Skip to main content

previous disabled Page of 4
and
  1. No Access

    Article

    (kn) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability

    In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...

    Fei Hu, Weihai Li, Nenghai Yu in Multimedia Tools and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images

    Object detection in aerial images is a challenging task due to the oriented and densely packed objects. However, densely packed objects constitute a significant characteristic of aerial images: objects are not...

    Tingting Fang, Bin Liu, Zhiwei Zhao, Qi Chu, Nenghai Yu in Computer Vision – ACCV 2022 (2023)

  3. No Access

    Chapter and Conference Paper

    Neural Watermarking for 3D Morphable Models

    3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...

    Feng Wang, Hang Zhou, Weiming Zhang in Advances in Artificial Intelligence and Se… (2022)

  4. No Access

    Chapter and Conference Paper

    Exploration of Optimized Teaching Mode in Applied Technology Colleges Under the Background of Big Data

    Under the background of big data era, private universities should make big data not only a teaching tool and means for teachers, but also a teaching platform for students’ professional learning and practical t...

    Hong** Li, **ao Han, Yujiao Tang, Yonghai Yu in Innovative Computing (2022)

  5. No Access

    Chapter and Conference Paper

    PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing

    Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...

    Rui Luo, Yuanzhi Yao, Weihai Li, Nenghai Yu in Advances in Artificial Intelligence and Se… (2022)

  6. No Access

    Article

    An ultrahigh-resolution image encryption algorithm using random super-pixel strategy

    Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...

    Wei Zhang, Weijie Han, Zhiliang Zhu, Hai Yu in Multimedia Tools and Applications (2021)

  7. No Access

    Chapter and Conference Paper

    Bone Marrow Cell Segmentation Based on Improved U-Net

    Automatic segmentation of bone marrow cells plays an important role in the diagnosis of many blood diseases such as anemia and leukemia. Due to the complex morphology and wide variety of bone marrow cells, the...

    Lingmin **, Zhaochai Yu, Haoyi Fan, Shenghua Teng, Zuoyong Li in Data Mining and Big Data (2021)

  8. No Access

    Article

    A novel compressive sensing-based framework for image compression-encryption with S-box

    In this paper, we find that compressive sensing (CS) with the chaotic measurement matrix has a strong sensitivity to plaintext. Because of the quantification executed after CS, however, the plaintext sensitivi...

    Zhiliang Zhu, Yanjie Song, Wei Zhang, Hai Yu in Multimedia Tools and Applications (2020)

  9. No Access

    Chapter and Conference Paper

    Using GitHub Open Sources and Database Methods Designed to Auto-Generate Chinese Tang Dynasty Poetry

    Writing a Tang-Dynasty poetry in Chinese is very popular and useful in the tradition Chinese culture education field, In this paper we use GitHub open sources “jieba” Algorithm for text segmentation of Chinese...

    Hai Yu, Zi-Xuan Li, Yu-Yan Jiang in Big Data and Security (2020)

  10. No Access

    Chapter and Conference Paper

    Learning from Rankings with Multi-level Features for No-Reference Image Quality Assessment

    Deep neural networks for image quality assessment have been suffering from a lack of training data for a long time, as it is expensive and laborious to collect sufficient subjective mean opinion scores (MOS). ...

    Yiqun Li, Lan Ma, Dahai Yu in Pattern Recognition and Computer Vision (2020)

  11. No Access

    Chapter and Conference Paper

    Machine Learning Based Tongue Image Recognition for Diabetes Diagnosis

    Tongue diagnosis of Traditional Chinese Medicine (TCM) is of great significance in the diagnosis of diabetes. To reduce the subjectivity of doctors in clinical diagnosis, this paper proposes a method for diabe...

    **aohui Lin, Zhaochai Yu, Zuoyong Li, Weina Liu in Machine Learning for Cyber Security (2020)

  12. No Access

    Chapter and Conference Paper

    Application of High-Throughput Sequencing Data Mining in Comparison of Gene Expression Profile in Renal Cell Carcinoma and Normal Renal Cell by RNA-Seq

    Because of the advantages of RNA sequencing technology, this study selected SOLID technology as the transcriptome research method for clear cell renal cell carcinoma. The transcriptome sequencing of clear cell...

    Yunhai Yu, Hongmei Xu, Shaoning Guo, Na Wang in Innovative Computing (2020)

  13. No Access

    Chapter and Conference Paper

    Reset Attack: An Attack Against Homomorphic Encryption-Based Privacy-Preserving Deep Learning System

    In some existing privacy-preserving deep learning systems, additively homomorphic encryption enables ciphertext computation across the gradients. Therefore, many learning participants can perform neural networ...

    **aofeng Wu, Yuanzhi Yao, Weihai Li, Nenghai Yu in Artificial Intelligence and Security (2020)

  14. No Access

    Chapter and Conference Paper

    A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code

    QR code has been widely used in our daily life due to its convenience, and the security of QR code becomes a rising problem. In this paper, we introduce a new algorithm that adds the edge of the gray image to ...

    Fei Hu, Yuanzhi Yao, Weihai Li, Nenghai Yu in Artificial Intelligence and Security (2020)

  15. No Access

    Chapter and Conference Paper

    Research on Online Leakage Assessment

    Leakage assessment is the most common approach applied for assessing side-channel information leakage and validating the effectiveness of side-channel countermeasures. Established evaluation approaches are usu...

    Zhengguang Shi, Fan Huang, Mengce Zheng, Wenlong Cao, Ruizhe Gu in Data Science (2020)

  16. No Access

    Chapter and Conference Paper

    UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results

    This paper is the report of the first Under-Display Camera (UDC) image restoration challenge in conjunction with the RLQ workshop at ECCV 2020. The challenge is based on a newly-collected database of Under-Dis...

    Yuqian Zhou, Michael Kwan, Kyle Tolentino in Computer Vision – ECCV 2020 Workshops (2020)

  17. No Access

    Article

    Object and patch based anomaly detection and localization in crowded scenes

    Detecting and localizing anomalies in crowded scenes is an ongoing challenge for public security. Existing approaches are mainly based on patches and trajectories. However, they fall short in semantic understa...

    **aodan Li, Weihai Li, Bin Liu, Nenghai Yu in Multimedia Tools and Applications (2019)

  18. No Access

    Article

    Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding

    Recently, video encryption has been widely investigated to enhance the protection for video data, yet the encryption efficiency may not be considered sufficiently so that some encryption schemes are unsuitable...

    Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu in Multimedia Tools and Applications (2019)

  19. No Access

    Article

    A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization

    This paper proposes a novel robust image watermarking scheme in Discrete Cosine Transform (DCT) domain for active forensics. We investigate the relation between the positions and the modification magnitudes of...

    Han Fang, Hang Zhou, Zehua Ma, Weiming Zhang in Multimedia Tools and Applications (2019)

  20. No Access

    Article

    Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection

    This paper intents to solve the challenging problem of steganographer detection in the real world from a new perspective: side channel attack. We propose utilizing the behavior of actors in the social network ...

    Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha in Multimedia Tools and Applications (2019)

previous disabled Page of 4