![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Transcriptomic Analysis of Flower Development in the Bamboo Phyllostachys violascens (Poaceae: Bambusoideae)
Bamboo flowering is a complicate phenomenon for its long period and unpredictability. In this study, three successive stages of flowering buds from flowering bamboo (Lei bamboo, Phyllostachys violascens) plants a...
-
Chapter and Conference Paper
A Novel Digital Rights Management in P2P Networks Based on Bitcoin System
In recent years, digital rights management (DRM) in Peer to Peer (P2P) network becomes more and more important. We propose a novel DRM scheme based on P2P to protect valuable digital content. The digital conte...
-
Article
Sparse recovery based reversible data hiding method using the human visual system
In this paper, a novel sparse recovery based reversible data hiding (RDH) method using the human visual system (HVS) is presented. To improve the low accuracy of existing predictors, a sparse recovery based pr...
-
Chapter and Conference Paper
A Robust Multi-terminal Support Method Based on Tele-Immersion Multimedia Technology
In this paper, a multi terminal support method based on tele-immersion multimedia technology is proposed. This method provides two functions of synchronous request and asynchronous request, and it can dynamic...
-
Chapter and Conference Paper
A Novel Distributed Knowledge Reasoning Model
This paper proposes a novel model and device based on distributed knowledge reasoning, for predicting the environmental risk degree for an abnormal event (e.g., fire) in the Internet of Things (IoT) environmen...
-
Chapter and Conference Paper
Real-Time Micro-expression Detection in Unlabeled Long Videos Using Optical Flow and LSTM Neural Network
Micro-expressions are momentary involuntary facial expressions which may expose a person’s true emotions. Previous work in micro-expression detection mainly focus on finding the peak frame from a video sequenc...
-
Chapter and Conference Paper
A Novel Fair and Verifiable Data Trading Scheme
With the widespread use of smart devices, a huge volume of data is generated every day, which is helpful for device user and device enterprises. However, the data generated by the smart device contains the us...
-
Article
A novel robust color image watermarking method using RGB correlations
In order to protect the copyright of the color image, a novel robust color image watermarking method using correlations of RGB channels is presented. RGB three channels of the color image have much strong corr...
-
Article
A novel medical internet of things perception system based on visual image encryption and intrusion detection
Smart cities are the emerging topics in the recent decade with advancements in science and technology especially in the areas of communication technologies. Concept of smart cities depicts the inteconnectivity...
-
Chapter and Conference Paper
Effective Android Malware Detection Based on Deep Learning
Android, the world’s most widely used mobile operating system, is the target of a large number of malwares. These malwares have brought great trouble to information security and users’ privacy, such as leaking...
-
Chapter and Conference Paper
A Robust Framework for High-Quality Voice Conversion with Conditional Generative Adversarial Network
The deep neural network (DNNs) has been applied in voice conversion (VC) system successfully. DNN shows its effectiveness especially with a large scale of training speech data, but on a small dataset, DNN suff...
-
Chapter and Conference Paper
Suzzer: A Vulnerability-Guided Fuzzer Based on Deep Learning
Fuzzing is a simple and effective way to find software bugs. Most state-of-the-art fuzzers focus on improving code coverage to enhance the possibility of causing crashes. However, a software program oftentimes...
-
Chapter and Conference Paper
Over-Sampling Multi-classification Method Based on Centroid Space
The problem of unbalanced data generally exists in various application fields of large data and machine learning, such as medical diagnosis, anomaly detection and so on. Researchers have proposed or adopted a ...
-
Article
Depth map prediction from a single image with generative adversarial nets
A depth map is a fundamental component of 3D construction. Depth map prediction from a single image is a challenging task in computer vision. In this paper, we consider the depth prediction as an image-to-imag...
-
Article
Fine-grained facial image-to-image translation with an attention based pipeline generative adversarial framework
Fine-grained feature detection and recognition is an important but tough work due to the resolution and noisy representation. Synthesize images with a specified tiny feature is even more challenging. Existing ...
-
Article
KA-Ensemble: towards imbalanced image classification ensembling under-sampling and over-sampling
Imbalanced learning has become a research emphasis in recent years because of the growing number of class-imbalance classification problems in real applications. It is particularly challenging when the imbalan...
-
Article
Multi-exposure image fusion based on tensor decomposition
In this paper, a multi-exposure image fusion (MEF) method is proposed based on tensor decomposition and saliency model. The main innovation of the proposed method is to explore a tensor domain for MEF and defi...
-
Chapter and Conference Paper
Thinking in Patch: Towards Generalizable Forgery Detection with Patch Transformation
Nowadays, synthetic faces can completely trick human eyes, which raises social concerns for malicious dissemination of such fake content. As a result, face forgery detection has become a significant research t...
-
Chapter and Conference Paper
Modeling and Cycle Analysis of Traffic Signal Systems Based on Timed Networks
The traffic signal control systems offer an effective settlement for the city traffic management. In this paper, the operation process of traffic signal systems for one-way street and crossroad is described by...
-
Article
Robust HDR video watermarking method based on the HVS model and T-QR
In order to protect the copyright of the high dynamic range (HDR) video, a robust HDR video watermarking method based on the human visual system (HVS) model and Tensor-QR decomposition (T-QR) is proposed. In o...