Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Enhancing adversarial transferability with partial blocks on vision transformer

    Adversarial examples can attack multiple unknown convolutional neural networks (CNNs) due to adversarial transferability, which reveals the vulnerability of CNNs and facilitates the development of adversarial ...

    Yanyang Han, Ju Liu, **aoxi Liu, **ao Jiang in Neural Computing and Applications (2022)

  2. Chapter and Conference Paper

    Hybrid Pyramid U-Net Model for Brain Tumor Segmentation

    In this paper, we extend the U-Net model and propose a novel hybrid pyramid U-Net (HPU-Net) model which explores the global context information combined different region based context. Global context informati...

    **angmao Kong, Guoxia Sun, Qiang Wu, Ju Liu in Intelligent Information Processing IX (2018)

  3. Chapter and Conference Paper

    Improved Spread Transform Dither Modulation Using Luminance-Based JND Model

    In the quantization-based watermarking framework, perceptual just noticeable distortion (JND) model has been widely used to determine the quantization step size to provide a better tradeoff between fidelity an...

    Wenhua Tang, Wenbo Wan, Ju Liu, Jiande Sun in Image and Graphics (2015)

  4. No Access

    Chapter and Conference Paper

    Real-Time Multi-Application Network Traffic Identification Based on Machine Learning

    In this paper, kinds of network applications are first analyzed, and some simple and effective features from the package headers of network flows are then generated by using the method of time window. What is ...

    Meihua Qiao, Yanqing Ma, Yijie Bian, Ju Liu in Advances in Neural Networks – ISNN 2015 (2015)

  5. Chapter and Conference Paper

    Frame Rate Up-Conversion Using Motion Vector Angular for Occlusion Detection

    In this paper, we study on handling the issue of occlusions in frame rate up-conversion (FRUC), which has been widely used to reconstruct high-quality videos presented on liquid crystal display. Depending on d...

    Yue Zhao, Ju Liu, Guoxia Sun, **g Ge, Wenbo Wan in Image and Graphics (2015)

  6. No Access

    Chapter and Conference Paper

    Capacity and Power Optimization for Collaborative Beamforming with Two Relay Clusters

    In this paper, we study two approaches to optimize the problems between capacity and power in a three-hop multi-relay network. In the first approach, two beamforming weight vectors are designed to maximize the...

    Bingbing Lu, Ju Liu, Chao Wang, Hongji Xu, Qing Wang in Advances in Swarm Intelligence (2014)

  7. No Access

    Chapter and Conference Paper

    Key-Frame Selection Strategy Based on Edge Points Classification in 2D-to-3D Conversion

    In 2D-to-3D video conversion, key-frame selection is essential and it affects the quality and workload of the conversion. In this paper, a key-frame selection method based on edge classification is proposed. I...

    Jiangchuan **e, Jiande Sun, Ju Liu in Intelligence Science and Big Data Engineer… (2013)

  8. No Access

    Chapter and Conference Paper

    Transmitter-Receiver Collaborative-Relay Beamforming by Simulated Annealing

    This paper considers the collaborative-relay beamforming (CRBF) design for a three-hop multi-relay network with one transmitter, one receiver and two clusters of relay nodes. It is assumed that, all the relay ...

    Dong Zheng, Ju Liu, Lei Chen, Yuxi Liu, Weidong Guo in Advances in Swarm Intelligence (2011)

  9. No Access

    Article

    A motion location based video watermarking scheme using ICA to extract dynamic frames

    In this paper, we propose a novel video watermarking scheme based on motion location. In the proposed scheme, independent component analysis is used to extract a dynamic frame from two successive frames of ori...

    Zhaowan Sun, Ju Liu, Jiande Sun, **nghua Sun, Jie Ling in Neural Computing and Applications (2009)

  10. No Access

    Chapter and Conference Paper

    A Robust Non-Line-Of-Sight Error Mitigation Method in Mobile Position Location

    A novel non-line-of-sight (NLOS) error identification and range measurement reconstruction algorithm is proposed. First, a NLOS error identification technique is exploited to decide whether there is a NLOS pat...

    Sumei Chen, Ju Liu, Lin Xue in Advances in Neural Networks – ISNN 2009 (2009)

  11. No Access

    Chapter and Conference Paper

    Face Hallucination Based on CSGT and PCA

    In this paper, based on Circularly Symmetrical Gabor Transform (CSGT) and Principal Component Analysis (PCA), we propose a face hallucination approach. In this approach, all of the face images (both input face...

    **aoling Wang, Ju Liu, Jian** Qiao, **yu Chu in Advances in Neural Networks - ISNN 2008 (2008)

  12. No Access

    Chapter and Conference Paper

    ICA Based Super-Resolution Face Hallucination and Recognition

    In this paper, we propose a new super-resolution face hallucination and recognition method based on Independent Component Analysis (ICA). Firstly, ICA is used to build a linear mixing relationship between high...

    Hua Yan, Ju Liu, Jiande Sun, **nghua Sun in Advances in Neural Networks – ISNN 2007 (2007)

  13. No Access

    Chapter and Conference Paper

    A Novel Watermarking Method with Image Signature

    In this paper, we propose a novel invisible watermarking method with image signature, which can resist not only common image attacks but also copy attack. The image signature algorithm referred is based on Ima...

    **ao-Li Niu, Ju Liu, Jian-De Sun, Jian-** Qiao in Advances in Neural Networks - ISNN 2006 (2006)

  14. No Access

    Chapter and Conference Paper

    A SVM-Based Blur Identification Algorithm for Image Restoration and Resolution Enhancement

    Blur identification is usually necessary in image restoration. In this paper, a novel blur identification algorithm based on Support Vector Machines (SVM) is proposed. In this method, blur identification is co...

    Jian** Qiao, Ju Liu in Knowledge-Based Intelligent Information and Engineering Systems (2006)

  15. No Access

    Chapter and Conference Paper

    Programming of Informatized Instructional Design Platform for Physics

    Recently, a number of instructional design platforms have emerged in educational informatizing process. However, teachers still can not form their individualised instructional design through them, because thes...

    Yongjiang Zhong, Ju Liu, Shaochun Zhong in Technologies for E-Learning and Digital En… (2006)

  16. No Access

    Chapter and Conference Paper

    A 2DPCA-Based Video Watermarking Scheme for Resistance to Temporal Desynchronization

    Temporal synchronization is a problem that cannot be ignored in most video watermarking application. In this paper, a video watermarking scheme is proposed to resist temporal desynchronization by using shot se...

    Jiande Sun, Ju Liu, Hua Yan in Advances in Neural Networks - ISNN 2006 (2006)

  17. No Access

    Chapter and Conference Paper

    Blind Detection of Orthogonal Space-Time Block Coding Based on ICA Schemes

    Space-time block coding (STBC) can achieve transmit diversity gain and obtain higher coding gain without sacrifice of bandwidth. But the decoding requires accurate channel state information (CSI), which strong...

    Ju Liu, Bo Gu, Hongji Xu, Jian** Qiao in Advances in Neural Networks – ISNN 2005 (2005)

  18. No Access

    Chapter and Conference Paper

    A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components

    Digital watermarking is an enabling technique to prove the ownership of copyrighted digital products. But its utility may be reduced greatly by copy attack which can cause ownership ambiguity. In this paper, a...

    Ju Liu, Huibo Hu, Jiande Sun, Yu Huang in Advances in Neural Networks – ISNN 2005 (2005)

  19. No Access

    Chapter and Conference Paper

    A Novel Blind Deconvolution Method for Single-Output Chaotic Convolution Mixed Signal

    According to the chaotic characteristics, a deconvolution filter for single-output chaotic convolution mixed signal is designed by the linear predication error analysis. Then corrected estimated error from the...

    **efeng Cheng, Yong Zhang, Zhiquan Feng, Ju Liu in Advances in Neural Networks – ISNN 2005 (2005)

  20. No Access

    Chapter and Conference Paper

    Edge Projection-Based Image Registration

    Image registration is a crucial step in all image analysis tasks. In this paper, an edge projection-based image registration method is proposed. First, Radon transform is used to project the edges of images al...

    Hua Yan, Ju Liu, Jiande Sun in Knowledge-Based Intelligent Information an… (2005)

previous disabled Page of 2