Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    A 4D strong spatio-temporal feature learning network for behavior recognition of point cloud sequences

    Although the depth map sequence widely used in behavior recognition can provide depth information. However, depth pixels are not strongly correlated with each other, and the spatio-temporal structure informati...

    Kaijun You, Zhenjie Hou, Jiuzhen Liang, En Lin in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Multi-object reconstruction of plankton digital holograms

    Plankton is the base of the ocean ecosystem and is very sensitive to changes in their environment. Thus, monitoring the status of plankton in-situ has incredible importance for environmental study. Hologram is on...

    Wenjie Hu, Xuewen Yang, Nan Wang, **ng Zhang in Multimedia Tools and Applications (2024)

  3. No Access

    Chapter and Conference Paper

    A Critical Server Security Protection Strategy Based on Traffic Log Analysis

    Traditional perimeter-based security systems provide a level of defense against external attacks. However, with the increasing prevalence of advanced network attacks and the continual emergence of novel attack...

    Haiyong Zhu, Chengyu Wang, Bingnan Hou, Yonghao Tang in Computer Networks and IoT (2024)

  4. No Access

    Article

    Structural feature representation and fusion of human spatial cooperative motion for action recognition

    Aiming at the cooperative relationship of human body parts in the process of action execution, we propose an action recognition method based on the structural feature model of human spatial cooperative motion....

    **n Chao, Zhenjie Hou, Yujian Mo, Haiyong Shi, Wen**g Yao in Multimedia Systems (2023)

  5. No Access

    Article

    Robust HDR video watermarking method based on the HVS model and T-QR

    In order to protect the copyright of the high dynamic range (HDR) video, a robust HDR video watermarking method based on the human visual system (HVS) model and Tensor-QR decomposition (T-QR) is proposed. In o...

    Meng Du, Ting Luo, Haiyong Xu, Yang Song in Multimedia Tools and Applications (2022)

  6. No Access

    Chapter and Conference Paper

    Thinking in Patch: Towards Generalizable Forgery Detection with Patch Transformation

    Nowadays, synthetic faces can completely trick human eyes, which raises social concerns for malicious dissemination of such fake content. As a result, face forgery detection has become a significant research t...

    Xueqi Zhang, Shuo Wang, Chenyu Liu in PRICAI 2021: Trends in Artificial Intellig… (2021)

  7. No Access

    Chapter and Conference Paper

    Modeling and Cycle Analysis of Traffic Signal Systems Based on Timed Networks

    The traffic signal control systems offer an effective settlement for the city traffic management. In this paper, the operation process of traffic signal systems for one-way street and crossroad is described by...

    Yingxuan Yin, Cailu Wang, Haiyong Chen in Performance Evaluation Methodologies and T… (2021)

  8. No Access

    Article

    Multi-exposure image fusion based on tensor decomposition

    In this paper, a multi-exposure image fusion (MEF) method is proposed based on tensor decomposition and saliency model. The main innovation of the proposed method is to explore a tensor domain for MEF and defi...

    Shengcong Wu, Ting Luo, Yang Song, Haiyong Xu in Multimedia Tools and Applications (2020)

  9. No Access

    Article

    Depth map prediction from a single image with generative adversarial nets

    A depth map is a fundamental component of 3D construction. Depth map prediction from a single image is a challenging task in computer vision. In this paper, we consider the depth prediction as an image-to-imag...

    Shaoyong Zhang, Na Li, Chenchen Qiu, Zhibin Yu in Multimedia Tools and Applications (2020)

  10. No Access

    Article

    Fine-grained facial image-to-image translation with an attention based pipeline generative adversarial framework

    Fine-grained feature detection and recognition is an important but tough work due to the resolution and noisy representation. Synthesize images with a specified tiny feature is even more challenging. Existing ...

    Yan Zhao, Ziqiang Zheng, Chao Wang, Zhaorui Gu, Min Fu in Multimedia Tools and Applications (2020)

  11. No Access

    Article

    KA-Ensemble: towards imbalanced image classification ensembling under-sampling and over-sampling

    Imbalanced learning has become a research emphasis in recent years because of the growing number of class-imbalance classification problems in real applications. It is particularly challenging when the imbalan...

    Hao Ding, Bin Wei, Zhaorui Gu, Zhibin Yu in Multimedia Tools and Applications (2020)

  12. No Access

    Chapter and Conference Paper

    Effective Android Malware Detection Based on Deep Learning

    Android, the world’s most widely used mobile operating system, is the target of a large number of malwares. These malwares have brought great trouble to information security and users’ privacy, such as leaking...

    Yueqi **, Tengfei Yang, Yangyang Li, Haiyong **e in Artificial Intelligence and Security (2020)

  13. No Access

    Chapter and Conference Paper

    A Robust Framework for High-Quality Voice Conversion with Conditional Generative Adversarial Network

    The deep neural network (DNNs) has been applied in voice conversion (VC) system successfully. DNN shows its effectiveness especially with a large scale of training speech data, but on a small dataset, DNN suff...

    Liyang Chen, Yingxue Wang, Yifeng Liu, Wendong **ao in Artificial Intelligence and Security (2020)

  14. No Access

    Chapter and Conference Paper

    Suzzer: A Vulnerability-Guided Fuzzer Based on Deep Learning

    Fuzzing is a simple and effective way to find software bugs. Most state-of-the-art fuzzers focus on improving code coverage to enhance the possibility of causing crashes. However, a software program oftentimes...

    Yuyue Zhao, Yangyang Li, Tengfei Yang, Haiyong **e in Information Security and Cryptology (2020)

  15. No Access

    Chapter and Conference Paper

    Over-Sampling Multi-classification Method Based on Centroid Space

    The problem of unbalanced data generally exists in various application fields of large data and machine learning, such as medical diagnosis, anomaly detection and so on. Researchers have proposed or adopted a ...

    Haiyong Wang, Weizheng Guan, Kaixin Zhang in Big Data and Security (2020)

  16. No Access

    Article

    A novel medical internet of things perception system based on visual image encryption and intrusion detection

    Smart cities are the emerging topics in the recent decade with advancements in science and technology especially in the areas of communication technologies. Concept of smart cities depicts the inteconnectivity...

    Aiying Guo, Meihua Xu, Feng Ran, Haiyong Wang in Cluster Computing (2019)

  17. No Access

    Article

    A novel robust color image watermarking method using RGB correlations

    In order to protect the copyright of the color image, a novel robust color image watermarking method using correlations of RGB channels is presented. RGB three channels of the color image have much strong corr...

    Fangyan Zhang, Ting Luo, Gangyi Jiang, Mei Yu in Multimedia Tools and Applications (2019)

  18. Chapter and Conference Paper

    A Robust Multi-terminal Support Method Based on Tele-Immersion Multimedia Technology

    In this paper, a multi terminal support method based on tele-immersion multimedia technology is proposed. This method provides two functions of synchronous request and asynchronous request, and it can dynamic...

    Ronghe Wang, Bo Zhang, Haiyong **e, Dong Jiao, Shilong Ma in Cloud Computing – CLOUD 2019 (2019)

  19. No Access

    Chapter and Conference Paper

    A Novel Distributed Knowledge Reasoning Model

    This paper proposes a novel model and device based on distributed knowledge reasoning, for predicting the environmental risk degree for an abnormal event (e.g., fire) in the Internet of Things (IoT) environmen...

    Yashen Wang, Yifeng Liu, Haiyong **e in Artificial Intelligence and Security (2019)

  20. No Access

    Chapter and Conference Paper

    Real-Time Micro-expression Detection in Unlabeled Long Videos Using Optical Flow and LSTM Neural Network

    Micro-expressions are momentary involuntary facial expressions which may expose a person’s true emotions. Previous work in micro-expression detection mainly focus on finding the peak frame from a video sequenc...

    **g Ding, Zi Tian, **angwen Lyu, Quande Wang in Computer Analysis of Images and Patterns (2019)

previous disabled Page of 3