Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    A Cellular Automaton Approach for Efficient Computing on Surface Chemical Reaction Networks

    A surface chemical reaction network (sCRN, Qian and Winfree in DNA Computing and Molecular Programming: 20th International Conference, DNA 20, Kyoto, Japan, September 22–26, 2014. Proceedings 20. Springer, 201...

    Sihai Yu, Wenli Xu, Jia Lee, Teijiro Isokawa in New Generation Computing (2024)

  2. No Access

    Article

    Universality of a surface chemical reaction network using only bi-molecular reactions

    In recent years, a novel molecular computation model known as surface chemical reaction network (Qian, In: DNA computing and molecular programming: 20th international conference, DNA 20, Proceedings, 2014) has...

    Sihai Yu, Jia Lee, Teijiro Isokawa in Journal of Membrane Computing (2024)

  3. No Access

    Article

    (kn) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability

    In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...

    Fei Hu, Weihai Li, Nenghai Yu in Multimedia Tools and Applications (2024)

  4. Article

    Correction to: Multibranch multilevel federated learning for a better feature extraction and a plug-and-play dynamic-adjusting double flow personalization approach

    Maoye Ren, **nhai Yu in Applied Intelligence (2023)

  5. No Access

    Article

    DBA-UNet: a double U-shaped boundary attention network for maxillary sinus anatomical structure segmentation in CBCT images

    Accurate identification of the maxillary sinus and maxillary sinus septum on cone beam computed tomography (CBCT) is essential for appropriate surgical methods. However, the large-scale gap and the prior knowl...

    Yi Zhang, Kun Qian, Zhiyuan Zhu, Hai Yu, Bo Zhang in Signal, Image and Video Processing (2023)

  6. No Access

    Article

    Multibranch multilevel federated learning for a better feature extraction and a plug-and-play dynamic-adjusting double flow personalization approach

    Federated learning (FL) is an emerging technique used to preserve the privacy of users’ data in training by a distributed machine learning approach. Previously, a client-edge-cloud hierarchical federated learn...

    Maoye Ren, **nhai Yu in Applied Intelligence (2023)

  7. Article

    Open Access

    Deep 3D mesh watermarking with self-adaptive robustness

    Robust 3D mesh watermarking is a traditional research topic in computer graphics, which provides an efficient solution to the copyright protection for 3D meshes. Traditionally, researchers need manually design wa...

    Feng Wang, Hang Zhou, Han Fang, Weiming Zhang, Nenghai Yu in Cybersecurity (2022)

  8. No Access

    Article

    Co-optimization strategy between array operation and weight map** for flash computing arrays to achieve high computing efficiency and accuracy

    In this study, we propose a co-optimization method of array operation and weight map** for flash computing arrays to improve computing efficiency and accuracy. The proposed co-optimization can minimize the r...

    Guihai Yu, Peng Huang, Runze Han, Lixia Han in Science China Information Sciences (2022)

  9. No Access

    Article

    \(\hbox {ABDF}^{2}\) -Net: an adaptive bi-directional features fusion network for real-time detection of threat object

    To achieve automatic detection of threat objects for X-ray baggage screening, we propose an adaptive bi-directional features fusion network ( $...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2022)

  10. No Access

    Article

    Certified defense against patch attacks via mask-guided randomized smoothing

    The adversarial patch is a practical and effective method that modifies a small region on an image, making DNNs fail to classify. Existing empirical defenses against adversarial patch attacks lack theoretical ...

    Kui Zhang, Hang Zhou, Huanyu Bian, Weiming Zhang in Science China Information Sciences (2022)

  11. No Access

    Article

    Devising optimal integration test orders using cost–benefit analysis

    Integration testing is an integral part of software testing. Prior studies have focused on reducing test cost in integration test order generation. However, there are no studies concerning the testing prioriti...

    Fanyi Meng 孟繁祎, Ying Wang 王莹, Hai Yu 于海 in Frontiers of Information Technology & Elec… (2022)

  12. No Access

    Article

    An ultrahigh-resolution image encryption algorithm using random super-pixel strategy

    Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...

    Wei Zhang, Weijie Han, Zhiliang Zhu, Hai Yu in Multimedia Tools and Applications (2021)

  13. No Access

    Article

    AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening

    X-ray baggage screening is a vitally important task to detect all kinds of threat objects at controlled access positions, which can prevent crime and guard personal safety. It is generally performed by screene...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  14. No Access

    Article

    An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution

    X-ray baggage inspection is an essential task to detect threat objects at important controlled access places, which can guard personal safety and prevent crime. Generally, it is carried out by screeners to vis...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  15. No Access

    Article

    A centripetal collection image sensor (CCIS) based on back gate modulation achieving 1T submicron pixel

    In this study, a novel centripetal collection image sensor based on FDSOI technology has been investigated. In the CCIS image sensor array, adjacent pixels in the same row share a common drain and source to av...

    Liqiao Liu, Guihai Yu, Gang Du, **aoyan Liu in Science China Information Sciences (2021)

  16. No Access

    Article

    A novel compressive sensing-based framework for image compression-encryption with S-box

    In this paper, we find that compressive sensing (CS) with the chaotic measurement matrix has a strong sensitivity to plaintext. Because of the quantification executed after CS, however, the plaintext sensitivi...

    Zhiliang Zhu, Yanjie Song, Wei Zhang, Hai Yu in Multimedia Tools and Applications (2020)

  17. No Access

    Article

    Real-time attacks on robust watermarking tools in the wild by CNN

    Robust watermarking is a widely used technology to protect image copyright. Robustness, the ability to resist various distortions, is the most important property of robust watermarking algorithm. So to improve...

    Linfeng Geng, Weiming Zhang, Haozhe Chen, Han Fang in Journal of Real-Time Image Processing (2020)

  18. No Access

    Article

    Object and patch based anomaly detection and localization in crowded scenes

    Detecting and localizing anomalies in crowded scenes is an ongoing challenge for public security. Existing approaches are mainly based on patches and trajectories. However, they fall short in semantic understa...

    **aodan Li, Weihai Li, Bin Liu, Nenghai Yu in Multimedia Tools and Applications (2019)

  19. No Access

    Article

    Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding

    Recently, video encryption has been widely investigated to enhance the protection for video data, yet the encryption efficiency may not be considered sufficiently so that some encryption schemes are unsuitable...

    Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu in Multimedia Tools and Applications (2019)

  20. No Access

    Article

    A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization

    This paper proposes a novel robust image watermarking scheme in Discrete Cosine Transform (DCT) domain for active forensics. We investigate the relation between the positions and the modification magnitudes of...

    Han Fang, Hang Zhou, Zehua Ma, Weiming Zhang in Multimedia Tools and Applications (2019)

previous disabled Page of 2