Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Learning a Detail-Oriented Transformer for Image Denoising

    CNN-based methods have achieved significant success in image denoising with powerful and generous local priors. However, these methods are not good at exploring non-local self-similarity which is also an effec...

    Xuan Long, Mei-Qin Liu, Chao Yao, Shuo ** in Advances in Intelligent Information Hiding… (2023)

  2. No Access

    Chapter and Conference Paper

    Design and Experimental Verification of High Functional Density Cubesat System

    A Cubesat is regarded as a concentrated instrument intuitively and it includes all necessary elements of a satellite. High-cost performance is the key point and advantage, which is different from traditional s...

    Yuying Yao, Weida Fu, **n Guo, Sihan Shi in 3D Imaging—Multidimensional Signal Process… (2023)

  3. No Access

    Chapter and Conference Paper

    Robust Image Hashing Based on Histogram Reconstruction

    In this paper, we propose a perceptual image hashing method based on histogram reconstruction. Our method consists of three steps, pre-processing, histogram reconstruction and hash vector generation based on t...

    Yao Jia, Chen Cui, Zhenbang Wang in Advances in Intelligent Information Hiding… (2023)

  4. No Access

    Chapter and Conference Paper

    SRPose: Low-Resolution Human Pose Estimation with Super-Resolution

    2D human pose estimation from given images has been an activate research area in computer vision. Existing methods based on deep learning rely on high-resolution input, which is not always available in many sc...

    **yue Sun, Feng Li, Huihui Bai, Rongrong Ni in Advances in Intelligent Information Hiding… (2023)

  5. No Access

    Chapter and Conference Paper

    RGB Image Guided Depth Hole-Filling Using Bidirectional Attention Mechanism

    Depth maps obtained by commercial depth sensors are more likely to have missing values due to the occlusion effect, low-reflection objects, etc. Filling holes of depth maps is an important way to meet the dema...

    Anran Chen, Yao Zhao, Chunyu Lin in Advances in Intelligent Information Hiding… (2022)

  6. No Access

    Chapter and Conference Paper

    Feature-Aware Network Based on Upper Triangular Interaction for Single Shot Detector

    the impact of the balance between real-time performance and detection accuracy, single-stage detectors have received more attention than two-stage detectors. However, due to a large number of detection ...

    **ang Dong, Feng Li, Huihui Bai, Yao Zhao in Advances in Intelligent Information Hiding… (2022)

  7. No Access

    Chapter and Conference Paper

    Virtual Design of Chinese Theater Arts in Augmented Reality Media System

    The classic character shaped by Mei Lanfang is the representative of excellent Chinese theater arts. Constructing a digital virtual character of Mei Lanfang in augmented reality media helps to spread and inher...

    Du Yihang, Pei Yan, Zhang Yao, Wang Lijun in Advances in Intelligent Information Hiding… (2022)

  8. No Access

    Chapter and Conference Paper

    Occluded and Tiny Face Detection with Deep and Shallow Features Fusion and Compensation

    detection has been widely developed in the past decades. However, detecting occluded and tiny faces still remains great challenges. Previous methods solve these problems to a certain extent, but they ...

    Zhuofan Xu, Huihui Bai, Jimin **ao in Advances in Intelligent Information Hiding… (2022)

  9. No Access

    Chapter and Conference Paper

    Fuzhou PM2.5 Prediction and Related Factors Analysis

    The prediction of urban air pollutant concentration requires processing of large amounts of meteorological data and complex changes of air pollutants. PM2.5 is affected by many factors, including meteorologica...

    Wen-Ji Zhang, Li-Wen Chen, Yao Zhou in Advances in Intelligent Information Hiding… (2021)

  10. No Access

    Chapter and Conference Paper

    An Encryption Method of Power Cloud Data Based on n-RSA

    With the development and progress of the Internet, the traditional grids are unable to meet the needs of the power industry. The development of the power industry requires the support of cloud computing techno...

    Yong Wang, Qiang Ma, Lei Li, Ti Guan in Advances in Intelligent Information Hiding… (2021)

  11. No Access

    Chapter and Conference Paper

    Design and Implementation of a Host-Based Intrusion Detection System for Linux-Based Web Server

    In the era of blossoming computer sciences and internet technology, people cannot abolish network in our lives. However, the large number of users, website services will make itself became the most favorite ta...

    Cheng-Chung Kuo, Shu-Han Yao, Chia-Ling Hou in Recent Advances in Intelligent Information… (2019)

  12. No Access

    Chapter and Conference Paper

    DCT-Based Compressed Image with Reversibility Using Modified Quantization

    This paper presents a lossless data hiding scheme for concealing message in each block of discrete cosine transform (DCT) coefficients. Our proposed improves the Chang et al.’s scheme for obtaining higher perf...

    Chi-Yao Weng, Cheng-Ta Huang, Hung-Wei Kao in Advances in Intelligent Information Hiding… (2018)

  13. No Access

    Chapter and Conference Paper

    Determination of Coefficient of Thermal Expansion in High Power GaN-Based Light-Emitting Diodes via Optical Coherent Tomography

    One of the most challenging issues when operating a high-power light-emitting diode (LED) is to conduct appropriate packaging materials for the reliable thermal management of the entire device. Generally, the ...

    Ya-Ju Lee, Yung-Chi Yao, Yi-Kai Haung in Advances in Intelligent Information Hiding… (2018)

  14. No Access

    Chapter and Conference Paper

    Adaptive Multiple Description Depth Image Coding Based on Wavelet Sub-band Coefficients

    With the development of multi-view video plus depth technology, the coding algorithm at the depth image has become one of hot research directions. As we know, after wavelet transform, the energy of the image ...

    **gyuan Ma, Huihui Bai, Meiqin Liu in Advances in Intelligent Information Hiding… (2018)

  15. No Access

    Chapter

    Organizational Control Reconfigurations for a Robust Smart Power Grid

    Large-scale cyber-physical infrastructures, such as the Smart Power Grid, are envisioned as some of the core elements of the future Internet of Things. These critical infrastructures move more and more beyond ...

    Evangelos Pournaras, Mark Yao, Ron Ambrosio in Internet of Things and Inter-cooperative C… (2013)