![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Enhancing adversarial transferability with partial blocks on vision transformer
Adversarial examples can attack multiple unknown convolutional neural networks (CNNs) due to adversarial transferability, which reveals the vulnerability of CNNs and facilitates the development of adversarial ...
-
Chapter and Conference Paper
Hybrid Pyramid U-Net Model for Brain Tumor Segmentation
In this paper, we extend the U-Net model and propose a novel hybrid pyramid U-Net (HPU-Net) model which explores the global context information combined different region based context. Global context informati...
-
Chapter and Conference Paper
Improved Spread Transform Dither Modulation Using Luminance-Based JND Model
In the quantization-based watermarking framework, perceptual just noticeable distortion (JND) model has been widely used to determine the quantization step size to provide a better tradeoff between fidelity an...
-
Chapter and Conference Paper
Real-Time Multi-Application Network Traffic Identification Based on Machine Learning
In this paper, kinds of network applications are first analyzed, and some simple and effective features from the package headers of network flows are then generated by using the method of time window. What is ...
-
Chapter and Conference Paper
Frame Rate Up-Conversion Using Motion Vector Angular for Occlusion Detection
In this paper, we study on handling the issue of occlusions in frame rate up-conversion (FRUC), which has been widely used to reconstruct high-quality videos presented on liquid crystal display. Depending on d...
-
Chapter and Conference Paper
Capacity and Power Optimization for Collaborative Beamforming with Two Relay Clusters
In this paper, we study two approaches to optimize the problems between capacity and power in a three-hop multi-relay network. In the first approach, two beamforming weight vectors are designed to maximize the...
-
Chapter and Conference Paper
Key-Frame Selection Strategy Based on Edge Points Classification in 2D-to-3D Conversion
In 2D-to-3D video conversion, key-frame selection is essential and it affects the quality and workload of the conversion. In this paper, a key-frame selection method based on edge classification is proposed. I...
-
Chapter and Conference Paper
Transmitter-Receiver Collaborative-Relay Beamforming by Simulated Annealing
This paper considers the collaborative-relay beamforming (CRBF) design for a three-hop multi-relay network with one transmitter, one receiver and two clusters of relay nodes. It is assumed that, all the relay ...
-
Article
A motion location based video watermarking scheme using ICA to extract dynamic frames
In this paper, we propose a novel video watermarking scheme based on motion location. In the proposed scheme, independent component analysis is used to extract a dynamic frame from two successive frames of ori...
-
Chapter and Conference Paper
A Robust Non-Line-Of-Sight Error Mitigation Method in Mobile Position Location
A novel non-line-of-sight (NLOS) error identification and range measurement reconstruction algorithm is proposed. First, a NLOS error identification technique is exploited to decide whether there is a NLOS pat...
-
Chapter and Conference Paper
Face Hallucination Based on CSGT and PCA
In this paper, based on Circularly Symmetrical Gabor Transform (CSGT) and Principal Component Analysis (PCA), we propose a face hallucination approach. In this approach, all of the face images (both input face...
-
Chapter and Conference Paper
ICA Based Super-Resolution Face Hallucination and Recognition
In this paper, we propose a new super-resolution face hallucination and recognition method based on Independent Component Analysis (ICA). Firstly, ICA is used to build a linear mixing relationship between high...
-
Chapter and Conference Paper
A Novel Watermarking Method with Image Signature
In this paper, we propose a novel invisible watermarking method with image signature, which can resist not only common image attacks but also copy attack. The image signature algorithm referred is based on Ima...
-
Chapter and Conference Paper
A SVM-Based Blur Identification Algorithm for Image Restoration and Resolution Enhancement
Blur identification is usually necessary in image restoration. In this paper, a novel blur identification algorithm based on Support Vector Machines (SVM) is proposed. In this method, blur identification is co...
-
Chapter and Conference Paper
Programming of Informatized Instructional Design Platform for Physics
Recently, a number of instructional design platforms have emerged in educational informatizing process. However, teachers still can not form their individualised instructional design through them, because thes...
-
Chapter and Conference Paper
A 2DPCA-Based Video Watermarking Scheme for Resistance to Temporal Desynchronization
Temporal synchronization is a problem that cannot be ignored in most video watermarking application. In this paper, a video watermarking scheme is proposed to resist temporal desynchronization by using shot se...
-
Chapter and Conference Paper
Blind Detection of Orthogonal Space-Time Block Coding Based on ICA Schemes
Space-time block coding (STBC) can achieve transmit diversity gain and obtain higher coding gain without sacrifice of bandwidth. But the decoding requires accurate channel state information (CSI), which strong...
-
Chapter and Conference Paper
A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components
Digital watermarking is an enabling technique to prove the ownership of copyrighted digital products. But its utility may be reduced greatly by copy attack which can cause ownership ambiguity. In this paper, a...
-
Chapter and Conference Paper
A Novel Blind Deconvolution Method for Single-Output Chaotic Convolution Mixed Signal
According to the chaotic characteristics, a deconvolution filter for single-output chaotic convolution mixed signal is designed by the linear predication error analysis. Then corrected estimated error from the...
-
Chapter and Conference Paper
Edge Projection-Based Image Registration
Image registration is a crucial step in all image analysis tasks. In this paper, an edge projection-based image registration method is proposed. First, Radon transform is used to project the edges of images al...