Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Rectifying Noisy Labels with Sequential Prior: Multi-scale Temporal Feature Affinity Learning for Robust Video Segmentation

    Noisy label problems are inevitably in existence within medical image segmentation causing severe performance degradation. Previous segmentation methods for noisy label problems only utilize a single image whi...

    Beilei Cui, Minqing Zhang, Mengya Xu in Medical Image Computing and Computer Assis… (2023)

  2. No Access

    Article

    Image steganalysis based on attention augmented convolution

    Steganalysis, as the opposite technique to steganography, has been applied to determine whether secret information is embedded in an image. The existing adaptive steganography methods embed secret information ...

    Siyuan Huang, Minqing Zhang, Yan Ke, **nliang Bi in Multimedia Tools and Applications (2022)

  3. No Access

    Article

    Gas Absorption and Mass Transfer in a Pore-Array Intensified Tube-in-Tube Microchannel

    A pore-array intensified tube-in-tube microchannel (PA-TMC), which is characterized by high throughput and low pressure drop, was developed as a gas–liquid contactor. The sulfite oxidation method was used to d...

    Fengshun **a, Wenpeng Li, Junheng Guo, You Han in Transactions of Tian** University (2021)

  4. No Access

    Article

    Effects of rotor and stator geometry on dissolution process and power consumption in jet-flow high shear mixers

    The jet-flow high shear mixer (JF-HSM) is a new type of intensified equipment with special configurations of the rotor and the stator. The mass transfer property and power consumption were studied in the solid...

    Lin Yang, Wenpeng Li, Junheng Guo, Wei Li in Frontiers of Chemical Science and Engineer… (2021)

  5. No Access

    Chapter and Conference Paper

    A Generative Steganography Method Based on WGAN-GP

    With the development of Generative Adversarial Networks (GAN), GAN-based steganography and steganalysis techniques have attracted much attention from researchers. In this paper, we propose a novel image stegan...

    Jun Li, Ke Niu, Liwei Liao, Lijie Wang, Jia Liu in Artificial Intelligence and Security (2020)

  6. No Access

    Chapter and Conference Paper

    Secure Personal Health Records Sharing Based on Blockchain and IPFS

    Personal Health Records (PHR) system has attracted intensive attention due to its universal accessibility and low cost in economics. Because of high cost of storing data and access control, most PHR systems ad...

    Xuguang Wu, Yiliang Han, Minqing Zhang in Trusted Computing and Information Security (2020)

  7. No Access

    Chapter and Conference Paper

    Characterizing Label Errors: Confident Learning for Noisy-Labeled Image Segmentation

    Convolutional neural networks (CNNs) have achieved remarkable performance in image processing for its mighty capability to fit huge amount of data. However, if the training data are corrupted by noisy labels, ...

    Minqing Zhang, Jiantao Gao, Zhen Lyu in Medical Image Computing and Computer Assis… (2020)

  8. No Access

    Chapter and Conference Paper

    Reversible Data Hiding Algorithm in Homomorphic Encrypted Domain Based on EC-EG

    This paper proposes a reversible data hiding algorithm in homomorphic encrypted domain based on EC-EG. First, original image is segmented. The square grid pixel group randomly selected by image owner has one r...

    Neng Zhou, Han Wang, Mengmeng Liu, Yan Ke in Advances in Intelligent Networking and Col… (2020)

  9. No Access

    Chapter and Conference Paper

    A Lossless Data Hiding Scheme in Public Key Encrypted Domain Based on Homomorphic Key-Switching

    This paper proposes a lossless data hiding in encrypted domain (RDH-ED) scheme. To realize the data extraction directly from the encrypted domain without the private key, a key-switching based least-significan...

    Yan Ke, Minqing Zhang, Tingting Su, Jia Liu in Trusted Computing and Information Security (2020)

  10. No Access

    Article

    Reversible data hiding in JPEG images based on zero coefficients and distortion cost function

    Recently, reversible data hiding (RDH) in joint photographic experts group (JPEG) images has received a great deal of attention since the JPEG image is one of the most popularly used image formats nowadays. Ge...

    Fuqiang Di, Minqing Zhang, Fangjun Huang, Jia Liu in Multimedia Tools and Applications (2019)

  11. No Access

    Article

    Numerical investigation on the efficient mixing of overbridged split-and-recombine micromixer at low Reynolds number

    It is promising to design a novel structured micromixer that can be easily processed but also exhibit high mixing efficiency as well as low pressure drop at a wide range of Reynolds numbers. The overbridged st...

    Muchuan He, Wei Li, MinQing Zhang, **li Zhang in Microsystem Technologies (2019)

  12. No Access

    Article

    High-fidelity reversible data hiding by Quadtree-based pixel value ordering

    Recently, the pixel value ordering (PVO) method has received a great deal of attention in the field of high-fidelity reversible data hiding. To improve the embedding performance of the PVO-based method, a quad...

    Fuqiang Di, Minqing Zhang, **n Liao, Jia Liu in Multimedia Tools and Applications (2019)

  13. No Access

    Chapter and Conference Paper

    Novel Iterative Attention Focusing Strategy for Joint Pathology Localization and Prediction of MCI Progression

    Mild Cognitive Impairment (MCI) is the prodromal stage of Alzheimer’s disease (AD), with a high incident rate converting to AD. Hence, it is critical to identify MCI patients who will convert to AD patients fo...

    Qingfeng Li, **aodan **ng, Ying Sun in Medical Image Computing and Computer Assis… (2019)

  14. No Access

    Chapter and Conference Paper

    High-Fidelity Reversible Data Hiding Algorithm Based on SVD

    The conventional reversible data hiding (RDH) is limited by the problem of distortion caused by embedding the secret data on the original carrier image. Therefore, in this work, a high-fidelity RDH algorithm w...

    Tianxue Li, Minqing Zhang, Jian** Wang in Complex, Intelligent, and Software Intensi… (2019)

  15. No Access

    Chapter and Conference Paper

    Multi-Task Convolutional Neural Network for Joint Bone Age Assessment and Ossification Center Detection from Hand Radiograph

    Bone age assessment is a common clinical procedure to diagnose endocrine and metabolic disorders in children. Recently, a variety of convolutional neural network based approaches have been developed to automat...

    Minqing Zhang, Dijia Wu, Qin Liu, Qingfeng Li in Machine Learning in Medical Imaging (2019)

  16. No Access

    Chapter and Conference Paper

    Regression-Based Line Detection Network for Delineation of Largely Deformed Brain Midline

    Brain midline shift is often caused by various clinical conditions such as high intracranial pressure, which can be deadly. To facilitate clinical evaluation, automated methods have been proposed to classify ...

    Hao Wei, **angyu Tang, Minqing Zhang in Medical Image Computing and Computer Assis… (2019)

  17. No Access

    Chapter and Conference Paper

    Dynamic Spectral Graph Convolution Networks with Assistant Task Training for Early MCI Diagnosis

    Functional brain connectome, also known as inter-regional functional connectivity (FC) matrix, is recently considered providing decisive markers for early mild cognitive impairment (eMCI). However, in most exi...

    **aodan **ng, Qingfeng Li, Hao Wei in Medical Image Computing and Computer Assis… (2019)

  18. No Access

    Article

    Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding

    Reversible data hiding in encrypted images (RDHEI) is a technique that makes contributions to cloud data management in privacy preservation and data security. A novel framework of RDHEI with high embedding cap...

    Fuqiang Di, Fangjun Huang, Minqing Zhang, Jia Liu in Multimedia Tools and Applications (2018)

  19. No Access

    Chapter and Conference Paper

    An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble

    In order to enhance the detection rate of ensemble classifiers in steganalysis, concern the problems that the accuracy of basic classifier is low and the kind of basic classifier is single in typical ensemble...

    Zhen Cao, Minqing Zhang, **aolong Chen in Advances in Internetworking, Data & Web Te… (2018)

  20. No Access

    Chapter and Conference Paper

    Generative Steganography Based on GANs

    Traditional steganography algorithms embed secret information by modifying the content of the images, which makes it difficult to fundamentally resist the detection of statistically based steganalysis algorit...

    Mingming Liu, Minqing Zhang, Jia Liu, **aoyuan Yang in Cloud Computing and Security (2018)

previous disabled Page of 2