceedings of the Advances in Neural Networks, 2008
2006
Proceedings of the Advances in Computer Graphics, 2006
2005
Watermarking of two-dimensional engineering graph based on the orthogonal complete U-system.
Proceedings of the 9th International Conference on Computer-Aided Design and Computer Graphics, 2005