Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Swin transformer and ResNet based deep networks for low-light image enhancement

    Low-light image enhancement is a long-term low-level vision problem, which aims to improve the visual quality of images captured in low illumination environment. Convolutional neural network (CNN) is the found...

    Lintao Xu, Changhui Hu, Bo Zhang, Fei Wu, Ziyun Cai in Multimedia Tools and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    A Multi-party Private Set Union Protocol Against Malicious Adversary

    Our protocol, grounded on the principles of SPDZ technology and the Bloom Filter, aims to efficiently compute the union of datasets from multiple participants without exposing individual participants’ data. In...

    Yixiao Gao, Xuexin Zheng, Changhui Hu in Proceedings of Innovative Computing 2024, Vol. 4 (2024)

  3. No Access

    Article

    Local weight coupled network: multi-modal unequal semi-supervised domain adaptation

    Existing semi-supervised domain adaptation (SSDA) approaches on visual classification usually assume that the labelled source data are only collected from single modality. However, since single source data can...

    Ziyun Cai, Jie Song, Tengfei Zhang, Changhui Hu in Multimedia Tools and Applications (2024)

  4. No Access

    Chapter and Conference Paper

    A Comparison of Discrete Event Simulator and Real-Time Emulator for Mobile Ad Hoc Network

    Network research requires testing tools to evaluate new protocols and algorithms. Since implementing and verifying these protocols and algorithms on real network devices is time-consuming and costly, widely-us...

    **gzhi Wang, Penghui Hu, Yixin Zhang in Machine Learning and Intelligent Communica… (2023)

  5. No Access

    Chapter and Conference Paper

    A Reinforcement Learning Based Resource Access Strategy for Satellite-Terrestrial Integrated Networks

    The satellite-terrestrial integrated network (STIN) has recently attracted considerable attention. The problem studied in this paper is how the access controller located at the ground station selects the best-...

    Jiyun Qiu, Hao Zhang, Li Zhou, Penghui Hu in Machine Learning and Intelligent Communica… (2023)

  6. No Access

    Chapter and Conference Paper

    An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular Networks

    Traffic monitoring services show great potential for improving the traffic efficiency in vehicular networks. Drivers can obtain the latest information on their upcoming routes by sending location-based queries...

    Chen Gu, Xuande Cui, Donghui Hu in Wireless Algorithms, Systems, and Applications (2022)

  7. No Access

    Article

    Three-stage Stackelberg game based edge computing resource management for mobile blockchain

    Blockchain can provide a dependable environment for mobile applications. Mining, as an important component in blockchain, requires a lot of computing resources, and hence resource limited moblie devices are un...

    Yuqi Fan, Zhifeng **, Guangming Shen in Peer-to-Peer Networking and Applications (2021)

  8. No Access

    Article

    An improved steganography without embedding based on attention GAN

    Steganography is an art to hide information in the carriers to prevent from being detected, while steganalysis is the opposite art to detect the presence of the hidden information. With the development of deep...

    Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang in Peer-to-Peer Networking and Applications (2021)

  9. No Access

    Chapter and Conference Paper

    Cartographer Algorithm and System Implementation Based on Enhanced Pedestrian Filtering of Inspection Robot

    Aiming at the problem that the pedestrian filtering function is unstable in the subway station hall with heavy traffic in the cartographer and the generated map has related noise that affects later path planni...

    Ganghui Hu, Jianbo Sun, **ao Chen in Intelligent Equipment, Robots, and Vehicles (2021)

  10. No Access

    Article

    A steganographic method based on gain quantization for iLBC speech streams

    Under the premise of ensuring good speech quality and resistance to steganalysis, how to embed as much information as possible into low-bit-rate speech is a challenge. The existing research mainly focuses on l...

    Zhaopin Su, Wangwang Li, Guofu Zhang, Donghui Hu, **anxian Zhou in Multimedia Systems (2020)

  11. No Access

    Chapter and Conference Paper

    A Novel Approach of Steganalysis to Deal with Steganographic Algorithm Mismatch

    Steganalysis is the art to detect the hiding information introduced by the algorithm of steganography. When steganalysis model is trained on the image set with stego images produced by a certain type of stegan...

    Pengfei Shi, Donghui Hu, Yuchen Li in Intelligent Computing Theories and Applica… (2020)

  12. No Access

    Chapter and Conference Paper

    Diagonal Symmetric Pattern Based Illumination Invariant Measure for Severe Illumination Variations

    This paper proposes a diagonal symmetric pattern (DSP) to develop the illumination invariant measure for severe illumination variations. Firstly, the subtraction of two diagonal symmetric pixels is defined as ...

    Changhui Hu, Mengjun Ye, Yang Zhang, **aobo Lu in Pattern Recognition and Computer Vision (2020)

  13. No Access

    Chapter and Conference Paper

    Latency-Aware Data Placements for Operational Cost Minimization of Distributed Data Centers

    A large amount of data are stored in geographically distributed data centers interconnected by the Internet. The power consumption for running the servers storing the data and inter-data center network transpo...

    Yuqi Fan, Chen Wang, Bei Zhang, Donghui Hu in Database Systems for Advanced Applications (2020)

  14. No Access

    Chapter and Conference Paper

    One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud

    Location-based services (LBSs) are widely deployed in commercial services. These services always depend on a service provider, e.g., a cloud server, to store the enormous amounts of geospatial data and to proc...

    Yifei Chen, Meng Li, Shuli Zheng, Donghui Hu in Information and Communications Security (2020)

  15. No Access

    Article

    Study on the interaction between the cover source mismatch and texture complexity in steganalysis

    Cover source mismatch (CSM) occurs when a detection classifier for steganalysis trained on objects from one cover source is tested on another source. However, it is very hard to find the same sources as suspic...

    Donghui Hu, Zhong** Ma, Yuqi Fan, Shuli Zheng in Multimedia Tools and Applications (2019)

  16. No Access

    Chapter and Conference Paper

    Multi-kernel Collaboration-Induced Fuzzy Local Information C-Means Algorithm for Image Segmentation

    As an advanced method in the field of image segmentation, the fuzzy local information c-means (FLICM) algorithm has the problem of which segmentation performance is degraded when neighboring pixels are pollute...

    Yiming Tang, **anghui Hu, Fuji Ren in Computer Supported Cooperative Work and So… (2019)

  17. No Access

    Article

    Face recognition under varying illumination based on singular value decomposition and retina modeling

    Face recognition under the influence of complex illumination is a challenging problem to be solved. The common treatments for minimizing the affection of illumination variation are illumination preprocessing a...

    Yang Zhang, Changhui Hu, **aobo Lu in Multimedia Tools and Applications (2018)

  18. No Access

    Article

    Wavelet denoising with generalized bivariate prior model

    This paper presents a novel wavelet method based on a prior model of wavelet coefficient with a generalized bivariate distribution function. The generalized bivariate prior model extends the isotropic bivariat...

    Weili Zeng, Changhui Hu, Yijun Du in Multimedia Tools and Applications (2018)

  19. No Access

    Article

    How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control

    The blind sharing of digital images in social networks may lead to threats to privacy. Currently, privacy decision recommendations and access control mechanisms are inadequate with respect to sharing digital i...

    **aoxia Hu, Donghui Hu, Shuli Zheng, Wangwang Li in Multimedia Tools and Applications (2018)

  20. No Access

    Article

    Illumination robust single sample face recognition based on ESRC

    The extended sparse representation classifier (ESRC) is one of the state-of-the-art solutions for single sample face recognition, but it performs unsatisfactorily under varying illumination. There are two main...

    Changhui Hu, **aobo Lu, Mengjun Ye, Weili Zeng in Multimedia Tools and Applications (2017)

previous disabled Page of 2