Nenghaif Yu
#156,461
Most Influential Person Across History
Nenghaif Yu's AcademicInfluence.com Rankings
Nenghaif Yucomputer-science Degrees
Computer Science
#4819
Historical Rank
Computational Linguistics
#472
Historical Rank
Machine Learning
#953
Historical Rank
Artificial Intelligence
#1179
Historical Rank

Download Badge
Computer Science
Nenghaif Yu's Degrees
- PhD Computer Science University of California, Berkeley
- Bachelors Computer Science Peking University
Similar Degrees You Can Earn
Why Is Nenghaif Yu Influential?
(Suggest an Edit or Addition)Nenghaif Yu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Dual Learning for Machine Translation (2016) (728)
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption (2013) (686)
- Reversibility improved data hiding in encrypted images (2014) (361)
- StyleBank: An Explicit Representation for Neural Image Style Transfer (2017) (357)
- Non-negative low rank and sparse graph for semi-supervised learning (2012) (309)
- CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows (2021) (305)
- A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability (2011) (294)
- Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism (2017) (291)
- Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification (2017) (263)
- Coherent Online Video Style Transfer (2017) (235)
- Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression (2013) (218)
- Learning to tag (2009) (217)
- Asynchronous Stochastic Gradient Descent with Delay Compensation (2016) (194)
- Semantics-Preserving Bag-of-Words Models and Applications (2010) (190)
- Deliberation Networks: Sequence Generation Beyond One-Pass Decoding (2017) (183)
- Flickr distance (2008) (179)
- Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers (2012) (172)
- Complementary hashing for approximate nearest neighbor search (2011) (172)
- Passive detection of doctored JPEG image via block artifact grid extraction (2009) (165)
- Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data (2019) (155)
- Multi-attentional Deepfake Detection (2021) (147)
- Zoom-Net: Mining Deep Feature Interactions for Visual Relationship Recognition (2018) (128)
- Cross-Modality Person Re-Identification With Shared-Specific Feature Transfer (2020) (128)
- Semantics Disentangling for Text-To-Image Generation (2019) (126)
- Dual Supervised Learning (2017) (124)
- Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain (2021) (118)
- PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers (2021) (115)
- Order preserving hashing for approximate nearest neighbor search (2013) (110)
- Reversible Data Hiding in Encrypted Images by Reversible Image Transformation (2016) (107)
- Stereoscopic Neural Style Transfer (2018) (102)
- A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability (2010) (102)
- Distance metric learning from uncertain side information with application to automated photo tagging (2009) (98)
- Neighborhood Preserving Projections (NPP): A Novel Linear Dimension Reduction Method (2005) (94)
- Bipartite graph reinforcement model for web image annotation (2007) (93)
- Trajectory simplification method for location-based social networking services (2009) (92)
- Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding (2015) (92)
- DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense (2018) (90)
- Constructing a Nonnegative Low-Rank and Sparse Graph With Data-Adaptive Features (2014) (88)
- Capacity-Approaching Codes for Reversible Data Hiding (2011) (87)
- Multiple-instance ranking: Learning to rank images for image retrieval (2008) (78)
- Word Alignment Modeling with Context Dependent Deep Neural Network (2013) (77)
- Visual language modeling for image classification (2007) (77)
- Reversible data hiding in JPEG image based on DCT frequency and block selection (2018) (76)
- Anonymous authentication scheme for smart home environment with provable security (2019) (75)
- FoCUS: Learning to Crawl Web Forums (2012) (69)
- Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View (2018) (67)
- GSM: Graph Similarity Model for Multi-Object Tracking (2020) (66)
- A Low-Complexity Screen Compression Scheme for Interactive Screen Sharing (2013) (66)
- Decomposing Joint Distortion for Adaptive Steganography (2017) (65)
- Adversarial Examples Against Deep Neural Network based Steganalysis (2018) (65)
- Color Image Quality Assessment Based on CIEDE2000 (2012) (65)
- Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search (2015) (64)
- Learning Bregman Distance Functions for Semi-Supervised Clustering (2012) (64)
- Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications (2015) (64)
- Thompson Sampling for Budgeted Multi-Armed Bandits (2015) (64)
- Rotation robust detection of copy-move forgery (2010) (62)
- MichiGAN: multi-input-conditioned hair image generation for portrait editing (2020) (62)
- Budgeted Multi-Armed Bandits with Multiple Plays (2016) (60)
- Model Watermarking for Image Processing Networks (2020) (60)
- Screen-Shooting Resilient Watermarking (2019) (59)
- Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving (2017) (59)
- Distributed Hash Table (2013) (58)
- Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models (2018) (58)
- Defining embedding distortion for motion vector-based video steganography (2015) (57)
- Learning from contextual information of geo-tagged web photos to rank personalized tourism attractions (2013) (56)
- Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing (2018) (56)
- LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks (2020) (56)
- Learning Bregman Distance Functions and Its Application for Semi-Supervised Clustering (2009) (55)
- Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams (2016) (55)
- Decouple Learning for Parameterized Image Operators (2018) (54)
- A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data (2012) (53)
- Scale-Invariant Visual Language Modeling for Object Categorization (2009) (50)
- A novel video watermarking scheme in compression domain based on fast motion estimation (2003) (47)
- Reversible Data Hiding in Color Image With Grayscale Invariance (2019) (46)
- Crowd Tracking with Dynamic Evolution of Group Structures (2014) (46)
- A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images (2018) (44)
- A New Rule for Cost Reassignment in Adaptive Steganography (2017) (44)
- Model-Level Dual Learning (2018) (43)
- Trip Mining and Recommendation from Geo-tagged Photos (2012) (43)
- Flickr Distance: A Relationship Measure for Visual Concepts (2012) (42)
- Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding (2013) (42)
- AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network (2019) (41)
- A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing (2011) (41)
- Context and Attribute Grounded Dense Captioning (2019) (40)
- Deep Model Intellectual Property Protection via Deep Watermarking (2021) (40)
- A multi-task framework with feature passing module for skin lesion classification and segmentation (2018) (38)
- A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks (2019) (37)
- A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data (2020) (37)
- CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding (2017) (36)
- Self-Robust 3D Point Recognition via Gather-Vector Guidance (2020) (36)
- Defining Cost Functions for Adaptive JPEG Steganography at the Microscale (2019) (35)
- Distance metric learning from uncertain side information for automated photo tagging (2011) (34)
- Protecting patient confidential information based on ECG reversible data hiding (2016) (34)
- Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth (2017) (34)
- Reversible data hiding in medical images with enhanced contrast in texture area (2016) (34)
- Annotating personal albums via web mining (2008) (33)
- Memory-Based Neighbourhood Embedding for Visual Recognition (2019) (33)
- HairCLIP: Design Your Hair by Text and Reference Image (2021) (33)
- Efficient Semantic Image Synthesis via Class-Adaptive Normalization (2020) (33)
- Robust Superpixel-Guided Attentional Adversarial Attack (2020) (33)
- Large-Scale Online Feature Selection for Ultra-High Dimensional Sparse Data (2014) (33)
- Budgeted Bandit Problems with Continuous Random Costs (2015) (32)
- Passport-aware Normalization for Deep Model Protection (2020) (32)
- Asynchronous Stochastic Gradient Descent with Delay Compensation for Distributed Deep Learning (2016) (32)
- Robust adaptive steganography based on generalized dither modulation and expanded embedding domain (2020) (31)
- Fast Matrix Embedding by Matrix Extending (2012) (31)
- Maximum Margin Clustering with Pairwise Constraints (2008) (31)
- Image camouflage by reversible image transformation (2016) (31)
- Trust Region Evolution Strategies (2019) (31)
- Can phrase indexing help to process non-phrase queries? (2008) (30)
- Locality-preserving low-rank representation for graph construction from nonlinear manifolds (2016) (30)
- ISNet: Integrate Image-Level and Semantic-Level Context for Semantic Segmentation (2021) (30)
- Efficient and privacy-preserving authentication scheme for wireless body area networks (2020) (30)
- Dual Inference for Machine Learning (2017) (30)
- Naked people retrieval based on Adaboost learning (2002) (30)
- NFA: A New Algorithm to Select MPRs in OLSR (2008) (30)
- DASOT: A Unified Framework Integrating Data Association and Single Object Tracking for Online Multi-Object Tracking (2020) (29)
- Semantics-preserving bag-of-words models for efficient image annotation (2009) (29)
- A Simple Baseline for StyleGAN Inversion (2021) (29)
- GreedyFool: Distortion-Aware Sparse Adversarial Attack (2020) (28)
- Defining Joint Distortion for JPEG Steganography (2018) (28)
- A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem (2020) (27)
- Doctored JPEG image detection (2008) (27)
- Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks (2019) (27)
- Real-Time Online Multi-Object Tracking in Compressed Domain (2022) (27)
- Photo2Trip: an interactive trip planning system based on geo-tagged photos (2010) (26)
- Video steganography with perturbed macroblock partition (2014) (26)
- Return-Based Contrastive Representation Learning for Reinforcement Learning (2021) (25)
- DETECTING COPY-PASTE FORGERY OF JPEG IMAGE VIA BLOCK ARTIFACT GRID EXTRACTION (2008) (25)
- Comments on “Steganography Using Reversible Texture Synthesis” (2017) (25)
- A Ranking-based Approach to Word Reordering for Statistical Machine Translation (2012) (25)
- Diverse Semantic Image Synthesis via Probability Distribution Modeling (2021) (24)
- Online Multi-Object Tracking with Unsupervised Re-Identification Learning and Occlusion Estimation (2022) (24)
- TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud (2020) (24)
- Adaptive color quantization based on perceptive edge protection (2003) (24)
- Distributed Hash Table: Theory, Platforms and Applications (2013) (24)
- Image Annotation in a Progressive Way (2007) (23)
- G-SGD: Optimizing ReLU Neural Networks in its Positively Scale-Invariant Space (2018) (23)
- Temporal ROI Align for Video Object Recognition (2021) (22)
- A General Decoupled Learning Framework for Parameterized Image Operators (2019) (22)
- Bootstrapped Masked Autoencoders for Vision BERT Pretraining (2022) (22)
- Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes (2020) (22)
- Distortion Design for Secure Adaptive 3-D Mesh Steganography (2019) (22)
- A comprehensive human computation framework: with application to image labeling (2008) (22)
- Using multi-label classification to improve object detection (2019) (21)
- Deep Template-Based Watermarking (2021) (21)
- MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining (2022) (21)
- ContextRank: Personalized Tourism Recommendation by Exploiting Context Information of Geotagged Web Photos (2011) (21)
- Consistent matching based on boosted salience channels for group re-identification (2016) (21)
- Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data (2012) (21)
- Content-adaptive reversible visible watermarking in encrypted images (2019) (21)
- Anonymous deduplication of encrypted data with proof of ownership in cloud storage (2013) (21)
- Density-Aware Graph for Deep Semi-Supervised Visual Recognition (2020) (21)
- Optimized Distances for Binary Code Ranking (2014) (20)
- Joint Color-irrelevant Consistency Learning and Identity-aware Modality Adaptation for Visible-infrared Cross Modality Person Re-identification (2021) (20)
- A new nonlinear feature extraction method for face recognition (2006) (20)
- Reversible Data Hiding Under Inconsistent Distortion Metrics (2018) (20)
- Large scale image retrieval with visual groups (2013) (20)
- Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication (2020) (20)
- A Security Enhanced Remote Password Authentication Scheme Using Smart Card (2010) (20)
- Reduce Information Loss in Transformers for Pluralistic Image Inpainting (2022) (19)
- Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences (2020) (19)
- Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion (2017) (19)
- A robust chaos-based image encryption scheme (2009) (18)
- Face Recognition Using Neighborhood Preserving Projections (2005) (18)
- A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications (2021) (17)
- BioSnowball: automated population of Wikis (2010) (17)
- Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once (2019) (17)
- SOL: A Library for Scalable Online Learning Algorithms (2016) (17)
- Research on Cloud Computing Based on Deep Analysis to Typical Platforms (2009) (17)
- Secure Nonlocal Denoising in Outsourced Images (2016) (17)
- Breaking row-column shuffle based image cipher (2012) (17)
- Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification (2018) (16)
- Poison Ink: Robust and Invisible Backdoor Attack (2021) (16)
- Capacity Control of ReLU Neural Networks by Basis-path Norm (2018) (16)
- iLike: integrating visual and textual features for vertical search (2010) (16)
- Dynamic Background Subtraction Using Spatial-Color Binary Patterns (2011) (16)
- Image Forensics with Rotation-Tolerant Resampling Detection (2012) (16)
- Low-Latency Authentication Against Satellite Compromising for Space Information Network (2018) (15)
- MoVieUp: Automatic Mobile Video Mashup (2015) (15)
- A Search-Based Web Image Annotation Method (2007) (15)
- Image Search Result Clustering and Re-Ranking via Partial Grouping (2007) (15)
- A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents (2020) (15)
- Potential risk of IoT device supporting IR remote control (2019) (15)
- Semi-supervised Classification via Low Rank Graph (2011) (14)
- Finite budget analysis of multi-armed bandit problems (2017) (14)
- A Survey on Distributed Hash Table (DHT): Theory, Platforms, and Applications (2013) (14)
- Self-Supervised Adversarial Training (2019) (14)
- Protecting Celebrities from DeepFake with Identity Consistency Transformer (2022) (14)
- A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization (2018) (14)
- Improve Unsupervised Pretraining for Few-label Transfer (2021) (14)
- E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion (2021) (14)
- An Iterative Algorithm for Robust Kernel Principal Component Analysis (2007) (14)
- Multi-graph similarity reinforcement for image annotation refinement (2008) (14)
- Exfiltration of Data from Air-gapped Networks via Unmodulated LED Status Indicators (2017) (13)
- Reversible visual transformation via exploring the correlations within color images (2018) (13)
- Bitcoin Blockchain Compression Algorithm for Blank Node Synchronization (2019) (13)
- Generalization and Analysis of the Paper Folding Method for Steganography (2010) (13)
- Initiative Defense against Facial Manipulation (2021) (13)
- Regularized Semi-Supervised Latent Dirichlet Allocation for visual concept learning (2011) (13)
- Controllable Image Processing via Adaptive FilterBank Pyramid (2020) (12)
- InPPTD: A Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowdsensing Systems (2021) (12)
- Adversarial batch image steganography against CNN-based pooled steganalysis (2021) (12)
- High-performance packet classification algorithm for multithreaded IXP network processor (2008) (12)
- Shape-invariant 3D Adversarial Point Clouds (2022) (12)
- Monet: A System for Reliving Your Memories by Theme-Based Photo Storytelling (2016) (12)
- Identity-Driven DeepFake Detection (2020) (11)
- An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization (2020) (11)
- Anomaly detection via 3D-HOF and fast double sparse representation (2016) (11)
- Improved Image Matting via Real-time User Clicks and Uncertainty Estimation (2020) (11)
- Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance (2021) (11)
- Accelerometer-based single-handed video browsing on mobile devices: design and user studies (2012) (11)
- Fast Salient Object Detection Based on Segments (2009) (11)
- Michigan (1897) (11)
- Semi-order preserving encryption (2017) (11)
- Building a large-scale and wide-area quantum Internet based on an OSI-alike model (2021) (11)
- Soft-Constraint Based Online LDA for Community Recommendation (2010) (11)
- Mobile cloud computing based privacy protection in location-based information survey applications (2015) (11)
- Query oriented subspace shifting for near-duplicate image detection (2008) (11)
- TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability (2021) (11)
- Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage (2022) (10)
- Efficient Human Action Recognition Interface for Augmented and Virtual Reality Applications Based on Binary Descriptor (2018) (10)
- Real-time attacks on robust watermarking tools in the wild by CNN (2020) (10)
- Adaptive Video Error Concealment Using Reversible Data Hiding (2012) (10)
- Explicit Filterbank Learning for Neural Image Style Transfer and Image Processing (2020) (10)
- Recursive code construction for reversible data hiding in DCT domain (2014) (10)
- Emerging applications of reversible data hiding (2018) (10)
- Non-local Denoising in Encrypted Images (2014) (10)
- Sequence Generation with Target Attention (2017) (9)
- Defining cost functions for adaptive steganography at the microscale (2016) (9)
- Part-based multi-graph ranking for visual tracking (2016) (9)
- Performance analysis of multi-path routing in wireless ad hoc networks (2005) (9)
- On Detection of Advertising Images (2007) (9)
- Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio (2020) (9)
- JPEG Steganography With Estimated Side-Information (2020) (9)
- Reversible Adversarial Examples (2018) (9)
- Fusion of SVD and LDA for face recognition (2004) (9)
- IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals (2018) (9)
- Real Time Video Object Segmentation in Compressed Domain (2021) (9)
- Incentivizing High-Quality Content from Heterogeneous Users: On the Existence of Nash Equilibrium (2014) (9)
- Object-Oriented Anomaly Detection in Surveillance Videos (2018) (9)
- Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry (2020) (9)
- Tracking Assisted Faster Video Object Detection (2019) (9)
- Motion vector modification distortion analysis-based payload allocation for video steganography (2021) (9)
- JPEG Robust Invertible Grayscale (2021) (9)
- Real-time Anomaly Detection with HMOF Feature (2018) (8)
- UnseenCode: Invisible On-screen Barcode with Image-based Extraction (2019) (8)
- Provably Secure Generative Steganography Based on Autoregressive Model (2018) (8)
- SAFNet: A Semi-Anchor-Free Network With Enhanced Feature Pyramid for Object Detection (2020) (8)
- Reversible Data Hiding for DNA Sequences and Its Applications (2014) (8)
- Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs (2020) (8)
- Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks (2020) (8)
- nReader: reading news quickly, deeply and vividly (2006) (8)
- Towards Anti-Interference Human Activity Recognition Based on WiFi Subcarrier Correlation Selection (2020) (8)
- Edge Saliency Map Detection with Texture Suppression (2011) (8)
- Rethinking Spatially-Adaptive Normalization (2020) (8)
- Camera Model Identification for JPEG Images via Tensor Analysis (2010) (8)
- Salable Image Search with Reliable Binary Code (2014) (8)
- UIA-ViT: Unsupervised Inconsistency-Aware Method based on Vision Transformer for Face Forgery Detection (2022) (8)
- Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud (2022) (8)
- BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography (2021) (8)
- Mutually beneficial learning with application to on-line news classification (2007) (8)
- Efficient near-duplicate image detection by learning from examples (2008) (7)
- Improving visual quality of reversible data hiding by twice sorting (2016) (7)
- Reversible image processing via reversible data hiding (2016) (7)
- Multiple level parallel decision fusion model with distributed sensors based on Dempster-Shafer evidence theory (2003) (7)
- Towards Anti-interference WiFi-based Activity Recognition System Using Interference-Independent Phase Component (2020) (7)
- AMIGO: accurate mobile image geotagging (2012) (7)
- Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection (2022) (7)
- Multi-Type Web Relation Extraction Based on Bootstrapping (2010) (7)
- Image Classification via Semi-supervised pLSA (2009) (7)
- Feature-Preserving Tensor Voting Model for Mesh Steganalysis (2021) (7)
- Adaptive ±1 Steganography in Extended Noisy Region (2014) (6)
- A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics (2013) (6)
- A Connection-Oriented Entanglement Distribution Design in Quantum Networks (2022) (6)
- Optical Exfiltration of Data via Keyboard LED Status Indicators to IP Cameras (2019) (6)
- A Novel Parallel Traffic Control Mechanism for Cloud Computing (2010) (6)
- Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection (2018) (6)
- Best Action Selection in a Stochastic Environment (2016) (6)
- PPEDNet: Pyramid Pooling Encoder-Decoder Network for Real-Time Semantic Segmentation (2017) (6)
- Reversible watermarking in JPEG images based on modified RZL codes and histogram shift (2013) (6)
- Privacy Preserving on Updated Parameters in Federated Learning (2020) (6)
- Demonstration actor critic (2019) (6)
- Low-Resolution Face Recognition via Sparse Representation of Patches (2009) (6)
- Controversial 'pixel' prior rule for JPEG adaptive steganography (2019) (6)
- Crowd Tracking by Group Structure Evolution (2018) (6)
- Shortening the Cover for Fast JPEG Steganography (2020) (6)
- Anomaly Detection and Localization: A Novel Two-Phase Framework Based on Trajectory-Level Characteristics (2018) (6)
- Fidelity-Guaranteed Entanglement Routing in Quantum Networks (2021) (6)
- A practical quantum designated verifier signature scheme for E-voting applications (2021) (6)
- Robust visual tracking with deep feature fusion (2017) (6)
- Learning Pixel-Level and Instance-Level Context-Aware Features for Pedestrian Detection in Crowds (2019) (6)
- Intelligent processing techniques for semantic-based image and video retrieval (2013) (5)
- Text Semantic Steganalysis Based on Word Embedding (2018) (5)
- Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding (2014) (5)
- High precision rotation angle estimation for rotated images (2013) (5)
- Three-Dimensional Mesh Steganography and Steganalysis: A Review (2021) (5)
- Towards optimal noise distribution for privacy preserving in data aggregation (2014) (5)
- Improving robust adaptive steganography via minimizing channel errors (2022) (5)
- Enhanced Attacks on Defensively Distilled Deep Neural Networks (2017) (5)
- People Summarization by Combining Named Entity Recognition and Relation Extraction (2010) (5)
- MOS-Based Channel Allocation Schemes for Mixed Services over Cognitive Radio Networks (2013) (5)
- JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds (2019) (5)
- Reversible Data Hiding in JPEG Images Under Multi-Distortion Metric (2020) (5)
- Harbor detection in remote sensing images based on feature fusion (2012) (5)
- Tamper restoration on DNA sequences based on reversible data hiding (2013) (5)
- A research of UWB rake receiver based on novel RLS adaptive algorithm (2006) (5)
- Dual linkage refinement for YouTube video topic discovery (2010) (5)
- Semantic Image Synthesis via Efficient Class-Adaptive Normalization (2020) (5)
- Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data (2012) (5)
- Tracking Based on SURF and Superpixel (2011) (5)
- Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal (2018) (5)
- Adversarial steganography based on sparse cover enhancement (2021) (4)
- Feature Annotation for Visual Concept Detection in ImageCLEF 2008 (2008) (4)
- Evolving distortion function by exploiting the differences among comparable adaptive steganography (2016) (4)
- Targeted attack and security enhancement on texture synthesis based steganography (2018) (4)
- Distribution-Preserving Steganography Based on Text-to-Speech Generative Models (2022) (4)
- When Provably Secure Steganography Meets Generative Models (2018) (4)
- An Efficient Multi-keyword Ranked Retrieval Scheme with Johnson-Lindenstrauss Transform over Encrypted Cloud Data (2013) (4)
- Direct Adversarial Attack on Stego Sandwiched Between Black Boxes (2019) (4)
- Adaptive Error Resilient Coding Based on FMO in Wireless Video Transmission (2011) (4)
- Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks (2020) (4)
- A robust part-based tracker (2010) (4)
- Fast tamper location of batch DNA sequences based on reversible data hiding (2014) (4)
- Performance Analysis of DCF under two access mechanisms in IEEE802.11a WLAN (2005) (4)
- TCCF: Tracking Based on Convolutional Neural Network and Correlation Filters (2017) (4)
- Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem (2019) (4)
- Multi-level visual tracking with hierarchical tree structural constraint (2016) (4)
- An Improvement Scheme Applied to TCP Protocol in Mobile Ad Hoc Networks (2005) (4)
- Detecting Adversarial Examples Based on Steganalysis (2018) (4)
- Towards Generalizable and Robust Face Manipulation Detection via Bag-of-feature (2021) (4)
- An enhancement scheme of TCP protocol in mobile Ad hoc networks: MME-TCP (2007) (4)
- Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion (2019) (4)
- Rights Sharing Scheme for Online DRM System Using Digital Ticket (2009) (4)
- Unsupervised Finetuning (2021) (4)
- Toward Wireless Security without Computational Assumptions—Oblivious Transfer Based on Wireless Channel Characteristics (2014) (4)
- Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection (2022) (4)
- CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet (2022) (4)
- RandTest: Towards more secure and reliable dataflow processing in cloud computing (2011) (4)
- Adversarial Examples Detection Beyond Image Space (2021) (4)
- Fast Encoding Algorithms for Reed–Solomon Codes With Between Four and Seven Parity Symbols (2020) (4)
- Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice (2011) (3)
- A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks (2020) (3)
- A novel watermark embedding algorithm (2002) (3)
- Robust Anomaly Detection via Fusion of Appearance and Motion Features (2018) (3)
- CAAD 2018: Iterative Ensemble Adversarial Attack (2018) (3)
- Semantic Probability Distribution Modeling for Diverse Semantic Image Synthesis (2022) (3)
- The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications (2014) (3)
- A no-reference quality assessment for contrast-distorted image based on improved learning method (2018) (3)
- Tracing Text Provenance via Context-Aware Lexical Substitution (2021) (3)
- Towards Generalizable and Robust Face Manipulation Detection via Bag-of-local-feature (2021) (3)
- Designing Fault Tolerant Networks Topologies Based on Greedy Algorithm (2008) (3)
- A Large Scale Urban Surveillance Video Dataset for Multiple-Object Tracking and Behavior Analysis (2019) (3)
- Adversarial defense via self-orthogonal randomization super-network (2021) (3)
- Exploring the Limits of Differentially Private Deep Learning with Group-wise Clipping (2022) (3)
- Regularized Local Discrimimant Embedding (2006) (3)
- Fsft-Net: Face Transfer Video Generation With Few-Shot Views (2021) (3)
- Exploring Structure Consistency for Deep Model Watermarking (2021) (3)
- Identifying camera and processing from cropped JPEG photos via tensor analysis (2010) (3)
- Spatial-Temporal Feature Aggregation Network For Video Object Detection (2020) (3)
- Query-Free Embedding Attack Against Deep Learning (2019) (3)
- Flow Guided Siamese Network for Visual Tracking (2018) (3)
- A High-Capacity Reversible Data Hiding Method in Encrypted Images Based on Block Shifting (2017) (3)
- Scale Voting With Pyramidal Feature Fusion Network for Person Search (2019) (3)
- Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations (2019) (3)
- Object and patch based anomaly detection and localization in crowded scenes (2019) (3)
- Unsupervised Object Learning with AM-pLSA (2009) (3)
- Connection-Oriented and Connectionless Remote Entanglement Distribution Strategies in Quantum Networks (2022) (3)
- An improved QKD protocol without public announcement basis using periodically derived basis (2021) (3)
- Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement (2015) (3)
- Which gray level should be given the smallest cost for adaptive steganography? (2018) (3)
- Asynchronous Parallel Finite Automaton: A New Mechanism for Deep Packet Inspection in Cloud Computing (2010) (3)
- Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks (2020) (3)
- A low-complexity screen compression scheme (2012) (3)
- Real Time Compressed Video Object Segmentation (2019) (3)
- Video steganography with multi-path motion estimation (2013) (3)
- Privacy-preserving computation for location-based information survey via mobile cloud computing (2013) (3)
- Irregular MDS Array Codes With Fewer Parity Symbols (2019) (3)
- Deepfake Video Detection Using 3D-Attentional Inception Convolutional Neural Network (2021) (2)
- Binary "proximity patches motion" descriptor for action recognition in videos (2018) (2)
- Efficient Tag Mining via Mixture Modeling for Real-Time Search-Based Image Annotation (2012) (2)
- Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup (2021) (2)
- Cascaded Residual Density Network for Crowd Counting (2019) (2)
- Multi-progressive model for web image annotation (2008) (2)
- ADT: Anti-Deepfake Transformer (2022) (2)
- Latent topic visual language model for object categorization (2011) (2)
- F2Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection (2023) (2)
- Minimum Structural Similarity Distortion for Reversible Data Hiding (2018) (2)
- Towards Intrinsic Common Discriminative Features Learning for Face Forgery Detection Using Adversarial Learning (2022) (2)
- Online travel destination recommendation with efficient variable memory Markov model (2013) (2)
- Deep Scale Feature for Visual Tracking (2017) (2)
- Fast Video Stitching for Aerially Captured HD Videos (2018) (2)
- Second Order Perdicting-Error Sorting for Reversible Data Hiding (2016) (2)
- Data Exfiltration via Multipurpose RFID Cards and Countermeasures (2019) (2)
- Graph Construction with Label Information for Semi-Supervised Learning (2016) (2)
- Improving the Embedding Strategy for Batch Adaptive Steganography (2018) (2)
- Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis (2021) (2)
- A novel fuzzy keyword retrieval scheme over encrypted cloud data (2013) (2)
- Optimal structural similarity constraint for reversible data hiding (2017) (2)
- Imperceptible black-box waveform-level adversarial attack towards automatic speaker recognition (2022) (2)
- Accurate 3D Facial Synthesis for Plastic Surgery Simulation (2007) (2)
- Image Annotations Based on Semi-supervised Clustering with Semantic Soft Constraints (2006) (2)
- Multi-target Tracking via Max-Entropy Target Selection and Heterogeneous Camera Fusion (2015) (2)
- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing (2009) (2)
- SVD based linear filtering in DCT domain (2010) (2)
- Learning object from small and imbalanced dataset with Boost-BFKO (2008) (2)
- Improve Neural Network Using Saliency (2015) (2)
- A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret (2019) (2)
- Optimizing Non-Local Pixel Predictors for Reversible Data Hiding (2014) (2)
- Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix (2022) (2)
- Robust Audio Watermarking Algorithm Based on Air Channel Characteristics (2018) (2)
- Content-Independent Online Handwriting Verification Based on Multi-Modal Fusion (2021) (2)
- Incentivizing High-quality Content from Heterogeneous Users (2016) (1)
- Quadtree-based optimal path routing with the smallest routing table size (2014) (1)
- Defining Embedding Distortion for Sample Adaptive Offset-Based HEVC Video Steganography (2020) (1)
- Person re-identification by the marriage of KISS metric learning and post-rank optimization: KISSPOP (2015) (1)
- Image retrieval with EMD for new perceptual color feature (2003) (1)
- Protecting Celebrities with Identity Consistency Transformer (2022) (1)
- Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition (2021) (1)
- Deterministic Schemes of Copyset Replication (2020) (1)
- Economic Costs of Multi-sever Private Information Retrieval in Cloud Computing (2015) (1)
- Online shared dictionary learning for visual tracking (2015) (1)
- Reset Attack: An Attack Against Homomorphic Encryption-Based Privacy-Preserving Deep Learning System (2020) (1)
- A New Graph Constructor for Semi-supervised Discriminant Analysis via Group Sparsity (2011) (1)
- WiLay: A Two-Layer Human Localization and Activity Recognition System Using WiFi (2021) (1)
- On cross-language image annotations (2009) (1)
- Covert Communication by Exploring Statistical and Linguistical Distortion in Text (2018) (1)
- Moving object detection of dynamic scenes using spatio-temporal context and background modeling (2014) (1)
- A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code (2020) (1)
- Decorrelation of multispectral images for lossless compression (2001) (1)
- Cloth-Aware Center Cluster Loss for Cloth-Changing Person Re-identification (2022) (1)
- A Design Method of Saturation Test Image Based on CIEDE2000 (2012) (1)
- Neural network with saliency based feature selection ability (2017) (1)
- Lip Forgery Video Detection via Multi-phoneme Selection (2021) (1)
- Tagrank - Measuring tag importance for image annotation (2008) (1)
- Visual Tracking by Deep Discriminative Map (2017) (1)
- Boosting bootstrap FLD subspaces for multiclass problem (2007) (1)
- Talking Face Video Generation with Editable Expression (2021) (1)
- Reversible Data Hiding in Encrypted 3 D Mesh Models (2017) (1)
- Toward Optimal Additive Noise Distribution for Privacy Protection in Mobile Statistics Aggregation (2013) (1)
- An Automatic Matching Algorithm Based on SIFT Descriptors for Remote Sensing Ship Image (2011) (1)
- Traffic engineering with constraint-based routing in DiffServ/MPLS network (2004) (1)
- Self-supervised Transformer for Deepfake Detection (2022) (1)
- AEBP: A New Adaptive Efficient Broadcast Protocol for Delay Tolerant Network (2010) (1)
- Moving Object Detection for Moving Cameras on Superpixel Level (2013) (1)
- Image annotation using semantic clusters from Flickr (2008) (1)
- Copy Detection Pattern-Based Authentication for Printed Documents with Multi-Dimensional Features (2019) (1)
- CkNN monitoring based on parallel pre-computing (2010) (1)
- Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission (2015) (1)
- Supervised clustering-algorithm-based visual information features classification (2002) (1)
- Are Fewer Labels Possible for Few-shot Learning? (2020) (1)
- Ensemble Steganography (2018) (1)
- Face Swapping Consistency Transfer with Neural Identity Carrier (2021) (1)
- Cooperative Target Tracking in Dual-Camera System with Bidirectional Information Fusion (2015) (1)
- Efficient Open-Set Adversarial Attacks on Deep Face Recognition (2021) (1)
- Future Event Prediction Based on Temporal Knowledge Graph Embedding (2022) (1)
- BSPM: A new mechanism for “overlap-matching expressions” in DPI (2010) (1)
- Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code (2022) (1)
- Provably Secure Steganography on Generative Media (2018) (1)
- Unified entropy-based sorting for reversible data hiding (2017) (1)
- Reversible Image Data Hiding with Local Adaptive Contrast Enhancement (2016) (1)
- CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network (2018) (1)
- Receive Buffer Pre-division Based Flow Control for MPTCP (2017) (1)
- Video Steganography Based on Modification Probability Transformation and Non-additive Embedding Distortion (2020) (1)
- MULTIPLE LEVEL PARALLEL DECISION FUSION MODEL WITH THEORY DISTRIBUTED SENSORS BASED ON DEMPSTER-SHAFER EVIDENCE (2003) (1)
- Ada-Sal Network: emulate the Human Visual System (2016) (1)
- X-Paste: Revisit Copy-Paste at Scale with CLIP and StableDiffusion (2022) (1)
- New fast block-matching algorithm based on block sum pyramid (2002) (1)
- Schedule web forum crawling with a freshness-first strategy (2011) (1)
- Budgeted Multi-armed Bandits with Multiple Plays ( Full Version ) ∗ (2016) (0)
- A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack (2021) (0)
- Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification (2017) (0)
- Performance of channel estimation assisted linear multiuser receivers for downlink CDMA systems with long spreading codes (2003) (0)
- A Generic Approach to Real-time Part-based Visual Tracking (2012) (0)
- CDAE: Color decomposition-based adversarial examples for screen devices (2021) (0)
- Evopose: A Recursive Transformer for 3D Human Pose Estimation with Kinematic Structure Priors (2023) (0)
- New Locally Correctable Codes Based on Projective Reed–Muller Codes (2019) (0)
- TAEE:ANEWTransmit-rate AwareEnergy Efficient Routing Algorithm For (2006) (0)
- IMAGE ANNOTATIONINA PROGRESSIVEWAY (2007) (0)
- A distributed threshold signature algorithm on canon of probability (2004) (0)
- SocialRank: A ranking model for web image retrieval in web 2.0 (2008) (0)
- PPML: Metric Learning with Prior Probability for Video Object Segmentation (2019) (0)
- Anomaly Detection with Passive Aggressive Online Gaussian Model Estimation (2017) (0)
- Image camouflage by reversible image transformation q , qq (2016) (0)
- Protecting patient confidential information based on ECG reversible data hiding (2015) (0)
- Range Queries on Two Column Data (2017) (0)
- Research on Online Leakage Assessment (2020) (0)
- HTCN: Harmonious Text Colorization Network for Visual-Textual Presentation Design (2021) (0)
- Robustness enhancement against adversarial steganography via steganalyzer outputs (2022) (0)
- Detecting conflict of heterogeneous access control policies (2022) (0)
- Improving UNIWARD distortion function via isotropic construction and hierarchical merging (2021) (0)
- Multi-view Geometry Distillation for Cloth-Changing Person ReID (2022) (0)
- Certified defense against patch attacks via mask-guided randomized smoothing (2022) (0)
- Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images (2022) (0)
- Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification (2022) (0)
- Language universal font watermarking with multiple cross-media robustness (2022) (0)
- Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images (0)
- Dual-Uncertainty Guided Curriculum Learning and Part-Aware Feature Refinement for Domain Adaptive Person Re-Identification (2023) (0)
- A Traffic Engineering scheme for DiffServ over MPLS (2003) (0)
- TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System (2021) (0)
- Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo) (2019) (0)
- 2 Probability-p Order-Preserving Encryption (2018) (0)
- Abnormal Behavior Detection Based on Target Analysis (2021) (0)
- Semantic Steganalysis Based on Word Embedding (2018) (0)
- Blacktooth (2022) (0)
- Volume Graph Model for 3D Facial Surface Extraction (2007) (0)
- Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection (2018) (0)
- Noise Simulation-Based Deep Optical Watermarking (2022) (0)
- Multiclass object learning with JointBoosting-GA (2008) (0)
- Photo 2 Trip : An Interactive Trip Planning System Based on GeoTagged Photos * (2010) (0)
- ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage (2022) (0)
- Recursive code construction for reversible data hiding in DCT domain (2013) (0)
- On-site Travel Path Recommendation Based on Fast Matching (2012) (0)
- mammothwill be a jiang shi yixiang juda gongcheng job ( a ) (2013) (0)
- High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance (2013) (0)
- Probability-p Order-Preserving Encryption (2017) (0)
- Key-Region Representation Learning for Anomaly Detection (2017) (0)
- On the second-order statistics of the sample covariance (2003) (0)
- High-fidelity video reversible data hiding using joint spatial and temporal prediction (2023) (0)
- Optimal structural similarity constraint for reversible data hiding (2016) (0)
- Motion Words Model for Parody Retrieval (2011) (0)
- An Asynchronous Entanglement Distribution Protocol for Quantum Networks (2022) (0)
- Compressing the Tree of Canonical Huffman Coding (2022) (0)
- Coherent adversarial deepfake video generation (2022) (0)
- Anomaly residual prediction with spatial–temporal and perceptual constraints (2019) (0)
- A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization (2018) (0)
- An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression (2022) (0)
- Which gray level should be given the smallest cost for adaptive steganography? (2017) (0)
- Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs (2015) (0)
- Steganalysis of neural networks based on parameter statistical bias (2022) (0)
- Secure Image Denoising over Two Clouds (2017) (0)
- Font Watermarking Network for Text Images (2022) (0)
- Defining embedding distortion for motion vector-based video steganography (2014) (0)
- Extracting Sift Keypoints in DCT Domain (2017) (0)
- Feature Fusion Based Adversarial Example Detection against Second-Round Adversarial Attacks (2022) (0)
- A Segment-based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks (2023) (0)
- On performance study of data based multiuser detection methods for uplink long-code CDMA systems (2003) (0)
- Privacy-preserving Cost-sensitive Federated Learning from Imbalanced Data (2022) (0)
- An improved density-sensitive semi-supervised clustering algorithm (2008) (0)
- Pyramid Sub-Region Sensitive Network for Object Detection (2018) (0)
- Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble Method (2021) (0)
- Convolutional Neural Network-driven Optimal Prediction for Image Reversible Data Hiding (2021) (0)
- Dual-Feature Enhancement for Weakly Supervised Temporal Action Localization (2023) (0)
- Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography (2022) (0)
- A Class of In-Place Linear Transformations Possessing the Cache-Oblivious Property (2019) (0)
- Improving Dither Modulation based Robust Steganography by Overflow Suppression (2021) (0)
- Privacy-preserving Collaborative Learning with Scalable Image Transformation and Autoencoder (2022) (0)
- Blacktooth: Breaking through the Defense of Bluetooth in Silence (2022) (0)
- Unified entropy-based sorting for reversible data hiding (2016) (0)
- Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion (2022) (0)
- SimQN: a Network-layer Simulator for the Quantum Network Investigation (2023) (0)
- Undetectable JPEG Image Batch Reversible Data Hiding with Content-adaptive Payload Allocation (2021) (0)
- Comments and Corrections Comments on “ Steganography Using Reversible Texture Synthesis ” (2017) (0)
- Adaptive Err W (2011) (0)
- Enhanced Video Segmentation with Object Tracking (2019) (0)
- 云与用户之间交互式抗屏摄密文水印协议 (2021) (0)
- DeAR: A Deep-learning-based Audio Re-recording Resilient Watermarking (2022) (0)
- Object and patch based anomaly detection and localization in crowded scenes (2019) (0)
- Deep 3D mesh watermarking with self-adaptive robustness (2021) (0)
- A Heuristic Remote Entanglement Distribution Algorithm on Memory-Limited Quantum Paths (2022) (0)
- Capturing the Lighting Inconsistency for Deepfake Detection (2022) (0)
- PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition (2022) (0)
- Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability (2016) (0)
- Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control (2022) (0)
- BAUENet: Boundary-Aware Uncertainty Enhanced Network for Infrared Small Target Detection (2023) (0)
- A Robust Occlusion Judgment Scheme for Target Tracking Under the Framework of Particle Filter (2015) (0)
- Decouple learning framework ... 7 residual blocks ���⃗���γ WW 1 WWnnWWnn − 1 WWnn − 2 WW 2 WW 3 WW 4 WWnn − 3 (2019) (0)
- A no-reference quality assessment for contrast-distorted image based on improved learning method (2018) (0)
- Redundant and Relay Assistant Scheduling of Small Satellites (2014) (0)
- A cluster-based networking approach for large-scale and wide-area quantum key agreement (2022) (0)
- Moving Object Segmentation by Length-Unconstrained Trajectory Analysis (2015) (0)
- Shape-invariant 3D Adversarial Point Clouds Supplementary Materials (2022) (0)
- GreedyFool: Distortion-Aware Sparse Adversarial Attack supplementary material (2020) (0)
- Nearly Reversible Image-to-Image Translation Using Joint Inter-Frame Coding and Embedding (2021) (0)
- Threshold Meaningful Secret Image Sharing Scheme Based on QR Code (2022) (0)
- Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification (2019) (0)
- Variants of Golomb Coding and the n-ary Versions (2020) (0)
- Towards More Powerful Multi-column Convolutional Network for Crowd Counting (2021) (0)
- Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection (2022) (0)
- Disentangling for Text-to-Image Generation (2019) (0)
- A Novel Dynamic Sub-Region Running Algorithm for Image Retrieval (2002) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Nenghaif Yu?
Nenghaif Yu is affiliated with the following schools: