Skip to main content

and
  1. No Access

    Article

    (kn) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability

    In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...

    Fei Hu, Weihai Li, Nenghai Yu in Multimedia Tools and Applications (2024)

  2. No Access

    Chapter and Conference Paper

    PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing

    Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...

    Rui Luo, Yuanzhi Yao, Weihai Li, Nenghai Yu in Advances in Artificial Intelligence and Se… (2022)

  3. No Access

    Chapter and Conference Paper

    Towards More Powerful Multi-column Convolutional Network for Crowd Counting

    Scale variation has always been one of the most challenging problems for crowd counting. By using multi-column convolutions with different receptive fields to deal with different scales in the scene, the multi...

    Jiabin Zhang, Qi Chu, Weihai Li, Bin Liu, Weiming Zhang, Nenghai Yu in Image and Graphics (2021)

  4. No Access

    Chapter and Conference Paper

    Reset Attack: An Attack Against Homomorphic Encryption-Based Privacy-Preserving Deep Learning System

    In some existing privacy-preserving deep learning systems, additively homomorphic encryption enables ciphertext computation across the gradients. Therefore, many learning participants can perform neural networ...

    **aofeng Wu, Yuanzhi Yao, Weihai Li, Nenghai Yu in Artificial Intelligence and Security (2020)

  5. No Access

    Chapter and Conference Paper

    A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code

    QR code has been widely used in our daily life due to its convenience, and the security of QR code becomes a rising problem. In this paper, we introduce a new algorithm that adds the edge of the gray image to ...

    Fei Hu, Yuanzhi Yao, Weihai Li, Nenghai Yu in Artificial Intelligence and Security (2020)

  6. No Access

    Article

    Object and patch based anomaly detection and localization in crowded scenes

    Detecting and localizing anomalies in crowded scenes is an ongoing challenge for public security. Existing approaches are mainly based on patches and trajectories. However, they fall short in semantic understa...

    **aodan Li, Weihai Li, Bin Liu, Nenghai Yu in Multimedia Tools and Applications (2019)

  7. Chapter and Conference Paper

    Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification

    Person re-identification (re-ID) is mainly deployed in the multi-camera surveillance scene, which means that learning cross camera invariant features is highly required. In this paper, we propose a novel loss ...

    Zhiwei Zhao, Bin Liu, Weihai Li, Nenghai Yu in Image and Graphics (2019)

  8. No Access

    Article

    Which gray level should be given the smallest cost for adaptive steganography?

    Currently, the most successful approach to steganography in digital image is distortion-minimization framework, which reduces the steganographers’ work to the design of distortion function with the aid of prac...

    Yao Wei, Weiming Zhang, Weihai Li, Nenghai Yu, ** Sun in Multimedia Tools and Applications (2018)

  9. No Access

    Article

    The mitochondrial genome of a stonefly species, Cerconychia sapa (Plecoptera: Styloperlidae)

    The nearly complete sequence of the mitochondrial DNA (mtDNA) of the stonefly, Cerconychia sapa, has been completed and annotated in this study. The circular genome is 15,188 bp in length with an A+T content of 7...

    Ying Wang, **jun Cao, Beibei Lei, Weihai Li in Conservation Genetics Resources (2018)

  10. No Access

    Chapter and Conference Paper

    Nest Detection Using Coarse-to-Fine Searching Strategy

    Nest on pylon is a great threat to the safety and function of electric power system. Thus detection of nest has been considered as a vital task when checking transmission line through intelligent surveillance ...

    Nianwang Wan, Zhenyu Duan, Yongdong Hua in Digital TV and Wireless Multimedia Communi… (2018)

  11. No Access

    Chapter and Conference Paper

    Edge-Aware Saliency Detection via Novel Graph Model

    Edge information takes an important role in distinguishing salient objects from background. In this paper, the screened edge information is utilized to roughly locate the salient object, which is combined with...

    Hanpei Yang, Weihai Li in Advances in Multimedia Information Processing – PCM 2017 (2018)

  12. No Access

    Article

    The mitochondrial genome of Mesocapnia daxingana (Plecoptera: Capniidae)

    The stonefly Mesocapnia daxingana (Plecoptera: Capniidae) is a new species and the capniid genus Mesocapnia are first reported from China. Their potential use as biomonitoring for water quality assessment is well...

    Ying Wang, **jun Cao, Weihai Li, **ling Chen in Conservation Genetics Resources (2017)

  13. No Access

    Article

    Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy

    An image encryption scheme based on chaos system combining with DNA coding and information entropy has been proposed recently, in which chaos system and DNA operation are used to perform substitution, and entr...

    **n Su, Weihai Li, Honggang Hu in Multimedia Tools and Applications (2017)

  14. No Access

    Chapter and Conference Paper

    Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms

    This paper considers sub-channel and power allocation based on genetic algorithms to maximize the overall system capacity using proportional rate constraints in multiuser orthogonal frequency division multiple...

    Weihai Li, Yunxiao Zu, Yue Jia in Frontiers in Internet Technologies (2013)

  15. No Access

    Chapter and Conference Paper

    Visual Information Encryption in Frequency Domain: Risk and Enhancement

    Focusing on the encryption of digital image and video, this paper reports an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms. This serious weakness of DCT is analyzed theore...

    Weihai Li, Yuan Yuan in Advances in Machine Vision, Image Processing, and Pattern Analysis (2006)

  16. No Access

    Article

    Analysis of Transmission Characteristics for NRD/Microstrip Line Hybrid Integrated LSE and LSM-Mode Baluns*

    The NRD/microstrip line hybrid integration structure shows good behavior for millimeter wave applications. This paper applies the integral equations method to analyze the transmission characteristics of the NR...

    Weihai Li, Shanjia Xu, Xuequan Chen in International Journal of Infrared and Mill… (2005)