default search action
BibTeX records: Nenghai Yu
@article{DBLP:journals/jimaging/ZhangZLTZZY24, author = {Xuehai Zhang and Wenbo Zhou and Kunlin Liu and Hao Tang and Zhenyu Zhang and Weiming Zhang and Nenghai Yu}, title = {ControlFace: Feature Disentangling for Controllable Face Swapping}, journal = {J. Imaging}, volume = {10}, number = {1}, pages = {21}, year = {2024}, url = {https://doi.org/10.3390/jimaging10010021}, doi = {10.3390/JIMAGING10010021}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jimaging/ZhangZLTZZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ChenXLLLYSL24, author = {Lutong Chen and Kaiping Xue and Jian Li and Zhonghui Li and Ruidong Li and Nenghai Yu and Qibin Sun and Jun Lu}, title = {{REDP:} Reliable Entanglement Distribution Protocol Design for Large-Scale Quantum Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {42}, number = {7}, pages = {1723--1737}, year = {2024}, url = {https://doi.org/10.1109/JSAC.2024.3380101}, doi = {10.1109/JSAC.2024.3380101}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ChenXLLLYSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HuLY24, author = {Fei Hu and Weihai Li and Nenghai Yu}, title = {(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability}, journal = {Multim. Tools Appl.}, volume = {83}, number = {14}, pages = {40713--40732}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-17270-0}, doi = {10.1007/S11042-023-17270-0}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HuLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/XiaoLXLYSL24, author = {Zirui Xiao and Jian Li and Kaiping Xue and Zhonghui Li and Nenghai Yu and Qibin Sun and Jun Lu}, title = {A Connectionless Entanglement Distribution Protocol Design in Quantum Networks}, journal = {{IEEE} Netw.}, volume = {38}, number = {1}, pages = {131--139}, year = {2024}, url = {https://doi.org/10.1109/MNET.2023.3321044}, doi = {10.1109/MNET.2023.3321044}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/XiaoLXLYSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/WeiCZLZZHY24, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Hanqing Zhao and Weiming Zhang and Gang Hua and Nenghai Yu}, title = {Deep Image Matting With Sparse User Interactions}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {46}, number = {2}, pages = {881--895}, year = {2024}, url = {https://doi.org/10.1109/TPAMI.2023.3326693}, doi = {10.1109/TPAMI.2023.3326693}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/WeiCZLZZHY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/ChenZCZY24, author = {Haozhe Chen and Jie Zhang and Kejiang Chen and Weiming Zhang and Nenghai Yu}, title = {Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {5}, number = {3}, pages = {1302--1315}, year = {2024}, url = {https://doi.org/10.1109/TAI.2023.3285858}, doi = {10.1109/TAI.2023.3285858}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tai/ChenZCZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/YaoZCY24, author = {Qiyi Yao and Weiming Zhang and Kejiang Chen and Nenghai Yu}, title = {{LDGM} Codes-Based Near-Optimal Coding for Adaptive Steganography}, journal = {{IEEE} Trans. Commun.}, volume = {72}, number = {4}, pages = {2138--2151}, year = {2024}, url = {https://doi.org/10.1109/TCOMM.2023.3342247}, doi = {10.1109/TCOMM.2023.3342247}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/YaoZCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangCQZY24, author = {Jiansong Zhang and Kejiang Chen and Chuan Qin and Weiming Zhang and Nenghai Yu}, title = {{AAS:} Automatic Virtual Data Augmentation for Deep Image Steganalysis}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {3515--3527}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3333913}, doi = {10.1109/TDSC.2023.3333913}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangCQZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCDYZY24, author = {Xin Zhang and Kejiang Chen and Jinyang Ding and Yuqi Yang and Weiming Zhang and Nenghai Yu}, title = {Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3148--3163}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361219}, doi = {10.1109/TIFS.2024.3361219}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCDYZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengCZZY24, author = {Kai Zeng and Kejiang Chen and Jiansong Zhang and Weiming Zhang and Nenghai Yu}, title = {Toward Secure and Robust Steganography for Black-Box Generated Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3237--3250}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3361220}, doi = {10.1109/TIFS.2024.3361220}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengCZZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanCZZZY24, author = {Zexin Fan and Kejiang Chen and Kai Zeng and Jiansong Zhang and Weiming Zhang and Nenghai Yu}, title = {Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {6636--6649}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3421893}, doi = {10.1109/TIFS.2024.3421893}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FanCZZZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/TanWLCLYY24, author = {Zhentao Tan and Yue Wu and Qiankun Liu and Qi Chu and Le Lu and Jieping Ye and Nenghai Yu}, title = {Exploring the Application of Large-Scale Pre-Trained Models on Adverse Weather Removal}, journal = {{IEEE} Trans. Image Process.}, volume = {33}, pages = {1683--1698}, year = {2024}, url = {https://doi.org/10.1109/TIP.2024.3368961}, doi = {10.1109/TIP.2024.3368961}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tip/TanWLCLYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/HuangDCZZZHCY24, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Hang Zhou and Weiming Zhang and Kui Zhang and Gang Hua and Yueqiang Cheng and Nenghai Yu}, title = {PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition}, journal = {{IEEE} Trans. Image Process.}, volume = {33}, pages = {2183--2196}, year = {2024}, url = {https://doi.org/10.1109/TIP.2024.3372456}, doi = {10.1109/TIP.2024.3372456}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/HuangDCZZZHCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/RenFZMLZY24, author = {Zhiwen Ren and Han Fang and Jie Zhang and Zehua Ma and Ronghao Lin and Weiming Zhang and Nenghai Yu}, title = {A Robust Database Watermarking Scheme That Preserves Statistical Characteristics}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {36}, number = {6}, pages = {2329--2342}, year = {2024}, url = {https://doi.org/10.1109/TKDE.2023.3324932}, doi = {10.1109/TKDE.2023.3324932}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/RenFZMLZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ZhaoLLCYC24, author = {Zhiwei Zhao and Bin Liu and Yan Lu and Qi Chu and Nenghai Yu and Chang Wen Chen}, title = {Joint Identity-Aware Mixstyle and Graph-Enhanced Prototype for Clothes-Changing Person Re-Identification}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {3457--3468}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3311143}, doi = {10.1109/TMM.2023.3311143}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/ZhaoLLCYC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/YangCZZY24, author = {Zijin Yang and Kejiang Chen and Kai Zeng and Weiming Zhang and Nenghai Yu}, title = {Provably Secure Robust Image Steganography}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {5040--5053}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3330098}, doi = {10.1109/TMM.2023.3330098}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/YangCZZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/WangLXWLYSL24, author = {Zhaoying Wang and Jian Li and Kaiping Xue and David S. L. Wei and Ruidong Li and Nenghai Yu and Qibin Sun and Jun Lu}, title = {An Efficient Scheduling Scheme of Swapping and Purification Operations for End-to-End Entanglement Distribution in Quantum Networks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {11}, number = {1}, pages = {380--391}, year = {2024}, url = {https://doi.org/10.1109/TNSE.2023.3299177}, doi = {10.1109/TNSE.2023.3299177}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/WangLXWLYSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/LiLXWYSL24, author = {Zhonghui Li and Jian Li and Kaiping Xue and David S. L. Wei and Nenghai Yu and Qibin Sun and Jun Lu}, title = {Efficient Remote Entanglement Distribution in Quantum Networks: {A} Segment-Based Method}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {1}, pages = {249--265}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2023.3296672}, doi = {10.1109/TNSM.2023.3296672}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/LiLXWYSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ChenXLLYSL24, author = {Lutong Chen and Kaiping Xue and Jian Li and Ruidong Li and Nenghai Yu and Qibin Sun and Jun Lu}, title = {{Q-DDCA:} Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {32}, number = {1}, pages = {368--381}, year = {2024}, url = {https://doi.org/10.1109/TNET.2023.3285093}, doi = {10.1109/TNET.2023.3285093}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/ChenXLLYSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ChenT0WLY24, author = {Tianxiang Chen and Zhentao Tan and Qi Chu and Yue Wu and Bin Liu and Nenghai Yu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {TCI-Former: Thermal Conduction-Inspired Transformer for Infrared Small Target Detection}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {1201--1209}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i2.27882}, doi = {10.1609/AAAI.V38I2.27882}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ChenT0WLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/WangMLYFZY24, author = {Guanjie Wang and Zehua Ma and Chang Liu and Xi Yang and Han Fang and Weiming Zhang and Nenghai Yu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {MuST: Robust Image Watermarking for Multi-Source Tracing}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {5364--5371}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i6.28344}, doi = {10.1609/AAAI.V38I6.28344}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/WangMLYFZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/YuanCH00Y24, author = {Xiaojian Yuan and Kejiang Chen and Wen Huang and Jie Zhang and Weiming Zhang and Nenghai Yu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Data-Free Hard-Label Robustness Stealing Attack}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {6853--6861}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i7.28510}, doi = {10.1609/AAAI.V38I7.28510}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/YuanCH00Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhangHLTLC00YO24, author = {Yaqi Zhang and Di Huang and Bin Liu and Shixiang Tang and Yan Lu and Lu Chen and Lei Bai and Qi Chu and Nenghai Yu and Wanli Ouyang}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {MotionGPT: Finetuned LLMs Are General-Purpose Motion Generators}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {7368--7376}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i7.28567}, doi = {10.1609/AAAI.V38I7.28567}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ZhangHLTLC00YO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhangWZZ0Y24, author = {Zhongyi Zhang and Tianyi Wei and Wenbo Zhou and Hanqing Zhao and Weiming Zhang and Nenghai Yu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {FaceRSA: RSA-Aware Facial Identity Cryptography Framework}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {7423--7431}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i7.28573}, doi = {10.1609/AAAI.V38I7.28573}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ZhangWZZ0Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhaoLL0Y24, author = {Zhiwei Zhao and Bin Liu and Yan Lu and Qi Chu and Nenghai Yu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Unifying Multi-Modal Uncertainty Modeling and Semantic Alignment for Text-to-Image Person Re-identification}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {7534--7542}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i7.28585}, doi = {10.1609/AAAI.V38I7.28585}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ZhaoLL0Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/WuCHC0Y24, author = {BenLong Wu and Kejiang Chen and Yanru He and Guoqiang Chen and Weiming Zhang and Nenghai Yu}, title = {CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation}, booktitle = {{ACM} Turing Award Celebration Conference 2024, {ACM-TURC} 2024, Changsha, China, July 5-7, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3674399.3674447}, doi = {10.1145/3674399.3674447}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/WuCHC0Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/ZhangZZ00Y24, author = {Chi Zhang and Wenbo Zhou and Kui Zhang and Jie Zhang and Weiming Zhang and Nenghai Yu}, title = {Detecting Adversarial Examples via Reconstruction-based Semantic Inconsistency}, booktitle = {{ACM} Turing Award Celebration Conference 2024, {ACM-TURC} 2024, Changsha, China, July 5-7, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3674399.3674448}, doi = {10.1145/3674399.3674448}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/ZhangZZ00Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/ZhijianZLZY24, author = {Deng Zhijian and Wenbo Zhou and Kunlin Liu and Weiming Zhang and Nenghai Yu}, title = {Temporal Optimization for Face Swapping Video based on Consistency Inheritance}, booktitle = {{ACM} Turing Award Celebration Conference 2024, {ACM-TURC} 2024, Changsha, China, July 5-7, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3674399.3674457}, doi = {10.1145/3674399.3674457}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acmturc/ZhijianZLZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ZhouC00C0Y24, author = {Wenbo Zhou and Dongdong Chen and Jing Liao and Jie Zhang and Kejiang Chen and Weiming Zhang and Nenghai Yu}, title = {Attribute-Aware Head Swapping Guided by 3d Modeling}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {2790--2794}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10446993}, doi = {10.1109/ICASSP48485.2024.10446993}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ZhouC00C0Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/XuLHLY24, author = {Zikai Xu and Bin Liu and Fei Hu and Weihai Li and Nenghai Yu}, title = {{DSIS:} {A} Novel (K, {N)} Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {3720--3724}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10445965}, doi = {10.1109/ICASSP48485.2024.10445965}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/XuLHLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ZhaoY0XY24, author = {Pengfei Zhao and Haojie Yuan and Qi Chu and Shubin Xu and Nenghai Yu}, title = {Delving Deeper Into Vulnerable Samples in Adversarial Training}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {4490--4494}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10447217}, doi = {10.1109/ICASSP48485.2024.10447217}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ZhaoY0XY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/XuLHLY24a, author = {Zikai Xu and Bin Liu and Fei Hu and Weihai Li and Nenghai Yu}, title = {{SE-SIS:} Shadow-Embeddable Lossless Secret Image Sharing for Greyscale Images}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {4775--4779}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10448082}, doi = {10.1109/ICASSP48485.2024.10448082}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/XuLHLY24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/Wang0MZZ0Y24, author = {Jiazhen Wang and Bin Liu and Changtao Miao and Zhiwei Zhao and Wanyi Zhuang and Qi Chu and Nenghai Yu}, title = {Exploiting Modality-Specific Features for Multi-Modal Manipulation Detection and Grounding}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {4935--4939}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10448385}, doi = {10.1109/ICASSP48485.2024.10448385}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/Wang0MZZ0Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WuCZHLLXY24, author = {Jiaqi Wu and Lutong Chen and Jing Zhang and Zixuan Huang and Zhonghui Li and Jian Li and Kaiping Xue and Nenghai Yu}, title = {A Distributed Routing Protocol Based on Key Reservation in Quantum Key Distribution Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {509--514}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622992}, doi = {10.1109/ICC51166.2024.10622992}, timestamp = {Mon, 02 Sep 2024 15:04:36 +0200}, biburl = {https://dblp.org/rec/conf/icc/WuCZHLLXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/ChenXLLY24, author = {Lutong Chen and Kaiping Xue and Jian Li and Zhonghui Li and Nenghai Yu}, title = {Security-Enhanced WireGuard Protocol Design Using Quantum Key Distribution}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2024, Big Island, HI, USA, February 19-22, 2024}, pages = {718--723}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICNC59896.2024.10556292}, doi = {10.1109/ICNC59896.2024.10556292}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/ChenXLLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/TanLW00YY24, author = {Zhentao Tan and Xiaodan Li and Yue Wu and Qi Chu and Le Lu and Nenghai Yu and Jieping Ye}, title = {Boosting Vanilla Lightweight Vision Transformers via Re-parameterization}, booktitle = {The Twelfth International Conference on Learning Representations, {ICLR} 2024, Vienna, Austria, May 7-11, 2024}, publisher = {OpenReview.net}, year = {2024}, url = {https://openreview.net/forum?id=3rmpixOjPS}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/TanLW00YY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/FengZH0WL00Y24, author = {Weitao Feng and Wenbo Zhou and Jiyan He and Jie Zhang and Tianyi Wei and Guanlin Li and Tianwei Zhang and Weiming Zhang and Nenghai Yu}, title = {AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA}, booktitle = {Forty-first International Conference on Machine Learning, {ICML} 2024, Vienna, Austria, July 21-27, 2024}, publisher = {OpenReview.net}, year = {2024}, url = {https://openreview.net/forum?id=8xKGZsnV2a}, timestamp = {Mon, 02 Sep 2024 16:45:29 +0200}, biburl = {https://dblp.org/rec/conf/icml/FengZH0WL00Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/Zhang00Z0Y24, author = {Kui Zhang and Hang Zhou and Jie Zhang and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Transferable Facial Privacy Protection against Blind Face Restoration via Domain-Consistent Adversarial Obfuscation}, booktitle = {Forty-first International Conference on Machine Learning, {ICML} 2024, Vienna, Austria, July 21-27, 2024}, publisher = {OpenReview.net}, year = {2024}, url = {https://openreview.net/forum?id=st2BTty53v}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/Zhang00Z0Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-01144, author = {Qi Cheng and Hongru Cao and Sian{-}Jheng Lin and Nenghai Yu}, title = {A Construction of Evolving k-threshold Secret Sharing Scheme over {A} Polynomial Ring}, journal = {CoRR}, volume = {abs/2402.01144}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.01144}, doi = {10.48550/ARXIV.2402.01144}, eprinttype = {arXiv}, eprint = {2402.01144}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-01144.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-02046, author = {Tianxiang Chen and Zhentao Tan and Qi Chu and Yue Wu and Bin Liu and Nenghai Yu}, title = {TCI-Former: Thermal Conduction-Inspired Transformer for Infrared Small Target Detection}, journal = {CoRR}, volume = {abs/2402.02046}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.02046}, doi = {10.48550/ARXIV.2402.02046}, eprinttype = {arXiv}, eprint = {2402.02046}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-02046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-02327, author = {Tianxiang Chen and Zhentao Tan and Tao Gong and Qi Chu and Yue Wu and Bin Liu and Le Lu and Jieping Ye and Nenghai Yu}, title = {Bootstrapping Audio-Visual Segmentation by Strengthening Audio Cues}, journal = {CoRR}, volume = {abs/2402.02327}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.02327}, doi = {10.48550/ARXIV.2402.02327}, eprinttype = {arXiv}, eprint = {2402.02327}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-02327.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-17465, author = {Yanghao Su and Jie Zhang and Ting Xu and Tianwei Zhang and Weiming Zhang and Nenghai Yu}, title = {Model X-ray: Detect Backdoored Models via Decision Boundary}, journal = {CoRR}, volume = {abs/2402.17465}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.17465}, doi = {10.48550/ARXIV.2402.17465}, eprinttype = {arXiv}, eprint = {2402.17465}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-17465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-18252, author = {Haoxiang Guan and Jiyan He and Shuxin Zheng and En{-}Hong Chen and Weiming Zhang and Nenghai Yu}, title = {Towards Generalist Prompting for Large Language Models by Mental Models}, journal = {CoRR}, volume = {abs/2402.18252}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.18252}, doi = {10.48550/ARXIV.2402.18252}, eprinttype = {arXiv}, eprint = {2402.18252}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-18252.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-02148, author = {Tianxiang Chen and Zhentao Tan and Tao Gong and Qi Chu and Yue Wu and Bin Liu and Jieping Ye and Nenghai Yu}, title = {MiM-ISTD: Mamba-in-Mamba for Efficient Infrared Small Target Detection}, journal = {CoRR}, volume = {abs/2403.02148}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.02148}, doi = {10.48550/ARXIV.2403.02148}, eprinttype = {arXiv}, eprint = {2403.02148}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-02148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-17524, author = {Yuang Qi and Kejiang Chen and Kai Zeng and Weiming Zhang and Nenghai Yu}, title = {Provably Secure Disambiguating Neural Linguistic Steganography}, journal = {CoRR}, volume = {abs/2403.17524}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.17524}, doi = {10.48550/ARXIV.2403.17524}, eprinttype = {arXiv}, eprint = {2403.17524}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-17524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-18403, author = {Guoqiang Chen and Xiuwei Shang and Shaoyin Cheng and Yanming Zhang and Weiming Zhang and Nenghai Yu}, title = {FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs}, journal = {CoRR}, volume = {abs/2403.18403}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.18403}, doi = {10.48550/ARXIV.2403.18403}, eprinttype = {arXiv}, eprint = {2403.18403}, timestamp = {Wed, 31 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-18403.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-00513, author = {Qiankun Liu and Yuqi Jiang and Zhentao Tan and Dongdong Chen and Ying Fu and Qi Chu and Gang Hua and Nenghai Yu}, title = {Transformer based Pluralistic Image Completion with Reduced Information Loss}, journal = {CoRR}, volume = {abs/2404.00513}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.00513}, doi = {10.48550/ARXIV.2404.00513}, eprinttype = {arXiv}, eprint = {2404.00513}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-00513.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-04956, author = {Zijin Yang and Kai Zeng and Kejiang Chen and Han Fang and Wei Ming Zhang and Nenghai Yu}, title = {Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models}, journal = {CoRR}, volume = {abs/2404.04956}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.04956}, doi = {10.48550/ARXIV.2404.04956}, eprinttype = {arXiv}, eprint = {2404.04956}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-04956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-09836, author = {Xiuwei Shang and Shaoyin Cheng and Guoqiang Chen and Yanming Zhang and Li Hu and Xiao Yu and Gangyang Li and Weiming Zhang and Nenghai Yu}, title = {How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models}, journal = {CoRR}, volume = {abs/2404.09836}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.09836}, doi = {10.48550/ARXIV.2404.09836}, eprinttype = {arXiv}, eprint = {2404.09836}, timestamp = {Wed, 31 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-09836.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-11962, author = {Chao Zhou and Huishuai Zhang and Jiang Bian and Weiming Zhang and Nenghai Yu}, title = {{\textbackslash}copyright Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model}, journal = {CoRR}, volume = {abs/2404.11962}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.11962}, doi = {10.48550/ARXIV.2404.11962}, eprinttype = {arXiv}, eprint = {2404.11962}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-11962.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-04936, author = {Zhiwen Ren and Zehua Ma and Weiming Zhang and Nenghai Yu}, title = {{SPSW:} Database Watermarking Based on Fake Tuples and Sparse Priority Strategy}, journal = {CoRR}, volume = {abs/2405.04936}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.04936}, doi = {10.48550/ARXIV.2405.04936}, eprinttype = {arXiv}, eprint = {2405.04936}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-04936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-11135, author = {Weitao Feng and Wenbo Zhou and Jiyan He and Jie Zhang and Tianyi Wei and Guanlin Li and Tianwei Zhang and Weiming Zhang and Nenghai Yu}, title = {AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA}, journal = {CoRR}, volume = {abs/2405.11135}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.11135}, doi = {10.48550/ARXIV.2405.11135}, eprinttype = {arXiv}, eprint = {2405.11135}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-11135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-01884, author = {Xinghui Zhou and Wenbo Zhou and Tianyi Wei and Shen Chen and Taiping Yao and Shouhong Ding and Weiming Zhang and Nenghai Yu}, title = {Rank-based No-reference Quality Assessment for Face Swapping}, journal = {CoRR}, volume = {abs/2406.01884}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.01884}, doi = {10.48550/ARXIV.2406.01884}, eprinttype = {arXiv}, eprint = {2406.01884}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-01884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-19079, author = {Ziyuan Fang and Hanqing Zhao and Tianyi Wei and Wenbo Zhou and Ming Wan and Zhanyi Wang and Weiming Zhang and Nenghai Yu}, title = {UniForensics: Face Forgery Detection via General Facial Representation}, journal = {CoRR}, volume = {abs/2407.19079}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.19079}, doi = {10.48550/ARXIV.2407.19079}, eprinttype = {arXiv}, eprint = {2407.19079}, timestamp = {Sat, 24 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-19079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-02306, author = {Changtao Miao and Qi Chu and Tao Gong and Zhentao Tan and Zhenchao Jin and Wanyi Zhuang and Man Luo and Honggang Hu and Nenghai Yu}, title = {Mixture-of-Noises Enhanced Forgery-Aware Predictor for Multi-Face Manipulation Detection and Localization}, journal = {CoRR}, volume = {abs/2408.02306}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.02306}, doi = {10.48550/ARXIV.2408.02306}, eprinttype = {arXiv}, eprint = {2408.02306}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-02306.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-08310, author = {Ruihang Li and Yixuan Wei and Miaosen Zhang and Nenghai Yu and Han Hu and Houwen Peng}, title = {ScalingFilter: Assessing Data Quality through Inverse Utilization of Scaling Laws}, journal = {CoRR}, volume = {abs/2408.08310}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.08310}, doi = {10.48550/ARXIV.2408.08310}, eprinttype = {arXiv}, eprint = {2408.08310}, timestamp = {Mon, 23 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-08310.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/WangLXLYLLSL23, author = {Mingjun Wang and Jian Li and Kaiping Xue and Ruidong Li and Nenghai Yu and Yangyang Li and Yifeng Liu and Qibin Sun and Jun Lu}, title = {A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {12}, pages = {184--190}, year = {2023}, url = {https://doi.org/10.1109/MCOM.010.2200672}, doi = {10.1109/MCOM.010.2200672}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/WangLXLYLLSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/LiXLCLWYWSL23, author = {Zhonghui Li and Kaiping Xue and Jian Li and Lutong Chen and Ruidong Li and Zhaoying Wang and Nenghai Yu and David S. L. Wei and Qibin Sun and Jun Lu}, title = {Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {4}, pages = {2133--2189}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3294240}, doi = {10.1109/COMST.2023.3294240}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/LiXLCLWYWSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/LiFSZLYLYS23, author = {Zhipeng Li and Shanshan Feng and Jun Shi and Yang Zhou and Yong Liao and Yangzhao Yang and Yangyang Li and Nenghai Yu and Xun Shao}, title = {Future Event Prediction Based on Temporal Knowledge Graph Embedding}, journal = {Comput. Syst. Sci. Eng.}, volume = {44}, number = {3}, pages = {2411--2423}, year = {2023}, url = {https://doi.org/10.32604/csse.2023.026823}, doi = {10.32604/CSSE.2023.026823}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/LiFSZLYLYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/LiuZZGTZY23, author = {Kunlin Liu and Wenbo Zhou and Zhenyu Zhang and Yanhao Ge and Hao Tang and Weiming Zhang and Nenghai Yu}, title = {Measuring the Consistency and Diversity of 3D Face Generation}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {17}, number = {6}, pages = {1208--1220}, year = {2023}, url = {https://doi.org/10.1109/JSTSP.2023.3273781}, doi = {10.1109/JSTSP.2023.3273781}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jstsp/LiuZZGTZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenXLYLSL23, author = {Lutong Chen and Kaiping Xue and Jian Li and Nenghai Yu and Ruidong Li and Qibin Sun and Jun Lu}, title = {SimQN: {A} Network-Layer Simulator for the Quantum Network Investigation}, journal = {{IEEE} Netw.}, volume = {37}, number = {5}, pages = {182--189}, year = {2023}, url = {https://doi.org/10.1109/MNET.130.2200481}, doi = {10.1109/MNET.130.2200481}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenXLYLSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/TanCCCLLLHY23, author = {Zhentao Tan and Qi Chu and Menglei Chai and Dongdong Chen and Jing Liao and Qiankun Liu and Bin Liu and Gang Hua and Nenghai Yu}, title = {Semantic Probability Distribution Modeling for Diverse Semantic Image Synthesis}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {45}, number = {5}, pages = {6247--6264}, year = {2023}, url = {https://doi.org/10.1109/TPAMI.2022.3210085}, doi = {10.1109/TPAMI.2022.3210085}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/TanCCCLLLHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiuZCFBLZY23, author = {Honggu Liu and Wenbo Zhou and Dongdong Chen and Han Fang and Huanyu Bian and Kunlin Liu and Weiming Zhang and Nenghai Yu}, title = {Coherent adversarial deepfake video generation}, journal = {Signal Process.}, volume = {203}, pages = {108790}, year = {2023}, url = {https://doi.org/10.1016/j.sigpro.2022.108790}, doi = {10.1016/J.SIGPRO.2022.108790}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LiuZCFBLZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YangZFMY23, author = {Xi Yang and Weiming Zhang and Han Fang and Zehua Ma and Nenghai Yu}, title = {Language universal font watermarking with multiple cross-media robustness}, journal = {Signal Process.}, volume = {203}, pages = {108791}, year = {2023}, url = {https://doi.org/10.1016/j.sigpro.2022.108791}, doi = {10.1016/J.SIGPRO.2022.108791}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/YangZFMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiYY23, author = {Lincong Li and Yuanzhi Yao and Nenghai Yu}, title = {High-fidelity video reversible data hiding using joint spatial and temporal prediction}, journal = {Signal Process.}, volume = {208}, pages = {108970}, year = {2023}, url = {https://doi.org/10.1016/j.sigpro.2023.108970}, doi = {10.1016/J.SIGPRO.2023.108970}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/LiYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ZhaZYF23, author = {Hongyue Zha and Weiming Zhang and Nenghai Yu and Zexin Fan}, title = {Enhancing image steganography via adversarial optimization of the stego distribution}, journal = {Signal Process.}, volume = {212}, pages = {109155}, year = {2023}, url = {https://doi.org/10.1016/j.sigpro.2023.109155}, doi = {10.1016/J.SIGPRO.2023.109155}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/ZhaZYF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/QinCCDZMHY23, author = {Chuan Qin and Yuefeng Chen and Kejiang Chen and Xiaoyi Dong and Weiming Zhang and Xiaofeng Mao and Yuan He and Nenghai Yu}, title = {Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {4}, number = {5}, pages = {1029--1040}, year = {2023}, url = {https://doi.org/10.1109/TAI.2022.3190816}, doi = {10.1109/TAI.2022.3190816}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tai/QinCCDZMHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ChengYLY23, author = {Qi Cheng and Wei Yan and Sian{-}Jheng Lin and Nenghai Yu}, title = {Some Results for the Redundancy Bound of the Optimal Ternary {AIFV} Codes}, journal = {{IEEE} Trans. Commun.}, volume = {71}, number = {6}, pages = {3288--3300}, year = {2023}, url = {https://doi.org/10.1109/TCOMM.2023.3265413}, doi = {10.1109/TCOMM.2023.3265413}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/ChengYLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZengCZWY23, author = {Kai Zeng and Kejiang Chen and Weiming Zhang and Yaofei Wang and Nenghai Yu}, title = {Robust Steganography for High Quality Images}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {9}, pages = {4893--4906}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2023.3250750}, doi = {10.1109/TCSVT.2023.3250750}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ZengCZWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenZWLZY23, author = {Kejiang Chen and Hang Zhou and Yaofei Wang and Menghan Li and Weiming Zhang and Nenghai Yu}, title = {Cover Reproducible Steganography via Deep Generative Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {3787--3798}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3217569}, doi = {10.1109/TDSC.2022.3217569}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenZWLZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenGZY23, author = {Kaimeng Chen and Qingxiao Guan and Weiming Zhang and Nenghai Yu}, title = {Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4519--4535}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3228385}, doi = {10.1109/TDSC.2022.3228385}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChenGZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MiaoTCLHY23, author = {Changtao Miao and Zichang Tan and Qi Chu and Huan Liu and Honggang Hu and Nenghai Yu}, title = {F\({}^{\mbox{2}}\)Trans: High-Frequency Fine-Grained Transformer for Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {1039--1051}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3233774}, doi = {10.1109/TIFS.2022.3233774}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MiaoTCLHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/YuanCZZLY23, author = {Haojie Yuan and Qi Chu and Feng Zhu and Rui Zhao and Bin Liu and Nenghai Yu}, title = {AutoMA: Towards Automatic Model Augmentation for Transferable Adversarial Attacks}, journal = {{IEEE} Trans. Multim.}, volume = {25}, pages = {203--213}, year = {2023}, url = {https://doi.org/10.1109/TMM.2021.3124083}, doi = {10.1109/TMM.2021.3124083}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/YuanCZZLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/MaYFZY23, author = {Zehua Ma and Xi Yang and Han Fang and Weiming Zhang and Nenghai Yu}, title = {OAcode: Overall Aesthetic 2D Barcode on Screen}, journal = {{IEEE} Trans. Multim.}, volume = {25}, pages = {8687--8698}, year = {2023}, url = {https://doi.org/10.1109/TMM.2023.3239755}, doi = {10.1109/TMM.2023.3239755}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/MaYFZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/LiLXWLYSL23, author = {Zhonghui Li and Jian Li and Kaiping Xue and David S. L. Wei and Ruidong Li and Nenghai Yu and Qibin Sun and Jun Lu}, title = {Swapping-Based Entanglement Routing Design for Congestion Mitigation in Quantum Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {4}, pages = {3999--4012}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3275815}, doi = {10.1109/TNSM.2023.3275815}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/LiLXWLYSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/Chen0000CHY23, author = {Haozhe Chen and Hang Zhou and Jie Zhang and Dongdong Chen and Weiming Zhang and Kejiang Chen and Gang Hua and Nenghai Yu}, title = {Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {19}, number = {3}, pages = {123:1--123:20}, year = {2023}, url = {https://doi.org/10.1145/3572777}, doi = {10.1145/3572777}, timestamp = {Mon, 07 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/Chen0000CHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/DongBZC0YC0YG23, author = {Xiaoyi Dong and Jianmin Bao and Ting Zhang and Dongdong Chen and Weiming Zhang and Lu Yuan and Dong Chen and Fang Wen and Nenghai Yu and Baining Guo}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {PeCo: Perceptual Codebook for {BERT} Pre-training of Vision Transformers}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {552--560}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i1.25130}, doi = {10.1609/AAAI.V37I1.25130}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/DongBZC0YC0YG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/YangZFLMZY23, author = {Xi Yang and Jie Zhang and Han Fang and Chang Liu and Zehua Ma and Weiming Zhang and Nenghai Yu}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {AutoStegaFont: Synthesizing Vector Fonts for Hiding Information in Documents}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {3198--3205}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i3.25425}, doi = {10.1609/AAAI.V37I3.25425}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/YangZFLMZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/YuanCZ0YZ23, author = {Xiaojian Yuan and Kejiang Chen and Jie Zhang and Weiming Zhang and Nenghai Yu and Yang Zhang}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {3349--3357}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i3.25442}, doi = {10.1609/AAAI.V37I3.25442}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/YuanCZ0YZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/Liu0FMZY23, author = {Chang Liu and Jie Zhang and Han Fang and Zehua Ma and Weiming Zhang and Nenghai Yu}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {DeAR: {A} Deep-Learning-Based Audio Re-recording Resilient Watermarking}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {13201--13209}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i11.26550}, doi = {10.1609/AAAI.V37I11.26550}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/Liu0FMZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/HuangDC0W0Y23, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Weiming Zhang and Feifei Wang and Gang Hua and Nenghai Yu}, title = {Diversity-Aware Meta Visual Prompting}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {10878--10887}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.01047}, doi = {10.1109/CVPR52729.2023.01047}, timestamp = {Thu, 11 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/HuangDC0W0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/DongBZZCY00YC0Y23, author = {Xiaoyi Dong and Jianmin Bao and Yinglin Zheng and Ting Zhang and Dongdong Chen and Hao Yang and Ming Zeng and Weiming Zhang and Lu Yuan and Dong Chen and Fang Wen and Nenghai Yu}, title = {MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {10995--11005}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.01058}, doi = {10.1109/CVPR52729.2023.01058}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/DongBZZCY00YC0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/ChengLY23, author = {Qi Cheng and Sian{-}Jheng Lin and Nenghai Yu}, editor = {Ali Bilgin and Michael W. Marcellin and Joan Serra{-}Sagrist{\`{a}} and James A. Storer}, title = {Compressing the Trees of Canonical Binary {AIFV} Coding}, booktitle = {Data Compression Conference, {DCC} 2023, Snowbird, UT, USA, March 21-24, 2023}, pages = {335}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DCC55655.2023.00050}, doi = {10.1109/DCC55655.2023.00050}, timestamp = {Mon, 29 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dcc/ChengLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ChenCTLY23, author = {Tianxiang Chen and Qi Chu and Zhentao Tan and Bin Liu and Nenghai Yu}, title = {BAUENet: Boundary-Aware Uncertainty Enhanced Network for Infrared Small Target Detection}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10096810}, doi = {10.1109/ICASSP49357.2023.10096810}, timestamp = {Sun, 05 Nov 2023 16:51:21 +0100}, biburl = {https://dblp.org/rec/conf/icassp/ChenCTLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/FanCQZZY23, author = {Zexin Fan and Kejiang Chen and Chuan Qin and Kai Zeng and Weiming Zhang and Nenghai Yu}, title = {Image Adversarial Steganography Based on Joint Distortion}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10097112}, doi = {10.1109/ICASSP49357.2023.10097112}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/FanCQZZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LiuLCLY23, author = {Siying Liu and Qiankun Liu and Qi Chu and Bin Liu and Nenghai Yu}, title = {Dual-Feature Enhancement for Weakly Supervised Temporal Action Localization}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10096383}, doi = {10.1109/ICASSP49357.2023.10096383}, timestamp = {Sun, 05 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/LiuLCLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LiuLZCY23, author = {Zhangping Liu and Bin Liu and Zhiwei Zhao and Qi Chu and Nenghai Yu}, title = {Dual-Uncertainty Guided Curriculum Learning and Part-Aware Feature Refinement for Domain Adaptive Person Re-Identification}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10097020}, doi = {10.1109/ICASSP49357.2023.10097020}, timestamp = {Sun, 05 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/LiuLZCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WangWCDZY23, author = {Xilong Wang and Yaofei Wang and Kejiang Chen and Jinyang Ding and Weiming Zhang and Nenghai Yu}, title = {ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10095722}, doi = {10.1109/ICASSP49357.2023.10095722}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/WangWCDZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ZhangLLZCY23, author = {Yaqi Zhang and Yan Lu and Bin Liu and Zhiwei Zhao and Qi Chu and Nenghai Yu}, title = {Evopose: {A} Recursive Transformer for 3D Human Pose Estimation with Kinematic Structure Priors}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10095302}, doi = {10.1109/ICASSP49357.2023.10095302}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ZhangLLZCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/HuangD0CY00Y23, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Yinpeng Chen and Lu Yuan and Gang Hua and Weiming Zhang and Nenghai Yu}, title = {Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {1600--1610}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.00154}, doi = {10.1109/ICCV51070.2023.00154}, timestamp = {Fri, 19 Jan 2024 17:50:41 +0100}, biburl = {https://dblp.org/rec/conf/iccv/HuangD0CY00Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/Wei0Z000Y23, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Weiming Zhang and Gang Hua and Nenghai Yu}, title = {HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {23532--23542}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.02156}, doi = {10.1109/ICCV51070.2023.02156}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccv/Wei0Z000Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/ZhaoCMLY23, author = {Xuanpu Zhao and Qi Chu and Changtao Miao and Bin Liu and Nenghai Yu}, editor = {Huchuan Lu and Wanli Ouyang and Hui Huang and Jiwen Lu and Risheng Liu and Jing Dong and Min Xu}, title = {Revisiting {TENT} for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment}, booktitle = {Image and Graphics - 12th International Conference, {ICIG} 2023, Nanjing, China, September 22-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14357}, pages = {66--77}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46311-2\_6}, doi = {10.1007/978-3-031-46311-2\_6}, timestamp = {Thu, 09 Nov 2023 15:01:08 +0100}, biburl = {https://dblp.org/rec/conf/icig/ZhaoCMLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/XuCYLLY23, author = {Yinhu Xu and Qi Chu and Haojie Yuan and Zixiang Luo and Bin Liu and Nenghai Yu}, editor = {Huchuan Lu and Wanli Ouyang and Hui Huang and Jiwen Lu and Risheng Liu and Jing Dong and Min Xu}, title = {Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape}, booktitle = {Image and Graphics - 12th International Conference, {ICIG} 2023, Nanjing, China, September 22-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14355}, pages = {254--266}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46305-1\_21}, doi = {10.1007/978-3-031-46305-1\_21}, timestamp = {Thu, 09 Nov 2023 15:01:07 +0100}, biburl = {https://dblp.org/rec/conf/icig/XuCYLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ChenYY23, author = {Yiling Chen and Yuanzhi Yao and Nenghai Yu}, title = {Image Translation-Based Deniable Encryption against Model Extraction Attack}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2023, Kuala Lumpur, Malaysia, October 8-11, 2023}, pages = {1330--1334}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIP49359.2023.10222389}, doi = {10.1109/ICIP49359.2023.10222389}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/ChenYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiuBHZTZY23, author = {Honggu Liu and Paolo Bestagini and Lin Huang and Wenbo Zhou and Stefano Tubaro and Weiming Zhang and Nenghai Yu}, title = {It Wasn't Me: Irregular Identity in Deepfake Videos}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2023, Kuala Lumpur, Malaysia, October 8-11, 2023}, pages = {2770--2774}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIP49359.2023.10222654}, doi = {10.1109/ICIP49359.2023.10222654}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/LiuBHZTZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/HeLYZKLBY023, author = {Jiyan He and Xuechen Li and Da Yu and Huishuai Zhang and Janardhan Kulkarni and Yin Tat Lee and Arturs Backurs and Nenghai Yu and Jiang Bian}, title = {Exploring the Limits of Differentially Private Deep Learning with Group-wise Clipping}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/forum?id=oze0clVGPeX}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/HeLYZKLBY023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/Luo0LLY23, author = {Zixiang Luo and Qi Chu and Qiankun Liu and Bin Liu and Nenghai Yu}, title = {A Simple Masked Autoencoder Paradigm for Point Cloud}, booktitle = {{IEEE} International Conference on Multimedia and Expo Workshops, {ICMEW} Workshops 2023, Brisbane, Australia, July 10-14, 2023}, pages = {393--398}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICMEW59549.2023.00074}, doi = {10.1109/ICMEW59549.2023.00074}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/Luo0LLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/ChenCTLY23, author = {Tianxiang Chen and Qi Chu and Zhentao Tan and Bin Liu and Nenghai Yu}, title = {ABMNet: Coupling Transformer with {CNN} Based on Adams-Bashforth-Moulton Method for Infrared Small Target Detection}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023, Brisbane, Australia, July 10-14, 2023}, pages = {1901--1906}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICME55011.2023.00326}, doi = {10.1109/ICME55011.2023.00326}, timestamp = {Tue, 05 Sep 2023 20:33:33 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/ChenCTLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ZhaoSBC0WY0Z00Y23, author = {Hanqing Zhao and Dianmo Sheng and Jianmin Bao and Dongdong Chen and Dong Chen and Fang Wen and Lu Yuan and Ce Liu and Wenbo Zhou and Qi Chu and Weiming Zhang and Nenghai Yu}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using {CLIP} and StableDiffusion}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {42098--42109}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/zhao23f.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/ZhaoSBC0WY0Z00Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoC0Y0Y23, author = {Na Zhao and Kejiang Chen and Chuan Qin and Yi Yin and Weiming Zhang and Nenghai Yu}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Calibration-based Steganalysis for Neural Network Steganography}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {91--96}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595100}, doi = {10.1145/3577163.3595100}, timestamp = {Sun, 04 Aug 2024 19:41:17 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoC0Y0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/Chen00Y23, author = {Tianxiang Chen and Qi Chu and Bin Liu and Nenghai Yu}, title = {Fluid Dynamics-Inspired Network for Infrared Small Target Detection}, booktitle = {Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, {IJCAI} 2023, 19th-25th August 2023, Macao, SAR, China}, pages = {590--598}, publisher = {ijcai.org}, year = {2023}, url = {https://doi.org/10.24963/ijcai.2023/66}, doi = {10.24963/IJCAI.2023/66}, timestamp = {Mon, 28 Aug 2023 17:23:07 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/Chen00Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/LiuLZFB0CTY0023, author = {Honggu Liu and Xiaodan Li and Wenbo Zhou and Han Fang and Paolo Bestagini and Weiming Zhang and Yuefeng Chen and Stefano Tubaro and Nenghai Yu and Yuan He and Hui Xue}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {BiFPro: {A} Bidirectional Facial-data Protection Framework against DeepFake}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {7075--7084}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3613752}, doi = {10.1145/3581783.3613752}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/mm/LiuLZFB0CTY0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/HeCCMZ0BFZY23, author = {Yanru He and Kejiang Chen and Guoqiang Chen and Zehua Ma and Kui Zhang and Jie Zhang and Huanyu Bian and Han Fang and Weiming Zhang and Nenghai Yu}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {ProTegO: Protect Text Content against {OCR} Extraction Attack}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {7424--7434}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612076}, doi = {10.1145/3581783.3612076}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/HeCCMZ0BFZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ZhangZZHZY23, author = {Kui Zhang and Hang Zhou and Jie Zhang and Qidong Huang and Weiming Zhang and Nenghai Yu}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {8849--8859}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612018}, doi = {10.1145/3581783.3612018}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/ZhangZZHZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DingCWZZY23, author = {Jinyang Ding and Kejiang Chen and Yaofei Wang and Na Zhao and Weiming Zhang and Nenghai Yu}, title = {Discop: Provably Secure Steganography in Practice Based on "Distribution Copies"}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2238--2255}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179287}, doi = {10.1109/SP46215.2023.10179287}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DingCWZZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RenM0Y23, author = {Zhiwen Ren and Zehua Ma and Weiming Zhang and Nenghai Yu}, editor = {Jia Hu and Geyong Min and Guojun Wang and Nektarios Georgalas}, title = {{SPSW:} Database Watermarking Based on Fake Tuples and Sparse Priority Strategy}, booktitle = {22nd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023}, pages = {896--903}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00128}, doi = {10.1109/TRUSTCOM60117.2023.00128}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RenM0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-03251, author = {Huanyu Bian and Zhilong Jia and Menghan Dou and Yuan Fang and Lei Li and Yiming Zhao and Hanchao Wang and Zhaohui Zhou and Wei Wang and Wenyu Zhu and Ye Li and Yang Yang and Weiming Zhang and Nenghai Yu and Zhaoyun Chen and Guoping Guo}, title = {VQNet 2.0: {A} New Generation Machine Learning Framework that Unifies Classical and Quantum}, journal = {CoRR}, volume = {abs/2301.03251}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.03251}, doi = {10.48550/ARXIV.2301.03251}, eprinttype = {arXiv}, eprint = {2301.03251}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-03251.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-02396, author = {Zehua Ma and Xi Yang and Han Fang and Weiming Zhang and Nenghai Yu}, title = {OAcode: Overall Aesthetic 2D Barcode on Screen}, journal = {CoRR}, volume = {abs/2302.02396}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.02396}, doi = {10.48550/ARXIV.2302.02396}, eprinttype = {arXiv}, eprint = {2302.02396}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-02396.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09814, author = {Xiaojian Yuan and Kejiang Chen and Jie Zhang and Weiming Zhang and Nenghai Yu and Yang Zhang}, title = {Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network}, journal = {CoRR}, volume = {abs/2302.09814}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09814}, doi = {10.48550/ARXIV.2302.09814}, eprinttype = {arXiv}, eprint = {2302.09814}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09814.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-05830, author = {Xilong Wang and Yaofei Wang and Kejiang Chen and Jinyang Ding and Weiming Zhang and Nenghai Yu}, title = {ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography}, journal = {CoRR}, volume = {abs/2303.05830}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.05830}, doi = {10.48550/ARXIV.2303.05830}, eprinttype = {arXiv}, eprint = {2303.05830}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-05830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-08138, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Weiming Zhang and Feifei Wang and Gang Hua and Nenghai Yu}, title = {Diversity-Aware Meta Visual Prompting}, journal = {CoRR}, volume = {abs/2303.08138}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.08138}, doi = {10.48550/ARXIV.2303.08138}, eprinttype = {arXiv}, eprint = {2303.08138}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-08138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-14613, author = {Yuchen Sun and Tianpeng Liu and Panhe Hu and Qing Liao and Shouling Ji and Nenghai Yu and Deke Guo and Li Liu}, title = {Deep Intellectual Property: {A} Survey}, journal = {CoRR}, volume = {abs/2304.14613}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.14613}, doi = {10.48550/ARXIV.2304.14613}, eprinttype = {arXiv}, eprint = {2304.14613}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-14613.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-06145, author = {Xulin Li and Yan Lu and Bin Liu and Yuenan Hou and Yating Liu and Qi Chu and Wanli Ouyang and Nenghai Yu}, title = {Clothes-Invariant Feature Learning by Causal Intervention for Clothes-Changing Person Re-identification}, journal = {CoRR}, volume = {abs/2305.06145}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.06145}, doi = {10.48550/ARXIV.2305.06145}, eprinttype = {arXiv}, eprint = {2305.06145}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-06145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-08883, author = {Xi Yang and Kejiang Chen and Weiming Zhang and Chang Liu and Yuang Qi and Jie Zhang and Han Fang and Nenghai Yu}, title = {Watermarking Text Generated by Black-Box Language Models}, journal = {CoRR}, volume = {abs/2305.08883}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.08883}, doi = {10.48550/ARXIV.2305.08883}, eprinttype = {arXiv}, eprint = {2305.08883}, timestamp = {Sun, 30 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-08883.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-10794, author = {Changtao Miao and Qi Chu and Zhentao Tan and Zhenchao Jin and Wanyi Zhuang and Yue Wu and Bin Liu and Honggang Hu and Nenghai Yu}, title = {Multi-spectral Class Center Network for Face Manipulation Detection and Localization}, journal = {CoRR}, volume = {abs/2305.10794}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.10794}, doi = {10.48550/ARXIV.2305.10794}, eprinttype = {arXiv}, eprint = {2305.10794}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-10794.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-12519, author = {Xiao Yu and Yuang Qi and Kejiang Chen and Guoqiang Chen and Xi Yang and Pengyuan Zhu and Weiming Zhang and Nenghai Yu}, title = {{GPT} Paternity Test: {GPT} Generated Text Detection with {GPT} Genetic Inheritance}, journal = {CoRR}, volume = {abs/2305.12519}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.12519}, doi = {10.48550/ARXIV.2305.12519}, eprinttype = {arXiv}, eprint = {2305.12519}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-12519.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-05390, author = {Qinhong Yang and Dongdong Chen and Zhentao Tan and Qiankun Liu and Qi Chu and Jianmin Bao and Lu Yuan and Gang Hua and Nenghai Yu}, title = {{HQ-50K:} {A} Large-scale, High-quality Dataset for Image Restoration}, journal = {CoRR}, volume = {abs/2306.05390}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.05390}, doi = {10.48550/ARXIV.2306.05390}, eprinttype = {arXiv}, eprint = {2306.05390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-05390.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-09008, author = {Zhentao Tan and Yue Wu and Qiankun Liu and Qi Chu and Le Lu and Jieping Ye and Nenghai Yu}, title = {Exploring the Application of Large-scale Pre-trained Models on Adverse Weather Removal}, journal = {CoRR}, volume = {abs/2306.09008}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.09008}, doi = {10.48550/ARXIV.2306.09008}, eprinttype = {arXiv}, eprint = {2306.09008}, timestamp = {Tue, 20 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-09008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-09615, author = {Yaqi Zhang and Yan Lu and Bin Liu and Zhiwei Zhao and Qi Chu and Nenghai Yu}, title = {{EVOPOSE:} {A} Recursive Transformer For 3D Human Pose Estimation With Kinematic Structure Priors}, journal = {CoRR}, volume = {abs/2306.09615}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.09615}, doi = {10.48550/ARXIV.2306.09615}, eprinttype = {arXiv}, eprint = {2306.09615}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-09615.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-10900, author = {Yaqi Zhang and Di Huang and Bin Liu and Shixiang Tang and Yan Lu and Lu Chen and Lei Bai and Qi Chu and Nenghai Yu and Wanli Ouyang}, title = {MotionGPT: Finetuned LLMs are General-Purpose Motion Generators}, journal = {CoRR}, volume = {abs/2306.10900}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.10900}, doi = {10.48550/ARXIV.2306.10900}, eprinttype = {arXiv}, eprint = {2306.10900}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-10900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10315, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Yinpeng Chen and Lu Yuan and Gang Hua and Weiming Zhang and Nenghai Yu}, title = {Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting}, journal = {CoRR}, volume = {abs/2308.10315}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10315}, doi = {10.48550/ARXIV.2308.10315}, eprinttype = {arXiv}, eprint = {2308.10315}, timestamp = {Thu, 11 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10315.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-12141, author = {Zhe Lei and Jie Zhang and Jingtao Li and Weiming Zhang and Nenghai Yu}, title = {Aparecium: Revealing Secrets from Physical Photographs}, journal = {CoRR}, volume = {abs/2308.12141}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.12141}, doi = {10.48550/ARXIV.2308.12141}, eprinttype = {arXiv}, eprint = {2308.12141}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-12141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-05940, author = {Weitao Feng and Jiyan He and Jie Zhang and Tianwei Zhang and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking}, journal = {CoRR}, volume = {abs/2309.05940}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.05940}, doi = {10.48550/ARXIV.2309.05940}, eprinttype = {arXiv}, eprint = {2309.05940}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-05940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-12657, author = {Jiazhen Wang and Bin Liu and Changtao Miao and Zhiwei Zhao and Wanyi Zhuang and Qi Chu and Nenghai Yu}, title = {Exploiting Modality-Specific Features For Multi-Modal Manipulation Detection And Grounding}, journal = {CoRR}, volume = {abs/2309.12657}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.12657}, doi = {10.48550/ARXIV.2309.12657}, eprinttype = {arXiv}, eprint = {2309.12657}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-12657.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-10651, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Weiming Zhang and Gang Hua and Nenghai Yu}, title = {HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending}, journal = {CoRR}, volume = {abs/2310.10651}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.10651}, doi = {10.48550/ARXIV.2310.10651}, eprinttype = {arXiv}, eprint = {2310.10651}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-10651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-12214, author = {Meng Tong and Kejiang Chen and Yuang Qi and Jie Zhang and Weiming Zhang and Nenghai Yu}, title = {PrivInfer: Privacy-Preserving Inference for Black-box Large Language Model}, journal = {CoRR}, volume = {abs/2310.12214}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.12214}, doi = {10.48550/ARXIV.2310.12214}, eprinttype = {arXiv}, eprint = {2310.12214}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-12214.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-16061, author = {Zhiling Zhang and Jie Zhang and Kui Zhang and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World}, journal = {CoRR}, volume = {abs/2310.16061}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.16061}, doi = {10.48550/ARXIV.2310.16061}, eprinttype = {arXiv}, eprint = {2310.16061}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-16061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-09535, author = {Shuai Li and Kejiang Chen and Kunsheng Tang and Wen Huang and Jie Zhang and Weiming Zhang and Nenghai Yu}, title = {FunctionMarker: Watermarking Language Datasets via Knowledge Injection}, journal = {CoRR}, volume = {abs/2311.09535}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.09535}, doi = {10.48550/ARXIV.2311.09535}, eprinttype = {arXiv}, eprint = {2311.09535}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-09535.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-13263, author = {Yaqi Liu and Chao Xia and Song Xiao and Qingxiao Guan and Wenqian Dong and Yifan Zhang and Nenghai Yu}, title = {CMFDFormer: Transformer-based Copy-Move Forgery Detection with Continual Learning}, journal = {CoRR}, volume = {abs/2311.13263}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.13263}, doi = {10.48550/ARXIV.2311.13263}, eprinttype = {arXiv}, eprint = {2311.13263}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-13263.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-17911, author = {Qidong Huang and Xiaoyi Dong and Pan Zhang and Bin Wang and Conghui He and Jiaqi Wang and Dahua Lin and Weiming Zhang and Nenghai Yu}, title = {{OPERA:} Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation}, journal = {CoRR}, volume = {abs/2311.17911}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.17911}, doi = {10.48550/ARXIV.2311.17911}, eprinttype = {arXiv}, eprint = {2311.17911}, timestamp = {Sat, 17 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-17911.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-02520, author = {Dianmo Sheng and Dongdong Chen and Zhentao Tan and Qiankun Liu and Qi Chu and Jianmin Bao and Tao Gong and Bin Liu and Shengwei Xu and Nenghai Yu}, title = {Towards More Unified In-context Visual Understanding}, journal = {CoRR}, volume = {abs/2312.02520}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.02520}, doi = {10.48550/ARXIV.2312.02520}, eprinttype = {arXiv}, eprint = {2312.02520}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-02520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-03410, author = {Chang Liu and Jie Zhang and Tianwei Zhang and Xi Yang and Weiming Zhang and Nenghai Yu}, title = {Detecting Voice Cloning Attacks via Timbre Watermarking}, journal = {CoRR}, volume = {abs/2312.03410}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.03410}, doi = {10.48550/ARXIV.2312.03410}, eprinttype = {arXiv}, eprint = {2312.03410}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-03410.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-05924, author = {Xiaojian Yuan and Kejiang Chen and Wen Huang and Jie Zhang and Weiming Zhang and Nenghai Yu}, title = {Data-Free Hard-Label Robustness Stealing Attack}, journal = {CoRR}, volume = {abs/2312.05924}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.05924}, doi = {10.48550/ARXIV.2312.05924}, eprinttype = {arXiv}, eprint = {2312.05924}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-05924.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-06488, author = {Na Zhao and Kejiang Chen and Weiming Zhang and Nenghai Yu}, title = {Performance-lossless Black-box Model Watermarking}, journal = {CoRR}, volume = {abs/2312.06488}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.06488}, doi = {10.48550/ARXIV.2312.06488}, eprinttype = {arXiv}, eprint = {2312.06488}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-06488.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-06632, author = {Jiyan He and Weitao Feng and Yaosen Min and Jingwei Yi and Kunsheng Tang and Shuai Li and Jie Zhang and Kejiang Chen and Wenbo Zhou and Xing Xie and Weiming Zhang and Nenghai Yu and Shuxin Zheng}, title = {Control Risk for Potential Misuse of Artificial Intelligence in Science}, journal = {CoRR}, volume = {abs/2312.06632}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.06632}, doi = {10.48550/ARXIV.2312.06632}, eprinttype = {arXiv}, eprint = {2312.06632}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-06632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-09669, author = {Jiawei Zhao and Kejiang Chen and Xiaojian Yuan and Yuang Qi and Weiming Zhang and Nenghai Yu}, title = {Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models}, journal = {CoRR}, volume = {abs/2312.09669}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.09669}, doi = {10.48550/ARXIV.2312.09669}, eprinttype = {arXiv}, eprint = {2312.09669}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-09669.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangZBZY22, author = {Kui Zhang and Hang Zhou and Huanyu Bian and Weiming Zhang and Nenghai Yu}, title = {Certified defense against patch attacks via mask-guided randomized smoothing}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {7}, pages = {1--12}, year = {2022}, url = {https://doi.org/10.1007/s11432-021-3457-7}, doi = {10.1007/S11432-021-3457-7}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangZBZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/Wang0F0Y22, author = {Feng Wang and Hang Zhou and Han Fang and Weiming Zhang and Nenghai Yu}, title = {Deep 3D mesh watermarking with self-adaptive robustness}, journal = {Cybersecur.}, volume = {5}, number = {1}, pages = {24}, year = {2022}, url = {https://doi.org/10.1186/s42400-022-00125-w}, doi = {10.1186/S42400-022-00125-W}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersec/Wang0F0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/YuLYWG22, author = {Mingjie Yu and Fenghua Li and Nenghai Yu and Xiao Wang and Yunchuan Guo}, title = {Detecting conflict of heterogeneous access control policies}, journal = {Digit. Commun. Networks}, volume = {8}, number = {5}, pages = {664--679}, year = {2022}, url = {https://doi.org/10.1016/j.dcan.2022.09.002}, doi = {10.1016/J.DCAN.2022.09.002}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcan/YuLYWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LiuCCYLZY22, author = {Qiankun Liu and Dongdong Chen and Qi Chu and Lu Yuan and Bin Liu and Lei Zhang and Nenghai Yu}, title = {Online multi-object tracking with unsupervised re-identification learning and occlusion estimation}, journal = {Neurocomputing}, volume = {483}, pages = {333--347}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2022.01.008}, doi = {10.1016/J.NEUCOM.2022.01.008}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/LiuCCYLZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QinZZLHY22, author = {Chuan Qin and Wei Ming Zhang and Hang Zhou and Jiayang Liu and Yuan He and Nenghai Yu}, title = {Robustness enhancement against adversarial steganography via steganalyzer outputs}, journal = {J. Inf. Secur. Appl.}, volume = {68}, pages = {103252}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103252}, doi = {10.1016/J.JISA.2022.103252}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/QinZZLHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WangLXCYSL22, author = {Zhaoying Wang and Jian Li and Kaiping Xue and Shaoyin Cheng and Nenghai Yu and Qibin Sun and Jun Lu}, title = {An Asynchronous Entanglement Distribution Protocol for Quantum Networks}, journal = {{IEEE} Netw.}, volume = {36}, number = {5}, pages = {40--47}, year = {2022}, url = {https://doi.org/10.1109/MNET.001.2200177}, doi = {10.1109/MNET.001.2200177}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/WangLXCYSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiXLYWL22, author = {Zhonghui Li and Kaiping Xue and Jian Li and Nenghai Yu and David S. L. Wei and Ruidong Li}, title = {Connection-Oriented and Connectionless Remote Entanglement Distribution Strategies in Quantum Networks}, journal = {{IEEE} Netw.}, volume = {36}, number = {6}, pages = {150--156}, year = {2022}, url = {https://doi.org/10.1109/MNET.107.2100483}, doi = {10.1109/MNET.107.2100483}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/LiXLYWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/ZhangCLZFHY22, author = {Jie Zhang and Dongdong Chen and Jing Liao and Weiming Zhang and Huamin Feng and Gang Hua and Nenghai Yu}, title = {Deep Model Intellectual Property Protection via Deep Watermarking}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {44}, number = {8}, pages = {4005--4020}, year = {2022}, url = {https://doi.org/10.1109/TPAMI.2021.3064850}, doi = {10.1109/TPAMI.2021.3064850}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/ZhangCLZFHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/TanCCCLHYHY22, author = {Zhentao Tan and Dongdong Chen and Qi Chu and Menglei Chai and Jing Liao and Mingming He and Lu Yuan and Gang Hua and Nenghai Yu}, title = {Efficient Semantic Image Synthesis via Class-Adaptive Normalization}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {44}, number = {9}, pages = {4852--4866}, year = {2022}, url = {https://doi.org/10.1109/TPAMI.2021.3076487}, doi = {10.1109/TPAMI.2021.3076487}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/TanCCCLHYHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiXJLWLY22, author = {Zhonghui Li and Kaiping Xue and Qidong Jia and Jian Li and David S. L. Wei and Jianqing Liu and Nenghai Yu}, title = {A cluster-based networking approach for large-scale and wide-area quantum key agreement}, journal = {Quantum Inf. Process.}, volume = {21}, number = {5}, pages = {192}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03528-3}, doi = {10.1007/S11128-022-03528-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiXJLWLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ZengCZWY22, author = {Kai Zeng and Kejiang Chen and Weiming Zhang and Yaofei Wang and Nenghai Yu}, title = {Improving robust adaptive steganography via minimizing channel errors}, journal = {Signal Process.}, volume = {195}, pages = {108498}, year = {2022}, url = {https://doi.org/10.1016/j.sigpro.2022.108498}, doi = {10.1016/J.SIGPRO.2022.108498}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/ZengCZWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbbis/MiaoCLLTZY22, author = {Changtao Miao and Qi Chu and Weihai Li and Suichan Li and Zhentao Tan and Wanyi Zhuang and Nenghai Yu}, title = {Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection}, journal = {{IEEE} Trans. Biom. Behav. Identity Sci.}, volume = {4}, number = {1}, pages = {71--84}, year = {2022}, url = {https://doi.org/10.1109/TBIOM.2021.3119403}, doi = {10.1109/TBIOM.2021.3119403}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbbis/MiaoCLLTZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/LiWXLYSL22, author = {Jian Li and Mingjun Wang and Kaiping Xue and Ruidong Li and Nenghai Yu and Qibin Sun and Jun Lu}, title = {Fidelity-Guaranteed Entanglement Routing in Quantum Networks}, journal = {{IEEE} Trans. Commun.}, volume = {70}, number = {10}, pages = {6748--6763}, year = {2022}, url = {https://doi.org/10.1109/TCOMM.2022.3200115}, doi = {10.1109/TCOMM.2022.3200115}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/LiWXLYSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ChenXLYLLSL22, author = {Lutong Chen and Kaiping Xue and Jian Li and Nenghai Yu and Ruidong Li and Jianqing Liu and Qibin Sun and Jun Lu}, title = {A Heuristic Remote Entanglement Distribution Algorithm on Memory-Limited Quantum Paths}, journal = {{IEEE} Trans. Commun.}, volume = {70}, number = {11}, pages = {7491--7504}, year = {2022}, url = {https://doi.org/10.1109/TCOMM.2022.3205683}, doi = {10.1109/TCOMM.2022.3205683}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/ChenXLYLLSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/GuanCCZY22, author = {Qingxiao Guan and Kaimeng Chen and Hefeng Chen and Weiming Zhang and Nenghai Yu}, title = {Detecting Steganography in {JPEG} Images Recompressed With the Same Quantization Matrix}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {9}, pages = {6002--6016}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2022.3155758}, doi = {10.1109/TCSVT.2022.3155758}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/GuanCCZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XueGHWHY22, author = {Kaiping Xue and Na Gai and Jianan Hong and David S. L. Wei and Peilin Hong and Nenghai Yu}, title = {Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {635--646}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2987903}, doi = {10.1109/TDSC.2020.2987903}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XueGHWHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenZZCZY22, author = {Kejiang Chen and Hang Zhou and Hanqing Zhao and Dongdong Chen and Weiming Zhang and Nenghai Yu}, title = {Distribution-Preserving Steganography Based on Text-to-Speech Generative Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3343--3356}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3095072}, doi = {10.1109/TDSC.2021.3095072}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenZZCZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MiaoTCYG22, author = {Changtao Miao and Zichang Tan and Qi Chu and Nenghai Yu and Guodong Guo}, title = {Hierarchical Frequency-Assisted Interactive Networks for Face Manipulation Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3008--3021}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3198275}, doi = {10.1109/TIFS.2022.3198275}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MiaoTCYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/WeiCZLZYHY22, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Weiming Zhang and Lu Yuan and Gang Hua and Nenghai Yu}, title = {E2Style: Improve the Efficiency and Effectiveness of StyleGAN Inversion}, journal = {{IEEE} Trans. Image Process.}, volume = {31}, pages = {3267--3280}, year = {2022}, url = {https://doi.org/10.1109/TIP.2022.3167305}, doi = {10.1109/TIP.2022.3167305}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/WeiCZLZYHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhangCHLZFHY22, author = {Jie Zhang and Dongdong Chen and Qidong Huang and Jing Liao and Weiming Zhang and Huamin Feng and Gang Hua and Nenghai Yu}, title = {Poison Ink: Robust and Invisible Backdoor Attack}, journal = {{IEEE} Trans. Image Process.}, volume = {31}, pages = {5691--5705}, year = {2022}, url = {https://doi.org/10.1109/TIP.2022.3201472}, doi = {10.1109/TIP.2022.3201472}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhangCHLZFHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/FangCWMLZZY22, author = {Han Fang and Dongdong Chen and Feng Wang and Zehua Ma and Honggu Liu and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {{TERA:} Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability}, journal = {{IEEE} Trans. Multim.}, volume = {24}, pages = {955--967}, year = {2022}, url = {https://doi.org/10.1109/TMM.2021.3061801}, doi = {10.1109/TMM.2021.3061801}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/FangCWMLZZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ZhangCQZY22, author = {Jiansong Zhang and Kejiang Chen and Chuan Qin and Weiming Zhang and Nenghai Yu}, title = {Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis}, journal = {{IEEE} Trans. Multim.}, volume = {24}, pages = {4538--4550}, year = {2022}, url = {https://doi.org/10.1109/TMM.2021.3119994}, doi = {10.1109/TMM.2021.3119994}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/ZhangCQZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/DongZSWY22, author = {Xiaojuan Dong and Weiming Zhang and Mohsin Shah and Bei Wang and Nenghai Yu}, title = {Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1678--1692}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3008957}, doi = {10.1109/TSC.2020.3008957}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/DongZSWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/LiuCLZZZZY22, author = {Kunlin Liu and Dongdong Chen and Jing Liao and Weiming Zhang and Hang Zhou and Jie Zhang and Wenbo Zhou and Nenghai Yu}, title = {{JPEG} Robust Invertible Grayscale}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {28}, number = {12}, pages = {4403--4417}, year = {2022}, url = {https://doi.org/10.1109/TVCG.2021.3088531}, doi = {10.1109/TVCG.2021.3088531}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvcg/LiuCLZZZZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/ZhouZCLY22, author = {Hang Zhou and Weiming Zhang and Kejiang Chen and Weixiang Li and Nenghai Yu}, title = {Three-Dimensional Mesh Steganography and Steganalysis: {A} Review}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {28}, number = {12}, pages = {5006--5025}, year = {2022}, url = {https://doi.org/10.1109/TVCG.2021.3075136}, doi = {10.1109/TVCG.2021.3075136}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvcg/ZhouZCLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/YangZCZMWY22, author = {Xi Yang and Jie Zhang and Kejiang Chen and Weiming Zhang and Zehua Ma and Feng Wang and Nenghai Yu}, title = {Tracing Text Provenance via Context-Aware Lexical Substitution}, booktitle = {Thirty-Sixth {AAAI} Conference on Artificial Intelligence, {AAAI} 2022, Thirty-Fourth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2022, The Twelveth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2022 Virtual Event, February 22 - March 1, 2022}, pages = {11613--11621}, publisher = {{AAAI} Press}, year = {2022}, url = {https://doi.org/10.1609/aaai.v36i10.21415}, doi = {10.1609/AAAI.V36I10.21415}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/YangZCZMWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/accv/FangLZCY22, author = {Tingting Fang and Bin Liu and Zhiwei Zhao and Qi Chu and Nenghai Yu}, editor = {Lei Wang and Juergen Gall and Tat{-}Jun Chin and Imari Sato and Rama Chellappa}, title = {Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images}, booktitle = {Computer Vision - {ACCV} 2022 - 16th Asian Conference on Computer Vision, Macao, China, December 4-8, 2022, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {13845}, pages = {369--386}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26348-4\_22}, doi = {10.1007/978-3-031-26348-4\_22}, timestamp = {Fri, 10 Mar 2023 15:47:05 +0100}, biburl = {https://dblp.org/rec/conf/accv/FangLZCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AiXLCYS022, author = {Mingrui Ai and Kaiping Xue and Bo Luo and Lutong Chen and Nenghai Yu and Qibin Sun and Feng Wu}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Blacktooth: Breaking through the Defense of Bluetooth in Silence}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {55--68}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560668}, doi = {10.1145/3548606.3560668}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AiXLCYS022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/DongBCZ0YCWG22, author = {Xiaoyi Dong and Jianmin Bao and Dongdong Chen and Ting Zhang and Weiming Zhang and Nenghai Yu and Dong Chen and Fang Wen and Baining Guo}, title = {Protecting Celebrities from DeepFake with Identity Consistency Transformer}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {9458--9468}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.00925}, doi = {10.1109/CVPR52688.2022.00925}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/DongBCZ0YCWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LiuTC0DCLYY22, author = {Qiankun Liu and Zhentao Tan and Dongdong Chen and Qi Chu and Xiyang Dai and Yinpeng Chen and Mengchen Liu and Lu Yuan and Nenghai Yu}, title = {Reduce Information Loss in Transformers for Pluralistic Image Inpainting}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {11337--11347}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01106}, doi = {10.1109/CVPR52688.2022.01106}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/LiuTC0DCLYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/DongBCZYYCG22, author = {Xiaoyi Dong and Jianmin Bao and Dongdong Chen and Weiming Zhang and Nenghai Yu and Lu Yuan and Dong Chen and Baining Guo}, title = {CSWin Transformer: {A} General Vision Transformer Backbone with Cross-Shaped Windows}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {12114--12124}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01181}, doi = {10.1109/CVPR52688.2022.01181}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/DongBCZYYCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/HuangDC00Y22, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Hang Zhou and Weiming Zhang and Nenghai Yu}, title = {Shape-invariant 3D Adversarial Point Clouds}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {15314--15323}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01490}, doi = {10.1109/CVPR52688.2022.01490}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/HuangDC00Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/Wei0Z0TY0Y22, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Zhentao Tan and Lu Yuan and Weiming Zhang and Nenghai Yu}, title = {HairCLIP: Design Your Hair by Text and Reference Image}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {18051--18060}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01754}, doi = {10.1109/CVPR52688.2022.01754}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/Wei0Z0TY0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/ChengYLY22, author = {Qi Cheng and Wei Yan and Sian{-}Jheng Lin and Nenghai Yu}, editor = {Ali Bilgin and Michael W. Marcellin and Joan Serra{-}Sagrist{\`{a}} and James A. Storer}, title = {Compressing the Tree of Canonical Huffman Coding}, booktitle = {Data Compression Conference, {DCC} 2022, Snowbird, UT, USA, March 22-25, 2022}, pages = {450}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DCC52660.2022.00061}, doi = {10.1109/DCC52660.2022.00061}, timestamp = {Thu, 14 Jul 2022 09:12:29 +0200}, biburl = {https://dblp.org/rec/conf/dcc/ChengYLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/DongBZCZYCWY22, author = {Xiaoyi Dong and Jianmin Bao and Ting Zhang and Dongdong Chen and Weiming Zhang and Lu Yuan and Dong Chen and Fang Wen and Nenghai Yu}, editor = {Shai Avidan and Gabriel J. Brostow and Moustapha Ciss{\'{e}} and Giovanni Maria Farinella and Tal Hassner}, title = {Bootstrapped Masked Autoencoders for Vision {BERT} Pretraining}, booktitle = {Computer Vision - {ECCV} 2022 - 17th European Conference, Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {XXX}}, series = {Lecture Notes in Computer Science}, volume = {13690}, pages = {247--264}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20056-4\_15}, doi = {10.1007/978-3-031-20056-4\_15}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eccv/DongBZCZYCWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/LiLLLY0HZZY22, author = {Xulin Li and Yan Lu and Bin Liu and Yating Liu and Guojun Yin and Qi Chu and Jinyang Huang and Feng Zhu and Rui Zhao and Nenghai Yu}, editor = {Shai Avidan and Gabriel J. Brostow and Moustapha Ciss{\'{e}} and Giovanni Maria Farinella and Tal Hassner}, title = {Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification}, booktitle = {Computer Vision - {ECCV} 2022 - 17th European Conference, Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {XXVI}}, series = {Lecture Notes in Computer Science}, volume = {13686}, pages = {381--398}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19809-0\_22}, doi = {10.1007/978-3-031-19809-0\_22}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eccv/LiLLLY0HZZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/ZhuangCTLYMLY22, author = {Wanyi Zhuang and Qi Chu and Zhentao Tan and Qiankun Liu and Haojie Yuan and Changtao Miao and Zixiang Luo and Nenghai Yu}, editor = {Shai Avidan and Gabriel J. Brostow and Moustapha Ciss{\'{e}} and Giovanni Maria Farinella and Tal Hassner}, title = {UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection}, booktitle = {Computer Vision - {ECCV} 2022 - 17th European Conference, Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {13665}, pages = {391--407}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20065-6\_23}, doi = {10.1007/978-3-031-20065-6\_23}, timestamp = {Thu, 10 Nov 2022 10:31:49 +0100}, biburl = {https://dblp.org/rec/conf/eccv/ZhuangCTLYMLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MaYLY22, author = {Yuting Ma and Yuanzhi Yao and Xiaowei Liu and Nenghai Yu}, title = {Privacy-preserving Collaborative Learning with Scalable Image Transformation and Autoencoder}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {1031--1036}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001061}, doi = {10.1109/GLOBECOM48099.2022.10001061}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/MaYLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WangLZZLZY22, author = {Ping Wang and Kunlin Liu and Wenbo Zhou and Hang Zhou and Honggu Liu and Weiming Zhang and Nenghai Yu}, title = {{ADT:} Anti-Deepfake Transformer}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {2899--1903}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9746888}, doi = {10.1109/ICASSP43922.2022.9746888}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/WangLZZLZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ChenZLCFY22, author = {Haozhe Chen and Weiming Zhang and Kunlin Liu and Kejiang Chen and Han Fang and Nenghai Yu}, title = {Speech Pattern Based Black-Box Model Watermarking for Automatic Speech Recognition}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {3059--3063}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9747044}, doi = {10.1109/ICASSP43922.2022.9747044}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ChenZLCFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/QinZZY22, author = {Chuan Qin and Na Zhao and Weiming Zhang and Nenghai Yu}, title = {Patch Steganalysis: {A} Sampling Based Defense Against Adversarial Steganography}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {3079--3083}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9747638}, doi = {10.1109/ICASSP43922.2022.9747638}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/QinZZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/FengWCZY22, author = {Jinliu Feng and Yaofei Wang and Kejiang Chen and Weiming Zhang and Nenghai Yu}, title = {An Effective Steganalysis for Robust Steganography with Repetitive {JPEG} Compression}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {3084--3088}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9747061}, doi = {10.1109/ICASSP43922.2022.9747061}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/FengWCZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/YueYLY22, author = {Zhengyu Yue and Yuanzhi Yao and Weihai Li and Nenghai Yu}, title = {{ATDD:} Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {3448--3453}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9838336}, doi = {10.1109/ICC45855.2022.9838336}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/YueYLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangZFZY22, author = {Feng Wang and Hang Zhou and Han Fang and Weiming Zhang and Nenghai Yu}, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Noise Simulation-Based Deep Optical Watermarking}, booktitle = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13340}, pages = {283--298}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06791-4\_23}, doi = {10.1007/978-3-031-06791-4\_23}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangZFZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuZZFY22, author = {Wenxuan Wu and Wenbo Zhou and Weiming Zhang and Han Fang and Nenghai Yu}, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Capturing the Lighting Inconsistency for Deepfake Detection}, booktitle = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13339}, pages = {637--647}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06788-4\_52}, doi = {10.1007/978-3-031-06788-4\_52}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WuZZFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/Li0FYMY22, author = {Yinan Li and Weiming Zhang and Han Fang and Xi Yang and Zehua Ma and Nenghai Yu}, title = {Font Watermarking Network for Text Images}, booktitle = {2022 {IEEE} International Conference on Image Processing, {ICIP} 2022, Bordeaux, France, 16-19 October 2022}, pages = {486--490}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICIP46576.2022.9897724}, doi = {10.1109/ICIP46576.2022.9897724}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/Li0FYMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/Zhuang0YM0Y22, author = {Wanyi Zhuang and Qi Chu and Haojie Yuan and Changtao Miao and Bin Liu and Nenghai Yu}, title = {Towards Intrinsic Common Discriminative Features Learning for Face Forgery Detection Using Adversarial Learning}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2022, Taipei, Taiwan, July 18-22, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICME52920.2022.9859586}, doi = {10.1109/ICME52920.2022.9859586}, timestamp = {Wed, 31 Aug 2022 09:04:57 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/Zhuang0YM0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/LiuYMY22, author = {Xiaowei Liu and Yuanzhi Yao and Yuting Ma and Nenghai Yu}, editor = {Marek Z. Reformat and Du Zhang and Nikolaos G. Bourbakis}, title = {Privacy-preserving Cost-sensitive Federated Learning from Imbalanced Data}, booktitle = {34th {IEEE} International Conference on Tools with Artificial Intelligence, {ICTAI} 2022, Macao, China, October 31 - November 2, 2022}, pages = {20--27}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTAI56018.2022.00012}, doi = {10.1109/ICTAI56018.2022.00012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictai/LiuYMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/YuLLCY22, author = {Hanlei Yu and Bin Liu and Yan Lu and Qi Chu and Nenghai Yu}, editor = {Shiqi Yu and Zhaoxiang Zhang and Pong C. Yuen and Junwei Han and Tieniu Tan and Yike Guo and Jianhuang Lai and Jianguo Zhang}, title = {Multi-view Geometry Distillation for Cloth-Changing Person ReID}, booktitle = {Pattern Recognition and Computer Vision - 5th Chinese Conference, {PRCV} 2022, Shenzhen, China, November 4-7, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13534}, pages = {29--41}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18907-4\_3}, doi = {10.1007/978-3-031-18907-4\_3}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prcv/YuLLCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/LiLLCY22, author = {Xulin Li and Bin Liu and Yan Lu and Qi Chu and Nenghai Yu}, editor = {Shiqi Yu and Zhaoxiang Zhang and Pong C. Yuen and Junwei Han and Tieniu Tan and Yike Guo and Jianhuang Lai and Jianguo Zhang}, title = {Cloth-Aware Center Cluster Loss for Cloth-Changing Person Re-identification}, booktitle = {Pattern Recognition and Computer Vision - 5th Chinese Conference, {PRCV} 2022, Shenzhen, China, November 4-7, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13534}, pages = {527--539}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18907-4\_41}, doi = {10.1007/978-3-031-18907-4\_41}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prcv/LiLLCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShanYLZY22, author = {Boshen Shan and Yuanzhi Yao and Weihai Li and Xiaodong Zuo and Nenghai Yu}, title = {Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {1340--1347}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00189}, doi = {10.1109/TRUSTCOM56396.2022.00189}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShanYLZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/YaoZY22, author = {Qiyi Yao and Weiming Zhang and Nenghai Yu}, title = {Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile}, booktitle = {14th International Conference on Wireless Communications and Signal Processing, {WCSP} 2022, Nanjing, China, November 1-3, 2022}, pages = {404--408}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WCSP55476.2022.10039228}, doi = {10.1109/WCSP55476.2022.10039228}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/YaoZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-01297, author = {Qiankun Liu and Dongdong Chen and Qi Chu and Lu Yuan and Bin Liu and Lei Zhang and Nenghai Yu}, title = {Online Multi-Object Tracking with Unsupervised Re-Identification Learning and Occlusion Estimation}, journal = {CoRR}, volume = {abs/2201.01297}, year = {2022}, url = {https://arxiv.org/abs/2201.01297}, eprinttype = {arXiv}, eprint = {2201.01297}, timestamp = {Fri, 04 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-01297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-01265, author = {Hanqing Zhao and Wenbo Zhou and Dongdong Chen and Weiming Zhang and Nenghai Yu}, title = {Self-supervised Transformer for Deepfake Detection}, journal = {CoRR}, volume = {abs/2203.01265}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.01265}, doi = {10.48550/ARXIV.2203.01265}, eprinttype = {arXiv}, eprint = {2203.01265}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-01265.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-01318, author = {Xiaoyi Dong and Jianmin Bao and Dongdong Chen and Ting Zhang and Weiming Zhang and Nenghai Yu and Dong Chen and Fang Wen and Baining Guo}, title = {Protecting Celebrities with Identity Consistency Transformer}, journal = {CoRR}, volume = {abs/2203.01318}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.01318}, doi = {10.48550/ARXIV.2203.01318}, eprinttype = {arXiv}, eprint = {2203.01318}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-01318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-04041, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Hang Zhou and Weiming Zhang and Nenghai Yu}, title = {Shape-invariant 3D Adversarial Point Clouds}, journal = {CoRR}, volume = {abs/2203.04041}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.04041}, doi = {10.48550/ARXIV.2203.04041}, eprinttype = {arXiv}, eprint = {2203.04041}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-04041.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-02081, author = {Qiankun Liu and Bin Liu and Yue Wu and Weihai Li and Nenghai Yu}, title = {Real-time Online Multi-Object Tracking in Compressed Domain}, journal = {CoRR}, volume = {abs/2204.02081}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.02081}, doi = {10.48550/ARXIV.2204.02081}, eprinttype = {arXiv}, eprint = {2204.02081}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-02081.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-08895, author = {Yang Yang and Yiyang Huang and Ming Shi and Kejiang Chen and Weiming Zhang and Nenghai Yu}, title = {Invertible Mask Network for Face Privacy-Preserving}, journal = {CoRR}, volume = {abs/2204.08895}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.08895}, doi = {10.48550/ARXIV.2204.08895}, eprinttype = {arXiv}, eprint = {2204.08895}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-08895.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-02117, author = {Zhengyu Yue and Yuanzhi Yao and Weihai Li and Nenghai Yu}, title = {{ATDD:} Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage}, journal = {CoRR}, volume = {abs/2205.02117}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.02117}, doi = {10.48550/ARXIV.2205.02117}, eprinttype = {arXiv}, eprint = {2205.02117}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-02117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-05076, author = {Qiankun Liu and Zhentao Tan and Dongdong Chen and Qi Chu and Xiyang Dai and Yinpeng Chen and Mengchen Liu and Lu Yuan and Nenghai Yu}, title = {Reduce Information Loss in Transformers for Pluralistic Image Inpainting}, journal = {CoRR}, volume = {abs/2205.05076}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.05076}, doi = {10.48550/ARXIV.2205.05076}, eprinttype = {arXiv}, eprint = {2205.05076}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-05076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-03776, author = {Wanyi Zhuang and Qi Chu and Haojie Yuan and Changtao Miao and Bin Liu and Nenghai Yu}, title = {Towards Intrinsic Common Discriminative Features Learning for Face Forgery Detection using Adversarial Learning}, journal = {CoRR}, volume = {abs/2207.03776}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.03776}, doi = {10.48550/ARXIV.2207.03776}, eprinttype = {arXiv}, eprint = {2207.03776}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-03776.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-07116, author = {Xiaoyi Dong and Jianmin Bao and Ting Zhang and Dongdong Chen and Weiming Zhang and Lu Yuan and Dong Chen and Fang Wen and Nenghai Yu}, title = {Bootstrapped Masked Autoencoders for Vision {BERT} Pretraining}, journal = {CoRR}, volume = {abs/2207.07116}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.07116}, doi = {10.48550/ARXIV.2207.07116}, eprinttype = {arXiv}, eprint = {2207.07116}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-07116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-00967, author = {Xulin Li and Yan Lu and Bin Liu and Yating Liu and Guojun Yin and Qi Chu and Jinyang Huang and Feng Zhu and Rui Zhao and Nenghai Yu}, title = {Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification}, journal = {CoRR}, volume = {abs/2208.00967}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.00967}, doi = {10.48550/ARXIV.2208.00967}, eprinttype = {arXiv}, eprint = {2208.00967}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-00967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12262, author = {Xiaoyi Dong and Yinglin Zheng and Jianmin Bao and Ting Zhang and Dongdong Chen and Hao Yang and Ming Zeng and Weiming Zhang and Lu Yuan and Dong Chen and Fang Wen and Nenghai Yu}, title = {MaskCLIP: Masked Self-Distillation Advances Contrastive Language-Image Pretraining}, journal = {CoRR}, volume = {abs/2208.12262}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12262}, doi = {10.48550/ARXIV.2208.12262}, eprinttype = {arXiv}, eprint = {2208.12262}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-07788, author = {Qidong Huang and Xiaoyi Dong and Dongdong Chen and Hang Zhou and Weiming Zhang and Kui Zhang and Gang Hua and Nenghai Yu}, title = {PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition}, journal = {CoRR}, volume = {abs/2209.07788}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.07788}, doi = {10.48550/ARXIV.2209.07788}, eprinttype = {arXiv}, eprint = {2209.07788}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-07788.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-12752, author = {Wanyi Zhuang and Qi Chu and Zhentao Tan and Qiankun Liu and Haojie Yuan and Changtao Miao and Zixiang Luo and Nenghai Yu}, title = {UIA-ViT: Unsupervised Inconsistency-Aware Method based on Vision Transformer for Face Forgery Detection}, journal = {CoRR}, volume = {abs/2210.12752}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.12752}, doi = {10.48550/ARXIV.2210.12752}, eprinttype = {arXiv}, eprint = {2210.12752}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-12752.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-14632, author = {Kejiang Chen and Hang Zhou and Yaofei Wang and Menghan Li and Weiming Zhang and Nenghai Yu}, title = {Cover Reproducible Steganography via Deep Generative Models}, journal = {CoRR}, volume = {abs/2210.14632}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.14632}, doi = {10.48550/ARXIV.2210.14632}, eprinttype = {arXiv}, eprint = {2210.14632}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-14632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-16247, author = {Kui Zhang and Hang Zhou and Jie Zhang and Qidong Huang and Weiming Zhang and Nenghai Yu}, title = {Ada3Diff: Defending against 3D Adversarial Point Clouds via Adaptive Diffusion}, journal = {CoRR}, volume = {abs/2211.16247}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.16247}, doi = {10.48550/ARXIV.2211.16247}, eprinttype = {arXiv}, eprint = {2211.16247}, timestamp = {Sun, 04 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-16247.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-01539, author = {Jiyan He and Xuechen Li and Da Yu and Huishuai Zhang and Janardhan Kulkarni and Yin Tat Lee and Arturs Backurs and Nenghai Yu and Jiang Bian}, title = {Exploring the Limits of Differentially Private Deep Learning with Group-wise Clipping}, journal = {CoRR}, volume = {abs/2212.01539}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.01539}, doi = {10.48550/ARXIV.2212.01539}, eprinttype = {arXiv}, eprint = {2212.01539}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-01539.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-02339, author = {Chang Liu and Jie Zhang and Han Fang and Zehua Ma and Weiming Zhang and Nenghai Yu}, title = {DeAR: {A} Deep-learning-based Audio Re-recording Resilient Watermarking}, journal = {CoRR}, volume = {abs/2212.02339}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.02339}, doi = {10.48550/ARXIV.2212.02339}, eprinttype = {arXiv}, eprint = {2212.02339}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-02339.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-03863, author = {Hanqing Zhao and Dianmo Sheng and Jianmin Bao and Dongdong Chen and Dong Chen and Fang Wen and Lu Yuan and Ce Liu and Wenbo Zhou and Qi Chu and Weiming Zhang and Nenghai Yu}, title = {X-Paste: Revisit Copy-Paste at Scale with {CLIP} and StableDiffusion}, journal = {CoRR}, volume = {abs/2212.03863}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.03863}, doi = {10.48550/ARXIV.2212.03863}, eprinttype = {arXiv}, eprint = {2212.03863}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-03863.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-06138, author = {Xiaoyi Dong and Jianmin Bao and Ting Zhang and Dongdong Chen and Shuyang Gu and Weiming Zhang and Lu Yuan and Dong Chen and Fang Wen and Nenghai Yu}, title = {{CLIP} Itself is a Strong Fine-tuner: Achieving 85.7{\%} and 88.0{\%} Top-1 Accuracy with ViT-B and ViT-L on ImageNet}, journal = {CoRR}, volume = {abs/2212.06138}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.06138}, doi = {10.48550/ARXIV.2212.06138}, eprinttype = {arXiv}, eprint = {2212.06138}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-06138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/LiuWZZGLZY21, author = {Kunlin Liu and Ping Wang and Wenbo Zhou and Zhenyu Zhang and Yanhao Ge and Honggu Liu and Weiming Zhang and Nenghai Yu}, title = {Face Swapping Consistency Transfer with Neural Identity Carrier}, journal = {Future Internet}, volume = {13}, number = {11}, pages = {298}, year = {2021}, url = {https://doi.org/10.3390/fi13110298}, doi = {10.3390/FI13110298}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/LiuWZZGLZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LiuZZBQYL21, author = {Guoqing Liu and Li Zhao and Pushi Zhang and Jiang Bian and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, title = {Demonstration actor critic}, journal = {Neurocomputing}, volume = {434}, pages = {194--202}, year = {2021}, url = {https://doi.org/10.1016/j.neucom.2020.12.116}, doi = {10.1016/J.NEUCOM.2020.12.116}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/LiuZZBQYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/BianCZZDZZY21, author = {Huanyu Bian and Dongdong Chen and Kui Zhang and Hang Zhou and Xiaoyi Dong and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Adversarial defense via self-orthogonal randomization super-network}, journal = {Neurocomputing}, volume = {452}, pages = {147--158}, year = {2021}, url = {https://doi.org/10.1016/j.neucom.2021.04.062}, doi = {10.1016/J.NEUCOM.2021.04.062}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/BianCZZDZZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XueZYGWY21, author = {Kaiping Xue and Bin Zhu and Qingyou Yang and Na Gai and David S. L. Wei and Nenghai Yu}, title = {InPPTD: {A} Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowdsensing Systems}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {6}, pages = {4305--4316}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3029294}, doi = {10.1109/JIOT.2020.3029294}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XueZYGWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/BianCLZCZZY21, author = {Huanyu Bian and Hao Cui and Kunlin Liu and Hang Zhou and Dongdong Chen and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {\emph{CDAE}: Color decomposition-based adversarial examples for screen devices}, journal = {Inf. Sci.}, volume = {569}, pages = {287--301}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.04.005}, doi = {10.1016/J.INS.2021.04.005}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/BianCLZCZZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/ShuaiYWXL21, author = {Mengxia Shuai and Nenghai Yu and Hongxia Wang and Ling Xiong and Yue Li}, title = {A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications}, journal = {J. Organ. End User Comput.}, volume = {33}, number = {3}, pages = {1--18}, year = {2021}, url = {https://doi.org/10.4018/joeuc.20210501.oa1}, doi = {10.4018/JOEUC.20210501.OA1}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/ShuaiYWXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/YaoY21, author = {Yuanzhi Yao and Nenghai Yu}, title = {Motion vector modification distortion analysis-based payload allocation for video steganography}, journal = {J. Vis. Commun. Image Represent.}, volume = {74}, pages = {102986}, year = {2021}, url = {https://doi.org/10.1016/j.jvcir.2020.102986}, doi = {10.1016/J.JVCIR.2020.102986}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/YaoY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/QinZDZY21, author = {Chuan Qin and Weiming Zhang and Xiaoyi Dong and Hongyue Zha and Nenghai Yu}, title = {Adversarial steganography based on sparse cover enhancement}, journal = {J. Vis. Commun. Image Represent.}, volume = {80}, pages = {103325}, year = {2021}, url = {https://doi.org/10.1016/j.jvcir.2021.103325}, doi = {10.1016/J.JVCIR.2021.103325}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/QinZDZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/GuanCZY21, author = {Qingxiao Guan and Hefeng Chen and Weiming Zhang and Nenghai Yu}, title = {Improving {UNIWARD} distortion function via isotropic construction and hierarchical merging}, journal = {J. Vis. Commun. Image Represent.}, volume = {81}, pages = {103333}, year = {2021}, url = {https://doi.org/10.1016/j.jvcir.2021.103333}, doi = {10.1016/J.JVCIR.2021.103333}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/GuanCZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/FanCYHYC21, author = {Qingnan Fan and Dongdong Chen and Lu Yuan and Gang Hua and Nenghai Yu and Baoquan Chen}, title = {A General Decoupled Learning Framework for Parameterized Image Operators}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {43}, number = {1}, pages = {33--47}, year = {2021}, url = {https://doi.org/10.1109/TPAMI.2019.2925793}, doi = {10.1109/TPAMI.2019.2925793}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/FanCYHYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/ChenYLYH21, author = {Dongdong Chen and Lu Yuan and Jing Liao and Nenghai Yu and Gang Hua}, title = {Explicit Filterbank Learning for Neural Image Style Transfer and Image Processing}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {43}, number = {7}, pages = {2373--2387}, year = {2021}, url = {https://doi.org/10.1109/TPAMI.2020.2964205}, doi = {10.1109/TPAMI.2020.2964205}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/ChenYLYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/JiaXLZWY21, author = {Qidong Jia and Kaiping Xue and Zhonghui Li and Mengce Zheng and David S. L. Wei and Nenghai Yu}, title = {An improved {QKD} protocol without public announcement basis using periodically derived basis}, journal = {Quantum Inf. Process.}, volume = {20}, number = {2}, pages = {69}, year = {2021}, url = {https://doi.org/10.1007/s11128-021-03000-8}, doi = {10.1007/S11128-021-03000-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/JiaXLZWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhengXLY21, author = {Mengce Zheng and Kaiping Xue and Shangbin Li and Nenghai Yu}, title = {A practical quantum designated verifier signature scheme for E-voting applications}, journal = {Quantum Inf. Process.}, volume = {20}, number = {7}, pages = {1--22}, year = {2021}, url = {https://doi.org/10.1007/s11128-021-03162-5}, doi = {10.1007/S11128-021-03162-5}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhengXLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiZQCZY21, author = {Li Li and Weiming Zhang and Chuan Qin and Kejiang Chen and Wenbo Zhou and Nenghai Yu}, title = {Adversarial batch image steganography against CNN-based pooled steganalysis}, journal = {Signal Process.}, volume = {181}, pages = {107920}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2020.107920}, doi = {10.1016/J.SIGPRO.2020.107920}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/LiZQCZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/TanLCZWLY21, author = {Zhentao Tan and Bin Liu and Qi Chu and Hangshi Zhong and Yue Wu and Weihai Li and Nenghai Yu}, title = {Real Time Video Object Segmentation in Compressed Domain}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {1}, pages = {175--188}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.2971641}, doi = {10.1109/TCSVT.2020.2971641}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/TanLCZWLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/FangCHZMZY21, author = {Han Fang and Dongdong Chen and Qidong Huang and Jie Zhang and Zehua Ma and Weiming Zhang and Nenghai Yu}, title = {Deep Template-Based Watermarking}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {4}, pages = {1436--1451}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3009349}, doi = {10.1109/TCSVT.2020.3009349}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/FangCHZMZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WangLZYLY21, author = {Yaofei Wang and Weixiang Li and Weiming Zhang and Xinzhi Yu and Kunlin Liu and Nenghai Yu}, title = {{BBC++:} Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for {JPEG} Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {5}, pages = {2082--2088}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3010554}, doi = {10.1109/TCSVT.2020.3010554}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/WangLZYLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChenZHZY21, author = {Kejiang Chen and Hang Zhou and Dongdong Hou and Weiming Zhang and Nenghai Yu}, title = {Reversible Data Hiding in {JPEG} Images Under Multi-Distortion Metric}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {10}, pages = {3942--3953}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3044186}, doi = {10.1109/TCSVT.2020.3044186}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ChenZHZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/MaZFDGY21, author = {Zehua Ma and Weiming Zhang and Han Fang and Xiaoyi Dong and Linfeng Geng and Nenghai Yu}, title = {Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {12}, pages = {4826--4839}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2021.3055255}, doi = {10.1109/TCSVT.2021.3055255}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/MaZFDGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZLY21, author = {Yaofei Wang and Weiming Zhang and Weixiang Li and Nenghai Yu}, title = {Non-Additive Cost Functions for {JPEG} Steganography Based on Block Boundary Maintenance}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {1117--1130}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3029908}, doi = {10.1109/TIFS.2020.3029908}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/ZhouCZQY21, author = {Hang Zhou and Kejiang Chen and Weiming Zhang and Chuan Qin and Nenghai Yu}, title = {Feature-Preserving Tensor Voting Model for Mesh Steganalysis}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {27}, number = {1}, pages = {57--67}, year = {2021}, url = {https://doi.org/10.1109/TVCG.2019.2929041}, doi = {10.1109/TVCG.2019.2929041}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvcg/ZhouCZQY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/GongCW00LYF21, author = {Tao Gong and Kai Chen and Xinjiang Wang and Qi Chu and Feng Zhu and Dahua Lin and Nenghai Yu and Huamin Feng}, title = {Temporal {ROI} Align for Video Object Recognition}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {1442--1450}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i2.16234}, doi = {10.1609/AAAI.V35I2.16234}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/GongCW00LYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/HuangZZZY21, author = {Qidong Huang and Jie Zhang and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Initiative Defense against Facial Manipulation}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {1619--1627}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i2.16254}, doi = {10.1609/AAAI.V35I2.16254}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/HuangZZZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/Zhao0CLY21, author = {Zhiwei Zhao and Bin Liu and Qi Chu and Yan Lu and Nenghai Yu}, title = {Joint Color-irrelevant Consistency Learning and Identity-aware Modality Adaptation for Visible-infrared Cross Modality Person Re-identification}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {3520--3528}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i4.16466}, doi = {10.1609/AAAI.V35I4.16466}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/Zhao0CLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/WangLYY21, author = {Yangguang Wang and Jinwei Li and Yuanzhi Yao and Nenghai Yu}, title = {Undetectable {JPEG} Image Batch Reversible Data Hiding with Content-adaptive Payload Allocation}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2021, Tokyo, Japan, December 14-17, 2021}, pages = {1722--1728}, publisher = {{IEEE}}, year = {2021}, url = {https://ieeexplore.ieee.org/document/9689497}, timestamp = {Wed, 09 Feb 2022 09:03:08 +0100}, biburl = {https://dblp.org/rec/conf/apsipa/WangLYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LiuLZCH0ZY21, author = {Honggu Liu and Xiaodan Li and Wenbo Zhou and Yuefeng Chen and Yuan He and Hui Xue and Weiming Zhang and Nenghai Yu}, title = {Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {772--781}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Liu\_Spatial-Phase\_Shallow\_Learning\_Rethinking\_Face\_Forgery\_Detection\_in\_Frequency\_Domain\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.00083}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LiuLZCH0ZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZhaoZ0WZY21, author = {Hanqing Zhao and Wenbo Zhou and Dongdong Chen and Tianyi Wei and Weiming Zhang and Nenghai Yu}, title = {Multi-Attentional Deepfake Detection}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {2185--2194}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Zhao\_Multi-Attentional\_Deepfake\_Detection\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.00222}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ZhaoZ0WZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/TanC00000Y21, author = {Zhentao Tan and Menglei Chai and Dongdong Chen and Jing Liao and Qi Chu and Bin Liu and Gang Hua and Nenghai Yu}, title = {Diverse Semantic Image Synthesis via Probability Distribution Modeling}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {7962--7971}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Tan\_Diverse\_Semantic\_Image\_Synthesis\_via\_Probability\_Distribution\_Modeling\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.00787}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/TanC00000Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/Wei0Z0ZZY21, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Hanqing Zhao and Weiming Zhang and Nenghai Yu}, title = {Improved Image Matting via Real-Time User Clicks and Uncertainty Estimation}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2021, virtual, June 19-25, 2021}, pages = {15374--15383}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2021}, url = {https://openaccess.thecvf.com/content/CVPR2021/html/Wei\_Improved\_Image\_Matting\_via\_Real-Time\_User\_Clicks\_and\_Uncertainty\_Estimation\_CVPR\_2021\_paper.html}, doi = {10.1109/CVPR46437.2021.01512}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/Wei0Z0ZZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LuLYY21, author = {Aoran Lu and Weihai Li and Yuanzhi Yao and Nenghai Yu}, title = {{TCABRS:} An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {106--113}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00022}, doi = {10.1109/DSC53577.2021.00022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LuLYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/XuCY21, author = {Yinhu Xu and Qi Chu and Nenghai Yu}, title = {Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble Method}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {219--225}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00037}, doi = {10.1109/DSC53577.2021.00037}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/XuCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ChenC00MZY21, author = {Kejiang Chen and Yuefeng Chen and Hang Zhou and Chuan Qin and Xiaofeng Mao and Weiming Zhang and Nenghai Yu}, title = {Adversarial Examples Detection Beyond Image Space}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021}, pages = {3850--3854}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICASSP39728.2021.9414008}, doi = {10.1109/ICASSP39728.2021.9414008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ChenC00MZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/Jin00Y21, author = {Zhenchao Jin and Bin Liu and Qi Chu and Nenghai Yu}, title = {ISNet: Integrate Image-Level and Semantic-Level Context for Semantic Segmentation}, booktitle = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021}, pages = {7169--7178}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCV48922.2021.00710}, doi = {10.1109/ICCV48922.2021.00710}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccv/Jin00Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/Li0CY000Y21, author = {Suichan Li and Dongdong Chen and Yinpeng Chen and Lu Yuan and Lei Zhang and Qi Chu and Bin Liu and Nenghai Yu}, title = {Improve Unsupervised Pretraining for Few-label Transfer}, booktitle = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021}, pages = {10181--10190}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCV48922.2021.01004}, doi = {10.1109/ICCV48922.2021.01004}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/Li0CY000Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/Zhang0LLZY21, author = {Jiabin Zhang and Qi Chu and Weihai Li and Bin Liu and Weiming Zhang and Nenghai Yu}, editor = {Yuxin Peng and Shi{-}Min Hu and Moncef Gabbouj and Kun Zhou and Michael Elad and Kun Xu}, title = {Towards More Powerful Multi-column Convolutional Network for Crowd Counting}, booktitle = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou, China, August 6-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12888}, pages = {381--392}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-87355-4\_32}, doi = {10.1007/978-3-030-87355-4\_32}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/Zhang0LLZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/SongLY21, author = {Luchuan Song and Bin Liu and Nenghai Yu}, editor = {Yuxin Peng and Shi{-}Min Hu and Moncef Gabbouj and Kun Zhou and Michael Elad and Kun Xu}, title = {Talking Face Video Generation with Editable Expression}, booktitle = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou, China, August 6-8, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12890}, pages = {753--764}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-87361-5\_61}, doi = {10.1007/978-3-030-87361-5\_61}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/SongLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LuLZ0Y21, author = {Changlei Lu and Bin Liu and Wenbo Zhou and Qi Chu and Nenghai Yu}, title = {Deepfake Video Detection Using 3D-Attentional Inception Convolutional Neural Network}, booktitle = {2021 {IEEE} International Conference on Image Processing, {ICIP} 2021, Anchorage, AK, USA, September 19-22, 2021}, pages = {3572--3576}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICIP42928.2021.9506381}, doi = {10.1109/ICIP42928.2021.9506381}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/LuLZ0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/SongYLZY21, author = {Luchuan Song and Guojun Yin and Bin Liu and Yuhui Zhang and Nenghai Yu}, title = {Fsft-Net: Face Transfer Video Generation With Few-Shot Views}, booktitle = {2021 {IEEE} International Conference on Image Processing, {ICIP} 2021, Anchorage, AK, USA, September 19-22, 2021}, pages = {3582--3586}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICIP42928.2021.9506512}, doi = {10.1109/ICIP42928.2021.9506512}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/SongYLZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/LiuZZQZLYL21, author = {Guoqing Liu and Chuheng Zhang and Li Zhao and Tao Qin and Jinhua Zhu and Jian Li and Nenghai Yu and Tie{-}Yan Liu}, title = {Return-Based Contrastive Representation Learning for Reinforcement Learning}, booktitle = {9th International Conference on Learning Representations, {ICLR} 2021, Virtual Event, Austria, May 3-7, 2021}, publisher = {OpenReview.net}, year = {2021}, url = {https://openreview.net/forum?id=\_TM6rT7tXke}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/LiuZZQZLYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/Ji0ZL0JY21, author = {Nan Ji and Bin Liu and Zhiwei Zhao and Yan Lu and Qi Chu and Zhenchao Jin and Nenghai Yu}, title = {Content-Independent Online Handwriting Verification Based on Multi-Modal Fusion}, booktitle = {2021 {IEEE} International Conference on Multimedia and Expo, {ICME} 2021, Shenzhen, China, July 5-9, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICME51207.2021.9428239}, doi = {10.1109/ICME51207.2021.9428239}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/Ji0ZL0JY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/Yuan00Z0Y21, author = {Haojie Yuan and Qi Chu and Feng Zhu and Rui Zhao and Bin Liu and Nenghai Yu}, title = {Efficient Open-Set Adversarial Attacks on Deep Face Recognition}, booktitle = {2021 {IEEE} International Conference on Multimedia and Expo, {ICME} 2021, Shenzhen, China, July 5-9, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICME51207.2021.9428144}, doi = {10.1109/ICME51207.2021.9428144}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/Yuan00Z0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/ZhangYY21, author = {Xiaoya Zhang and Yuanzhi Yao and Nenghai Yu}, title = {Convolutional Neural Network-driven Optimal Prediction for Image Reversible Data Hiding}, booktitle = {23rd International Workshop on Multimedia Signal Processing, {MMSP} 2021, Tampere, Finland, October 6-8, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MMSP53017.2021.9733444}, doi = {10.1109/MMSP53017.2021.9733444}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsp/ZhangYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/YangXHY21, author = {Xuyong Yang and Xiaobin Xu and Yaohong Huang and Nenghai Yu}, editor = {Huimin Ma and Liang Wang and Changshui Zhang and Fei Wu and Tieniu Tan and Yaonan Wang and Jianhuang Lai and Yao Zhao}, title = {{HTCN:} Harmonious Text Colorization Network for Visual-Textual Presentation Design}, booktitle = {Pattern Recognition and Computer Vision - 4th Chinese Conference, {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13020}, pages = {560--571}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88007-1\_46}, doi = {10.1007/978-3-030-88007-1\_46}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/prcv/YangXHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengZHZHY21, author = {Yukun Cheng and Mengce Zheng and Fan Huang and Jiajia Zhang and Honggang Hu and Nenghai Yu}, title = {A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {557--568}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00086}, doi = {10.1109/TRUSTCOM53373.2021.00086}, timestamp = {Sun, 13 Mar 2022 10:52:35 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChengZHZHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/CaoYY21, author = {Xinzhu Cao and Yuanzhi Yao and Nenghai Yu}, title = {Nearly Reversible Image-to-Image Translation Using Joint Inter-Frame Coding and Embedding}, booktitle = {International Conference on Visual Communications and Image Processing, {VCIP} 2021, Munich, Germany, December 5-8, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VCIP53242.2021.9675370}, doi = {10.1109/VCIP53242.2021.9675370}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vcip/CaoYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/MiaoCLGZY21, author = {Changtao Miao and Qi Chu and Weihai Li and Tao Gong and Wanyi Zhuang and Nenghai Yu}, title = {Towards Generalizable and Robust Face Manipulation Detection via Bag-of-feature}, booktitle = {International Conference on Visual Communications and Image Processing, {VCIP} 2021, Munich, Germany, December 5-8, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VCIP53242.2021.9675331}, doi = {10.1109/VCIP53242.2021.9675331}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vcip/MiaoCLGZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/Huang0JY21, author = {Jinyang Huang and Bin Liu and Hongxing Jin and Nenghai Yu}, title = {WiLay: {A} Two-Layer Human Localization and Activity Recognition System Using WiFi}, booktitle = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki, Finland, April 25-28, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448863}, doi = {10.1109/VTC2021-SPRING51267.2021.9448863}, timestamp = {Fri, 18 Jun 2021 10:49:22 +0200}, biburl = {https://dblp.org/rec/conf/vtc/Huang0JY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-10960, author = {Guoqing Liu and Chuheng Zhang and Li Zhao and Tao Qin and Jinhua Zhu and Jian Li and Nenghai Yu and Tie{-}Yan Liu}, title = {Return-Based Contrastive Representation Learning for Reinforcement Learning}, journal = {CoRR}, volume = {abs/2102.10960}, year = {2021}, url = {https://arxiv.org/abs/2102.10960}, eprinttype = {arXiv}, eprint = {2102.10960}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-10960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-11586, author = {Kejiang Chen and Yuefeng Chen and Hang Zhou and Chuan Qin and Xiaofeng Mao and Weiming Zhang and Nenghai Yu}, title = {Adversarial Examples Detection beyond Image Space}, journal = {CoRR}, volume = {abs/2102.11586}, year = {2021}, url = {https://arxiv.org/abs/2102.11586}, eprinttype = {arXiv}, eprint = {2102.11586}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-11586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-01856, author = {Honggu Liu and Xiaodan Li and Wenbo Zhou and Yuefeng Chen and Yuan He and Hui Xue and Weiming Zhang and Nenghai Yu}, title = {Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain}, journal = {CoRR}, volume = {abs/2103.01856}, year = {2021}, url = {https://arxiv.org/abs/2103.01856}, eprinttype = {arXiv}, eprint = {2103.01856}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-01856.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-02406, author = {Hanqing Zhao and Wenbo Zhou and Dongdong Chen and Tianyi Wei and Weiming Zhang and Nenghai Yu}, title = {Multi-attentional Deepfake Detection}, journal = {CoRR}, volume = {abs/2103.02406}, year = {2021}, url = {https://arxiv.org/abs/2103.02406}, eprinttype = {arXiv}, eprint = {2103.02406}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-02406.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-04980, author = {Jie Zhang and Dongdong Chen and Jing Liao and Weiming Zhang and Huamin Feng and Gang Hua and Nenghai Yu}, title = {Deep Model Intellectual Property Protection via Deep Watermarking}, journal = {CoRR}, volume = {abs/2103.04980}, year = {2021}, url = {https://arxiv.org/abs/2103.04980}, eprinttype = {arXiv}, eprint = {2103.04980}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-04980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05833, author = {Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu and Nenghai Yu}, title = {Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup}, journal = {CoRR}, volume = {abs/2103.05833}, year = {2021}, url = {https://arxiv.org/abs/2103.05833}, eprinttype = {arXiv}, eprint = {2103.05833}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05833.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-06878, author = {Zhentao Tan and Menglei Chai and Dongdong Chen and Jing Liao and Qi Chu and Bin Liu and Gang Hua and Nenghai Yu}, title = {Diverse Semantic Image Synthesis via Probability Distribution Modeling}, journal = {CoRR}, volume = {abs/2103.06878}, year = {2021}, url = {https://arxiv.org/abs/2103.06878}, eprinttype = {arXiv}, eprint = {2103.06878}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-06878.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-07915, author = {Changtao Miao and Qi Chu and Weihai Li and Tao Gong and Wanyi Zhuang and Nenghai Yu}, title = {Towards Generalizable and Robust Face Manipulation Detection via Bag-of-local-feature}, journal = {CoRR}, volume = {abs/2103.07915}, year = {2021}, url = {https://arxiv.org/abs/2103.07915}, eprinttype = {arXiv}, eprint = {2103.07915}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-07915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-04268, author = {Xiquan Guan and Huamin Feng and Weiming Zhang and Hang Zhou and Jie Zhang and Nenghai Yu}, title = {Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication}, journal = {CoRR}, volume = {abs/2104.04268}, year = {2021}, url = {https://arxiv.org/abs/2104.04268}, eprinttype = {arXiv}, eprint = {2104.04268}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-04268.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07661, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Weiming Zhang and Lu Yuan and Gang Hua and Nenghai Yu}, title = {A Simple Baseline for StyleGAN Inversion}, journal = {CoRR}, volume = {abs/2104.07661}, year = {2021}, url = {https://arxiv.org/abs/2104.07661}, eprinttype = {arXiv}, eprint = {2104.07661}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07661.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-10203, author = {Hang Zhou and Weiming Zhang and Kejiang Chen and Weixiang Li and Nenghai Yu}, title = {Three-Dimensional Mesh Steganography and Steganalysis: {A} Review}, journal = {CoRR}, volume = {abs/2104.10203}, year = {2021}, url = {https://arxiv.org/abs/2104.10203}, eprinttype = {arXiv}, eprint = {2104.10203}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-10203.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-07943, author = {Yukun Cheng and Mengce Zheng and Fan Huang and Jiajia Zhang and Honggang Hu and Nenghai Yu}, title = {A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack}, journal = {CoRR}, volume = {abs/2106.07943}, year = {2021}, url = {https://arxiv.org/abs/2106.07943}, eprinttype = {arXiv}, eprint = {2106.07943}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-07943.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-00652, author = {Xiaoyi Dong and Jianmin Bao and Dongdong Chen and Weiming Zhang and Nenghai Yu and Lu Yuan and Dong Chen and Baining Guo}, title = {CSWin Transformer: {A} General Vision Transformer Backbone with Cross-Shaped Windows}, journal = {CoRR}, volume = {abs/2107.00652}, year = {2021}, url = {https://arxiv.org/abs/2107.00652}, eprinttype = {arXiv}, eprint = {2107.00652}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-00652.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-12369, author = {Suichan Li and Dongdong Chen and Yinpeng Chen and Lu Yuan and Lei Zhang and Qi Chu and Bin Liu and Nenghai Yu}, title = {Improve Unsupervised Pretraining for Few-label Transfer}, journal = {CoRR}, volume = {abs/2107.12369}, year = {2021}, url = {https://arxiv.org/abs/2107.12369}, eprinttype = {arXiv}, eprint = {2107.12369}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-12369.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-13706, author = {Luchuan Song and Bin Liu and Huihui Zhu and Qi Chu and Nenghai Yu}, title = {Abnormal Behavior Detection Based on Target Analysis}, journal = {CoRR}, volume = {abs/2107.13706}, year = {2021}, url = {https://arxiv.org/abs/2107.13706}, eprinttype = {arXiv}, eprint = {2107.13706}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-13706.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-13718, author = {Kun Zhao and Luchuan Song and Bin Liu and Qi Chu and Nenghai Yu}, title = {Cascaded Residual Density Network for Crowd Counting}, journal = {CoRR}, volume = {abs/2107.13718}, year = {2021}, url = {https://arxiv.org/abs/2107.13718}, eprinttype = {arXiv}, eprint = {2107.13718}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-13718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-02360, author = {Jie Zhang and Dongdong Chen and Jing Liao and Han Fang and Zehua Ma and Weiming Zhang and Gang Hua and Nenghai Yu}, title = {Exploring Structure Consistency for Deep Model Watermarking}, journal = {CoRR}, volume = {abs/2108.02360}, year = {2021}, url = {https://arxiv.org/abs/2108.02360}, eprinttype = {arXiv}, eprint = {2108.02360}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-02360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-02488, author = {Jie Zhang and Dongdong Chen and Jing Liao and Qidong Huang and Gang Hua and Weiming Zhang and Nenghai Yu}, title = {Poison Ink: Robust and Invisible Backdoor Attack}, journal = {CoRR}, volume = {abs/2108.02488}, year = {2021}, url = {https://arxiv.org/abs/2108.02488}, eprinttype = {arXiv}, eprint = {2108.02488}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-02488.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-12382, author = {Zhenchao Jin and Bin Liu and Qi Chu and Nenghai Yu}, title = {ISNet: Integrate Image-Level and Semantic-Level Context for Semantic Segmentation}, journal = {CoRR}, volume = {abs/2108.12382}, year = {2021}, url = {https://arxiv.org/abs/2108.12382}, eprinttype = {arXiv}, eprint = {2108.12382}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-12382.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-03495, author = {Tao Gong and Kai Chen and Xinjiang Wang and Qi Chu and Feng Zhu and Dahua Lin and Nenghai Yu and Huamin Feng}, title = {Temporal RoI Align for Video Object Recognition}, journal = {CoRR}, volume = {abs/2109.03495}, year = {2021}, url = {https://arxiv.org/abs/2109.03495}, eprinttype = {arXiv}, eprint = {2109.03495}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-03495.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-07202, author = {Feng Wang and Hang Zhou and Han Fang and Xiaojuan Dong and Weiming Zhang and Xi Yang and Nenghai Yu}, title = {Deep 3D Mesh Watermarking with Self-Adaptive Robustness}, journal = {CoRR}, volume = {abs/2109.07202}, year = {2021}, url = {https://arxiv.org/abs/2109.07202}, eprinttype = {arXiv}, eprint = {2109.07202}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-07202.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-08697, author = {Kai Zeng and Kejiang Chen and Yaofei Wang and Weiming Zhang and Nenghai Yu}, title = {Improving Dither Modulation based Robust Steganography by Overflow Suppression}, journal = {CoRR}, volume = {abs/2110.08697}, year = {2021}, url = {https://arxiv.org/abs/2110.08697}, eprinttype = {arXiv}, eprint = {2110.08697}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-08697.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-09510, author = {Suichan Li and Dongdong Chen and Yinpeng Chen and Lu Yuan and Lei Zhang and Qi Chu and Bin Liu and Nenghai Yu}, title = {Unsupervised Finetuning}, journal = {CoRR}, volume = {abs/2110.09510}, year = {2021}, url = {https://arxiv.org/abs/2110.09510}, eprinttype = {arXiv}, eprint = {2110.09510}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-09510.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-09814, author = {Haozhe Chen and Weiming Zhang and Kunlin Liu and Kejiang Chen and Han Fang and Nenghai Yu}, title = {Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition}, journal = {CoRR}, volume = {abs/2110.09814}, year = {2021}, url = {https://arxiv.org/abs/2110.09814}, eprinttype = {arXiv}, eprint = {2110.09814}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-09814.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-12710, author = {Xiaoyi Dong and Jianmin Bao and Ting Zhang and Dongdong Chen and Weiming Zhang and Lu Yuan and Dong Chen and Fang Wen and Nenghai Yu}, title = {PeCo: Perceptual Codebook for {BERT} Pre-training of Vision Transformers}, journal = {CoRR}, volume = {abs/2111.12710}, year = {2021}, url = {https://arxiv.org/abs/2111.12710}, eprinttype = {arXiv}, eprint = {2111.12710}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-12710.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-05142, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Zhentao Tan and Lu Yuan and Weiming Zhang and Nenghai Yu}, title = {HairCLIP: Design Your Hair by Text and Reference Image}, journal = {CoRR}, volume = {abs/2112.05142}, year = {2021}, url = {https://arxiv.org/abs/2112.05142}, eprinttype = {arXiv}, eprint = {2112.05142}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-05142.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-07873, author = {Xi Yang and Jie Zhang and Kejiang Chen and Weiming Zhang and Zehua Ma and Feng Wang and Nenghai Yu}, title = {Tracing Text Provenance via Context-Aware Lexical Substitution}, journal = {CoRR}, volume = {abs/2112.07873}, year = {2021}, url = {https://arxiv.org/abs/2112.07873}, eprinttype = {arXiv}, eprint = {2112.07873}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-07873.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10098, author = {Qidong Huang and Jie Zhang and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Initiative Defense against Facial Manipulation}, journal = {CoRR}, volume = {abs/2112.10098}, year = {2021}, url = {https://arxiv.org/abs/2112.10098}, eprinttype = {arXiv}, eprint = {2112.10098}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10098.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoZWJZHY21, author = {Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu and Nenghai Yu}, title = {Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2021}, url = {https://eprint.iacr.org/2021/312}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoZWJZHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ShuaiXWY20, author = {Mengxia Shuai and Ling Xiong and Changhui Wang and Nenghai Yu}, title = {A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem}, journal = {Comput. Commun.}, volume = {160}, pages = {215--227}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.06.012}, doi = {10.1016/J.COMCOM.2020.06.012}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ShuaiXWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ShuaiXWY20, author = {Mengxia Shuai and Ling Xiong and Changhui Wang and Nenghai Yu}, title = {Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {4}, pages = {380--390}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0491}, doi = {10.1049/IET-IFS.2019.0491}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ShuaiXWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShuaiLYXW20, author = {Mengxia Shuai and Bin Liu and Nenghai Yu and Ling Xiong and Changhui Wang}, title = {Efficient and privacy-preserving authentication scheme for wireless body area networks}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102499}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102499}, doi = {10.1016/J.JISA.2020.102499}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShuaiLYXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/GengZCFY20, author = {Linfeng Geng and Weiming Zhang and Haozhe Chen and Han Fang and Nenghai Yu}, title = {Real-time attacks on robust watermarking tools in the wild by {CNN}}, journal = {J. Real Time Image Process.}, volume = {17}, number = {3}, pages = {631--641}, year = {2020}, url = {https://doi.org/10.1007/s11554-020-00941-8}, doi = {10.1007/S11554-020-00941-8}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrtip/GengZCFY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YuCWLZY20, author = {Xinzhi Yu and Kejiang Chen and Yaofei Wang and Weixiang Li and Weiming Zhang and Nenghai Yu}, title = {Robust adaptive steganography based on generalized dither modulation and expanded embedding domain}, journal = {Signal Process.}, volume = {168}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2019.107343}, doi = {10.1016/J.SIGPRO.2019.107343}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/YuCWLZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/YuLLHY20, author = {Leilei Yu and Zhichang Lin and Sian{-}Jheng Lin and Yunghsiang S. Han and Nenghai Yu}, title = {Fast Encoding Algorithms for Reed-Solomon Codes With Between Four and Seven Parity Symbols}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {5}, pages = {699--705}, year = {2020}, url = {https://doi.org/10.1109/TC.2019.2963827}, doi = {10.1109/TC.2019.2963827}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/YuLLHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangZNHY20, author = {Jiajia Zhang and Mengce Zheng and Jiehui Nan and Honggang Hu and Nenghai Yu}, title = {A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {73--96}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.73-96}, doi = {10.13154/TCHES.V2020.I3.73-96}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangZNHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/LiZLZY20, author = {Weixiang Li and Weiming Zhang and Li Li and Hang Zhou and Nenghai Yu}, title = {Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes}, journal = {{IEEE} Trans. Commun.}, volume = {68}, number = {7}, pages = {3948--3962}, year = {2020}, url = {https://doi.org/10.1109/TCOMM.2020.2982624}, doi = {10.1109/TCOMM.2020.2982624}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/LiZLZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/WangLHY20, author = {Na Wang and Sian{-}Jheng Lin and Yunghsiang S. Han and Nenghai Yu}, title = {Variants of Golomb Coding and the n-ary Versions}, journal = {{IEEE} Trans. Commun.}, volume = {68}, number = {12}, pages = {7460--7472}, year = {2020}, url = {https://doi.org/10.1109/TCOMM.2020.3022396}, doi = {10.1109/TCOMM.2020.3022396}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/WangLHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiZZQHY20, author = {Weixiang Li and Wenbo Zhou and Weiming Zhang and Chuan Qin and Huanhuan Hu and Nenghai Yu}, title = {Shortening the Cover for Fast {JPEG} Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {6}, pages = {1745--1757}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2908689}, doi = {10.1109/TCSVT.2019.2908689}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiZZQHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChenZLYZY20, author = {Kejiang Chen and Hang Zhou and Weixiang Li and Kuan Yang and Weiming Zhang and Nenghai Yu}, title = {Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {7}, pages = {2027--2032}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2918511}, doi = {10.1109/TCSVT.2019.2918511}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ChenZLYZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiCZZWY20, author = {Weixiang Li and Kejiang Chen and Weiming Zhang and Hang Zhou and Yaofei Wang and Nenghai Yu}, title = {{JPEG} Steganography With Estimated Side-Information}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {7}, pages = {2288--2294}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2925118}, doi = {10.1109/TCSVT.2019.2925118}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiCZZWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/FangZMZSCY20, author = {Han Fang and Weiming Zhang and Zehua Ma and Hang Zhou and Shan Sun and Hao Cui and Nenghai Yu}, title = {A Camera Shooting Resilient Watermarking Scheme for Underpainting Documents}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {11}, pages = {4075--4089}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2953720}, doi = {10.1109/TCSVT.2019.2953720}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/FangZMZSCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiXWYYH20, author = {Shaohua Li and Kaiping Xue and David S. L. Wei and Hao Yue and Nenghai Yu and Peilin Hong}, title = {SecGrid: {A} Secure and Efficient SGX-Enabled Smart Grid System With Rich Functionalities}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1318--1330}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2938875}, doi = {10.1109/TIFS.2019.2938875}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiXWYYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZLYY20, author = {Yaofei Wang and Weiming Zhang and Weixiang Li and Xinzhi Yu and Nenghai Yu}, title = {Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2081--2095}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2956590}, doi = {10.1109/TIFS.2019.2956590}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZLYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ChenFLAYYH20, author = {Dongdong Chen and Qingnan Fan and Jing Liao and Angelica I. Avil{\'{e}}s{-}Rivero and Lu Yuan and Nenghai Yu and Gang Hua}, title = {Controllable Image Processing via Adaptive FilterBank Pyramid}, journal = {{IEEE} Trans. Image Process.}, volume = {29}, pages = {8043--8054}, year = {2020}, url = {https://doi.org/10.1109/TIP.2020.3009844}, doi = {10.1109/TIP.2020.3009844}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ChenFLAYYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/JinLCY20, author = {Zhenchao Jin and Bin Liu and Qi Chu and Nenghai Yu}, title = {SAFNet: {A} Semi-Anchor-Free Network With Enhanced Feature Pyramid for Object Detection}, journal = {{IEEE} Trans. Image Process.}, volume = {29}, pages = {9445--9457}, year = {2020}, url = {https://doi.org/10.1109/TIP.2020.3028196}, doi = {10.1109/TIP.2020.3028196}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/JinLCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/LiZCY20, author = {Li Li and Weiming Zhang and Kejiang Chen and Nenghai Yu}, title = {Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks}, journal = {{IEEE} Trans. Multim.}, volume = {22}, number = {10}, pages = {2526--2536}, year = {2020}, url = {https://doi.org/10.1109/TMM.2019.2959909}, doi = {10.1109/TMM.2019.2959909}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/LiZCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tog/TanCC0CYTY20, author = {Zhentao Tan and Menglei Chai and Dongdong Chen and Jing Liao and Qi Chu and Lu Yuan and Sergey Tulyakov and Nenghai Yu}, title = {MichiGAN: multi-input-conditioned hair image generation for portrait editing}, journal = {{ACM} Trans. Graph.}, volume = {39}, number = {4}, pages = {95}, year = {2020}, url = {https://doi.org/10.1145/3386569.3392488}, doi = {10.1145/3386569.3392488}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tog/TanCC0CYTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HongXXCWYH20, author = {Jianan Hong and Kaiping Xue and Yingjie Xue and Weikeng Chen and David S. L. Wei and Nenghai Yu and Peilin Hong}, title = {{TAFC:} Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {13}, number = {1}, pages = {158--171}, year = {2020}, url = {https://doi.org/10.1109/TSC.2017.2682090}, doi = {10.1109/TSC.2017.2682090}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/HongXXCWYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HuangLCJLZY20, author = {Jinyang Huang and Bin Liu and Chao Chen and Hongxin Jin and Zhiqiang Liu and Chi Zhang and Nenghai Yu}, title = {Towards Anti-Interference Human Activity Recognition Based on WiFi Subcarrier Correlation Selection}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {6}, pages = {6739--6754}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2989322}, doi = {10.1109/TVT.2020.2989322}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HuangLCJLZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ChuOLZY20, author = {Qi Chu and Wanli Ouyang and Bin Liu and Feng Zhu and Nenghai Yu}, title = {{DASOT:} {A} Unified Framework Integrating Data Association and Single Object Tracking for Online Multi-Object Tracking}, booktitle = {The Thirty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI} 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, {IAAI} 2020, The Tenth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2020, New York, NY, USA, February 7-12, 2020}, pages = {10672--10679}, publisher = {{AAAI} Press}, year = {2020}, url = {https://doi.org/10.1609/aaai.v34i07.6694}, doi = {10.1609/AAAI.V34I07.6694}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ChuOLZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhangCLFZZCY20, author = {Jie Zhang and Dongdong Chen and Jing Liao and Han Fang and Weiming Zhang and Wenbo Zhou and Hao Cui and Nenghai Yu}, title = {Model Watermarking for Image Processing Networks}, booktitle = {The Thirty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI} 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, {IAAI} 2020, The Tenth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2020, New York, NY, USA, February 7-12, 2020}, pages = {12805--12812}, publisher = {{AAAI} Press}, year = {2020}, url = {https://doi.org/10.1609/aaai.v34i07.6976}, doi = {10.1609/AAAI.V34I07.6976}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ZhangCLFZZCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/Yang0LY20, author = {Wenqiang Yang and Bin Liu and Changlei Lu and Nenghai Yu}, title = {Privacy Preserving on Updated Parameters in Federated Learning}, booktitle = {{ACM} TUR-C'20: {ACM} Turing Celebration Conference, Hefei, China, May 22-24, 2020}, pages = {27--31}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3393527.3393533}, doi = {10.1145/3393527.3393533}, timestamp = {Thu, 29 Oct 2020 17:15:54 +0100}, biburl = {https://dblp.org/rec/conf/acmturc/Yang0LY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZhouC0CDLZ0Y20, author = {Hang Zhou and Dongdong Chen and Jing Liao and Kejiang Chen and Xiaoyi Dong and Kunlin Liu and Weiming Zhang and Gang Hua and Nenghai Yu}, title = {{LG-GAN:} Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {10353--10362}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Zhou\_LG-GAN\_Label\_Guided\_Adversarial\_Network\_for\_Flexible\_Targeted\_Attack\_of\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.01037}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ZhouC0CDLZ0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/Dong0Z0ZY20, author = {Xiaoyi Dong and Dongdong Chen and Hang Zhou and Gang Hua and Weiming Zhang and Nenghai Yu}, title = {Self-Robust 3D Point Recognition via Gather-Vector Guidance}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {11513--11521}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Dong\_Self-Robust\_3D\_Point\_Recognition\_via\_Gather-Vector\_Guidance\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.01153}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/Dong0Z0ZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/DongHCLBMLWZY20, author = {Xiaoyi Dong and Jiangfan Han and Dongdong Chen and Jiayang Liu and Huanyu Bian and Zehua Ma and Hongsheng Li and Xiaogang Wang and Weiming Zhang and Nenghai Yu}, title = {Robust Superpixel-Guided Attentional Adversarial Attack}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {12892--12901}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Dong\_Robust\_Superpixel-Guided\_Attentional\_Adversarial\_Attack\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.01291}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/DongHCLBMLWZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LuWLZLCY20, author = {Yan Lu and Yue Wu and Bin Liu and Tianzhu Zhang and Baopu Li and Qi Chu and Nenghai Yu}, title = {Cross-Modality Person Re-Identification With Shared-Specific Feature Transfer}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {13376--13386}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Lu\_Cross-Modality\_Person\_Re-Identification\_With\_Shared-Specific\_Feature\_Transfer\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.01339}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LuWLZLCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LiLCCYY20, author = {Suichan Li and Bin Liu and Dongdong Chen and Qi Chu and Lu Yuan and Nenghai Yu}, title = {Density-Aware Graph for Deep Semi-Supervised Visual Recognition}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {13397--13406}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Li\_Density-Aware\_Graph\_for\_Deep\_Semi-Supervised\_Visual\_Recognition\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.01341}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LiLCCYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ChenLF0Y20, author = {Zhu Chen and Weihai Li and Chi Fei and Bin Liu and Nenghai Yu}, title = {Spatial-Temporal Feature Aggregation Network For Video Object Detection}, booktitle = {2020 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2020, Barcelona, Spain, May 4-8, 2020}, pages = {1858--1862}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICASSP40776.2020.9054080}, doi = {10.1109/ICASSP40776.2020.9054080}, timestamp = {Thu, 23 Jul 2020 16:19:28 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ChenLF0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ChenCZMLHXZY20, author = {Kejiang Chen and Yuefeng Chen and Hang Zhou and Xiaofeng Mao and Yuhong Li and Yuan He and Hui Xue and Weiming Zhang and Nenghai Yu}, title = {Self-Supervised Adversarial Training}, booktitle = {2020 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2020, Barcelona, Spain, May 4-8, 2020}, pages = {2218--2222}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICASSP40776.2020.9054475}, doi = {10.1109/ICASSP40776.2020.9054475}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ChenCZMLHXZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuYLY20, author = {Fei Hu and Yuanzhi Yao and Weihai Li and Nenghai Yu}, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {A Novel Visual Cryptography Scheme Shared with Edge Information Embedded {QR} Code}, booktitle = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12240}, pages = {86--97}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57881-7\_8}, doi = {10.1007/978-3-030-57881-7\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuYLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/CuiLYY20, author = {Zhouping Cui and Weihai Li and Chaohai Yu and Nenghai Yu}, title = {A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {68--73}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377651}, doi = {10.1145/3377644.3377651}, timestamp = {Thu, 30 Apr 2020 16:20:40 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/CuiLYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/ShiHZCGHY20, author = {Zhengguang Shi and Fan Huang and Mengce Zheng and Wenlong Cao and Ruizhe Gu and Honggang Hu and Nenghai Yu}, editor = {Pinle Qin and Hongzhi Wang and Guanglu Sun and Zeguang Lu}, title = {Research on Online Leakage Assessment}, booktitle = {Data Science - 6th International Conference of Pioneering Computer Scientists, Engineers and Educators, {ICPCSEE} 2020, Taiyuan, China, September 18-21, 2020, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1258}, pages = {138--150}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-7984-4\_11}, doi = {10.1007/978-981-15-7984-4\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icycsee/ShiHZCGHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/LiuC0Y20, author = {Qiankun Liu and Qi Chu and Bin Liu and Nenghai Yu}, editor = {Christian Bessiere}, title = {{GSM:} Graph Similarity Model for Multi-Object Tracking}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {530--536}, publisher = {ijcai.org}, year = {2020}, url = {https://doi.org/10.24963/ijcai.2020/74}, doi = {10.24963/IJCAI.2020/74}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/LiuC0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Huang0LCXW0Y20, author = {Jinyang Huang and Bin Liu and Pengfei Liu and Chao Chen and Ning Xiao and Yu Wu and Chi Zhang and Nenghai Yu}, title = {Towards Anti-interference WiFi-based Activity Recognition System Using Interference-Independent Phase Component}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {576--585}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOM41043.2020.9155536}, doi = {10.1109/INFOCOM41043.2020.9155536}, timestamp = {Mon, 10 Aug 2020 16:29:29 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Huang0LCXW0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/GuanFZZZY20, author = {Xiquan Guan and Huamin Feng and Weiming Zhang and Hang Zhou and Jie Zhang and Nenghai Yu}, editor = {Chang Wen Chen and Rita Cucchiara and Xian{-}Sheng Hua and Guo{-}Jun Qi and Elisa Ricci and Zhengyou Zhang and Roger Zimmermann}, title = {Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication}, booktitle = {{MM} '20: The 28th {ACM} International Conference on Multimedia, Virtual Event / Seattle, WA, USA, October 12-16, 2020}, pages = {2273--2280}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3394171.3413729}, doi = {10.1145/3394171.3413729}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/GuanFZZZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/CuiYY20, author = {Yabing Cui and Yuanzhi Yao and Nenghai Yu}, title = {Defining Embedding Distortion for Sample Adaptive Offset-Based {HEVC} Video Steganography}, booktitle = {22nd {IEEE} International Workshop on Multimedia Signal Processing, {MMSP} 2020, Tampere, Finland, September 21-24, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/MMSP48831.2020.9287075}, doi = {10.1109/MMSP48831.2020.9287075}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsp/CuiYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Dong0BQYZYC20, author = {Xiaoyi Dong and Dongdong Chen and Jianmin Bao and Chuan Qin and Lu Yuan and Weiming Zhang and Nenghai Yu and Dong Chen}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {GreedyFool: Distortion-Aware Sparse Adversarial Attack}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/8169e05e2a0debcb15458f2cc1eff0ea-Abstract.html}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/Dong0BQYZYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Zhang00Z0Y20, author = {Jie Zhang and Dongdong Chen and Jing Liao and Weiming Zhang and Gang Hua and Nenghai Yu}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {Passport-aware Normalization for Deep Model Protection}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/ff1418e8cc993fe8abcfe3ce2003e5c5-Abstract.html}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/Zhang00Z0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-11088, author = {Jie Zhang and Dongdong Chen and Jing Liao and Han Fang and Weiming Zhang and Wenbo Zhou and Hao Cui and Nenghai Yu}, title = {Model Watermarking for Image Processing Networks}, journal = {CoRR}, volume = {abs/2002.11088}, year = {2020}, url = {https://arxiv.org/abs/2002.11088}, eprinttype = {arXiv}, eprint = {2002.11088}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-11088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-12489, author = {Yan Lu and Yue Wu and Bin Liu and Tianzhu Zhang and Baopu Li and Qi Chu and Nenghai Yu}, title = {Cross-modality Person re-identification with Shared-Specific Feature Transfer}, journal = {CoRR}, volume = {abs/2002.12489}, year = {2020}, url = {https://arxiv.org/abs/2002.12489}, eprinttype = {arXiv}, eprint = {2002.12489}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-12489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13194, author = {Suichan Li and Bin Liu and Dongdong Chen and Qi Chu and Lu Yuan and Nenghai Yu}, title = {Density-Aware Graph for Deep Semi-Supervised Visual Recognition}, journal = {CoRR}, volume = {abs/2003.13194}, year = {2020}, url = {https://arxiv.org/abs/2003.13194}, eprinttype = {arXiv}, eprint = {2003.13194}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13194.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-02867, author = {Zhentao Tan and Dongdong Chen and Qi Chu and Menglei Chai and Jing Liao and Mingming He and Lu Yuan and Nenghai Yu}, title = {Rethinking Spatially-Adaptive Normalization}, journal = {CoRR}, volume = {abs/2004.02867}, year = {2020}, url = {https://arxiv.org/abs/2004.02867}, eprinttype = {arXiv}, eprint = {2004.02867}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-02867.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-05285, author = {Ping Wang and Ping Chen and Zhimin Luo and Gaofeng Dong and Mengce Zheng and Nenghai Yu and Honggang Hu}, title = {Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/2007.05285}, year = {2020}, url = {https://arxiv.org/abs/2007.05285}, eprinttype = {arXiv}, eprint = {2007.05285}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-05285.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-10240, author = {Zehua Ma and Weiming Zhang and Han Fang and Xiaoyi Dong and Linfeng Geng and Nenghai Yu}, title = {Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry}, journal = {CoRR}, volume = {abs/2007.10240}, year = {2020}, url = {https://arxiv.org/abs/2007.10240}, eprinttype = {arXiv}, eprint = {2007.10240}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-10240.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-08898, author = {Minhui Jin and Mengce Zheng and Honggang Hu and Nenghai Yu}, title = {An Enhanced Convolutional Neural Network in Side-Channel Attacks and Its Visualization}, journal = {CoRR}, volume = {abs/2009.08898}, year = {2020}, url = {https://arxiv.org/abs/2009.08898}, eprinttype = {arXiv}, eprint = {2009.08898}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-08898.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-10568, author = {Ruizhe Gu and Ping Wang and Mengce Zheng and Honggang Hu and Nenghai Yu}, title = {Adversarial Attack Based Countermeasures against Deep Learning Side-Channel Attacks}, journal = {CoRR}, volume = {abs/2009.10568}, year = {2020}, url = {https://arxiv.org/abs/2009.10568}, eprinttype = {arXiv}, eprint = {2009.10568}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-10568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13773, author = {Xiaoyi Dong and Dongdong Chen and Jianmin Bao and Chuan Qin and Lu Yuan and Weiming Zhang and Nenghai Yu and Dong Chen}, title = {GreedyFool: Distortion-Aware Sparse Adversarial Attack}, journal = {CoRR}, volume = {abs/2010.13773}, year = {2020}, url = {https://arxiv.org/abs/2010.13773}, eprinttype = {arXiv}, eprint = {2010.13773}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13773.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-15824, author = {Jie Zhang and Dongdong Chen and Jing Liao and Weiming Zhang and Gang Hua and Nenghai Yu}, title = {Passport-aware Normalization for Deep Model Protection}, journal = {CoRR}, volume = {abs/2010.15824}, year = {2020}, url = {https://arxiv.org/abs/2010.15824}, eprinttype = {arXiv}, eprint = {2010.15824}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-15824.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-16417, author = {Zhentao Tan and Menglei Chai and Dongdong Chen and Jing Liao and Qi Chu and Lu Yuan and Sergey Tulyakov and Nenghai Yu}, title = {MichiGAN: Multi-Input-Conditioned Hair Image Generation for Portrait Editing}, journal = {CoRR}, volume = {abs/2010.16417}, year = {2020}, url = {https://arxiv.org/abs/2010.16417}, eprinttype = {arXiv}, eprint = {2010.16417}, timestamp = {Wed, 16 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-16417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-00566, author = {Hang Zhou and Dongdong Chen and Jing Liao and Weiming Zhang and Kejiang Chen and Xiaoyi Dong and Kunlin Liu and Gang Hua and Nenghai Yu}, title = {{LG-GAN:} Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks}, journal = {CoRR}, volume = {abs/2011.00566}, year = {2020}, url = {https://arxiv.org/abs/2011.00566}, eprinttype = {arXiv}, eprint = {2011.00566}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-00566.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-03930, author = {Xiaoyi Dong and Jianmin Bao and Dongdong Chen and Weiming Zhang and Nenghai Yu and Dong Chen and Fang Wen and Baining Guo}, title = {Identity-Driven DeepFake Detection}, journal = {CoRR}, volume = {abs/2012.03930}, year = {2020}, url = {https://arxiv.org/abs/2012.03930}, eprinttype = {arXiv}, eprint = {2012.03930}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-03930.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-04644, author = {Zhentao Tan and Dongdong Chen and Qi Chu and Menglei Chai and Jing Liao and Mingming He and Lu Yuan and Gang Hua and Nenghai Yu}, title = {Semantic Image Synthesis via Efficient Class-Adaptive Normalization}, journal = {CoRR}, volume = {abs/2012.04644}, year = {2020}, url = {https://arxiv.org/abs/2012.04644}, eprinttype = {arXiv}, eprint = {2012.04644}, timestamp = {Wed, 16 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-04644.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-05899, author = {Suichan Li and Dongdong Chen and Yinpeng Chen and Lu Yuan and Lei Zhang and Qi Chu and Nenghai Yu}, title = {Are Fewer Labels Possible for Few-shot Learning?}, journal = {CoRR}, volume = {abs/2012.05899}, year = {2020}, url = {https://arxiv.org/abs/2012.05899}, eprinttype = {arXiv}, eprint = {2012.05899}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-05899.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-08323, author = {Tianyi Wei and Dongdong Chen and Wenbo Zhou and Jing Liao and Hanqing Zhao and Weiming Zhang and Nenghai Yu}, title = {Improved Image Matting via Real-time User Clicks and Uncertainty Estimation}, journal = {CoRR}, volume = {abs/2012.08323}, year = {2020}, url = {https://arxiv.org/abs/2012.08323}, eprinttype = {arXiv}, eprint = {2012.08323}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-08323.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCLDZYH20, author = {Ping Wang and Ping Chen and Zhimin Luo and Gaofeng Dong and Mengce Zheng and Nenghai Yu and Honggang Hu}, title = {Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2020}, url = {https://eprint.iacr.org/2020/867}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangCLDZYH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhaoLY19, author = {Zhe Zhao and Sian{-}Jheng Lin and Nenghai Yu}, title = {A Class of In-Place Linear Transformations Possessing the Cache-Oblivious Property}, journal = {{IEEE} Access}, volume = {7}, pages = {23068--23075}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2898994}, doi = {10.1109/ACCESS.2019.2898994}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhaoLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShenZFMY19, author = {Hao Shen and Weiming Zhang and Han Fang and Zehua Ma and Nenghai Yu}, title = {JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds}, journal = {{IEEE} Access}, volume = {7}, pages = {67483--67496}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2918261}, doi = {10.1109/ACCESS.2019.2918261}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShenZFMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuLWLY19, author = {Qiankun Liu and Bin Liu and Yue Wu and Weihai Li and Nenghai Yu}, title = {Real-Time Online Multi-Object Tracking in Compressed Domain}, journal = {{IEEE} Access}, volume = {7}, pages = {76489--76499}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2921975}, doi = {10.1109/ACCESS.2019.2921975}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuLWLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FeiLCY19, author = {Chi Fei and Bin Liu and Zhu Chen and Nenghai Yu}, title = {Learning Pixel-Level and Instance-Level Context-Aware Features for Pedestrian Detection in Crowds}, journal = {{IEEE} Access}, volume = {7}, pages = {94944--94953}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2928879}, doi = {10.1109/ACCESS.2019.2928879}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FeiLCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HongLLYY19, author = {Zheran Hong and Bin Liu and Yan Lu and Guojun Yin and Nenghai Yu}, title = {Scale Voting With Pyramidal Feature Fusion Network for Person Search}, journal = {{IEEE} Access}, volume = {7}, pages = {139692--139702}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2943112}, doi = {10.1109/ACCESS.2019.2943112}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HongLLYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhouZLY19, author = {Zheng Zhou and Weiming Zhang and Shangbin Li and Nenghai Yu}, title = {Potential risk of IoT device supporting {IR} remote control}, journal = {Comput. Networks}, volume = {148}, pages = {307--317}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.11.014}, doi = {10.1016/J.COMNET.2018.11.014}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhouZLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShuaiYWX19, author = {Mengxia Shuai and Nenghai Yu and Hongxia Wang and Ling Xiong}, title = {Anonymous authentication scheme for smart home environment with provable security}, journal = {Comput. Secur.}, volume = {86}, pages = {132--146}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.06.002}, doi = {10.1016/J.COSE.2019.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShuaiYWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/ChenLY19, author = {Cheng Chen and Sian{-}Jheng Lin and Nenghai Yu}, title = {Irregular {MDS} Array Codes With Fewer Parity Symbols}, journal = {{IEEE} Commun. Lett.}, volume = {23}, number = {11}, pages = {1909--1912}, year = {2019}, url = {https://doi.org/10.1109/LCOMM.2019.2937778}, doi = {10.1109/LCOMM.2019.2937778}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/ChenLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/ZhouLCZZY19, author = {Wenbo Zhou and Weixiang Li and Kejiang Chen and Hang Zhou and Weiming Zhang and Nenghai Yu}, title = {Controversial 'pixel' prior rule for {JPEG} adaptive steganography}, journal = {{IET} Image Process.}, volume = {13}, number = {1}, pages = {24--33}, year = {2019}, url = {https://doi.org/10.1049/iet-ipr.2018.5401}, doi = {10.1049/IET-IPR.2018.5401}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/ZhouLCZZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/ShahZHDY19, author = {Mohsin Shah and Weiming Zhang and Honggang Hu and Xiaojuan Dong and Nenghai Yu}, title = {Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem}, journal = {{IET} Image Process.}, volume = {13}, number = {10}, pages = {1705--1713}, year = {2019}, url = {https://doi.org/10.1049/iet-ipr.2018.6120}, doi = {10.1049/IET-IPR.2018.6120}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/ShahZHDY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/GongLCY19, author = {Tao Gong and Bin Liu and Qi Chu and Nenghai Yu}, title = {Using multi-label classification to improve object detection}, journal = {Neurocomputing}, volume = {370}, pages = {174--185}, year = {2019}, url = {https://doi.org/10.1016/j.neucom.2019.08.089}, doi = {10.1016/J.NEUCOM.2019.08.089}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/GongLCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouZYY19, author = {Zheng Zhou and Weiming Zhang and Zichong Yang and Nenghai Yu}, title = {Optical Exfiltration of Data via Keyboard {LED} Status Indicators to {IP} Cameras}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {1541--1550}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2842116}, doi = {10.1109/JIOT.2018.2842116}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhouZYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XueMLWZY19, author = {Kaiping Xue and Wei Meng and Shaohua Li and David S. L. Wei and Huancheng Zhou and Nenghai Yu}, title = {A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {5485--5499}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2902907}, doi = {10.1109/JIOT.2019.2902907}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XueMLWZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuXLTHHY19, author = {Jie Xu and Kaiping Xue and Shaohua Li and Hangyu Tian and Jianan Hong and Peilin Hong and Nenghai Yu}, title = {Healthchain: {A} Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {8770--8781}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2923525}, doi = {10.1109/JIOT.2019.2923525}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XuXLTHHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/TangLY19, author = {Wenyi Tang and Bin Liu and Nenghai Yu}, title = {Anomaly residual prediction with spatial-temporal and perceptual constraints}, journal = {J. Electronic Imaging}, volume = {28}, number = {6}, pages = {063004}, year = {2019}, url = {https://doi.org/10.1117/1.JEI.28.6.063004}, doi = {10.1117/1.JEI.28.6.063004}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/TangLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiZCZY19, author = {Li Li and Weiming Zhang and Kejiang Chen and Hongyue Zha and Nenghai Yu}, title = {Side Channel Steganalysis: When Behavior is Considered in Steganographer Detection}, journal = {Multim. Tools Appl.}, volume = {78}, number = {7}, pages = {8041--8055}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6582-4}, doi = {10.1007/S11042-018-6582-4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiZCZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/FangZMZY19, author = {Han Fang and Hang Zhou and Zehua Ma and Weiming Zhang and Nenghai Yu}, title = {A robust image watermarking scheme in {DCT} domain based on adaptive texture direction quantization}, journal = {Multim. Tools Appl.}, volume = {78}, number = {7}, pages = {8075--8089}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6596-y}, doi = {10.1007/S11042-018-6596-Y}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/FangZMZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WuZYZY19, author = {Yaojun Wu and Yonghe Zhu and Yang Yang and Weiming Zhang and Nenghai Yu}, title = {A no-reference quality assessment for contrast-distorted image based on improved learning method}, journal = {Multim. Tools Appl.}, volume = {78}, number = {8}, pages = {10057--10076}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6524-1}, doi = {10.1007/S11042-018-6524-1}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WuZYZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiLLY19, author = {Xiaodan Li and Weihai Li and Bin Liu and Nenghai Yu}, title = {Object and patch based anomaly detection and localization in crowded scenes}, journal = {Multim. Tools Appl.}, volume = {78}, number = {15}, pages = {21375--21390}, year = {2019}, url = {https://doi.org/10.1007/s11042-019-7447-1}, doi = {10.1007/S11042-019-7447-1}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShuaiLYX19, author = {Mengxia Shuai and Bin Liu and Nenghai Yu and Ling Xiong}, title = {Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8145087:1--8145087:14}, year = {2019}, url = {https://doi.org/10.1155/2019/8145087}, doi = {10.1155/2019/8145087}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShuaiLYX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YaoZWZY19, author = {Yuanzhi Yao and Weiming Zhang and Hui Wang and Hang Zhou and Nenghai Yu}, title = {Content-adaptive reversible visible watermarking in encrypted images}, journal = {Signal Process.}, volume = {164}, pages = {386--401}, year = {2019}, url = {https://doi.org/10.1016/j.sigpro.2019.06.034}, doi = {10.1016/J.SIGPRO.2019.06.034}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/YaoZWZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/LinHY19, author = {Sian{-}Jheng Lin and Yunghsiang S. Han and Nenghai Yu}, title = {New Locally Correctable Codes Based on Projective Reed-Muller Codes}, journal = {{IEEE} Trans. Commun.}, volume = {67}, number = {6}, pages = {3834--3841}, year = {2019}, url = {https://doi.org/10.1109/TCOMM.2019.2900039}, doi = {10.1109/TCOMM.2019.2900039}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/LinHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/HouZCLY19, author = {Dongdong Hou and Weiming Zhang and Kejiang Chen and Sian{-}Jheng Lin and Nenghai Yu}, title = {Reversible Data Hiding in Color Image With Grayscale Invariance}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {29}, number = {2}, pages = {363--374}, year = {2019}, url = {https://doi.org/10.1109/TCSVT.2018.2803303}, doi = {10.1109/TCSVT.2018.2803303}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/HouZCLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangXXWLY19, author = {Qingyou Yang and Kaiping Xue and Jie Xu and Jiajie Wang and Fenghua Li and Nenghai Yu}, title = {AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {2}, pages = {486--497}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2854740}, doi = {10.1109/TIFS.2018.2854740}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangXXWLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZZZY19, author = {Kejiang Chen and Hang Zhou and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Defining Cost Functions for Adaptive {JPEG} Steganography at the Microscale}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {4}, pages = {1052--1066}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2869353}, doi = {10.1109/TIFS.2018.2869353}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenZZZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangZZCY19, author = {Han Fang and Weiming Zhang and Hang Zhou and Hao Cui and Nenghai Yu}, title = {Screen-Shooting Resilient Watermarking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {6}, pages = {1403--1418}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2878541}, doi = {10.1109/TIFS.2018.2878541}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FangZZCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ZhouCZYY19, author = {Hang Zhou and Kejiang Chen and Weiming Zhang and Yuanzhi Yao and Nenghai Yu}, title = {Distortion Design for Secure Adaptive 3-D Mesh Steganography}, journal = {{IEEE} Trans. Multim.}, volume = {21}, number = {6}, pages = {1384--1398}, year = {2019}, url = {https://doi.org/10.1109/TMM.2018.2882088}, doi = {10.1109/TMM.2018.2882088}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/ZhouCZYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/ShahZHY19, author = {Mohsin Shah and Weiming Zhang and Honggang Hu and Nenghai Yu}, title = {Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {15}, number = {3}, pages = {76:1--76:21}, year = {2019}, url = {https://doi.org/10.1145/3325194}, doi = {10.1145/3325194}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/ShahZHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/LiuZYBQYL19, author = {Guoqing Liu and Li Zhao and Feidiao Yang and Jiang Bian and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, title = {Trust Region Evolution Strategies}, booktitle = {The Thirty-Third {AAAI} Conference on Artificial Intelligence, {AAAI} 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, {IAAI} 2019, The Ninth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019}, pages = {4352--4359}, publisher = {{AAAI} Press}, year = {2019}, url = {https://doi.org/10.1609/aaai.v33i01.33014352}, doi = {10.1609/AAAI.V33I01.33014352}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/LiuZYBQYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhengMZ0YL19, author = {Shuxin Zheng and Qi Meng and Huishuai Zhang and Wei Chen and Nenghai Yu and Tie{-}Yan Liu}, title = {Capacity Control of ReLU Neural Networks by Basis-Path Norm}, booktitle = {The Thirty-Third {AAAI} Conference on Artificial Intelligence, {AAAI} 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, {IAAI} 2019, The Ninth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019}, pages = {5925--5932}, publisher = {{AAAI} Press}, year = {2019}, url = {https://doi.org/10.1609/aaai.v33i01.33015925}, doi = {10.1609/AAAI.V33I01.33015925}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/ZhengMZ0YL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/YinLSYWS19, author = {Guojun Yin and Bin Liu and Lu Sheng and Nenghai Yu and Xiaogang Wang and Jing Shao}, title = {Semantics Disentangling for Text-To-Image Generation}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2019, Long Beach, CA, USA, June 16-20, 2019}, pages = {2327--2336}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2019}, url = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Yin\_Semantics\_Disentangling\_for\_Text-To-Image\_Generation\_CVPR\_2019\_paper.html}, doi = {10.1109/CVPR.2019.00243}, timestamp = {Mon, 30 Aug 2021 17:01:14 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/YinLSYWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LiuZZHLZY19, author = {Jiayang Liu and Weiming Zhang and Yiwei Zhang and Dongdong Hou and Yujia Liu and Hongyue Zha and Nenghai Yu}, title = {Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2019, Long Beach, CA, USA, June 16-20, 2019}, pages = {4825--4834}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2019}, url = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Liu\_Detection\_Based\_Defense\_Against\_Adversarial\_Examples\_From\_the\_Steganalysis\_Point\_CVPR\_2019\_paper.html}, doi = {10.1109/CVPR.2019.00496}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LiuZZHLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/YinSLYWS19, author = {Guojun Yin and Lu Sheng and Bin Liu and Nenghai Yu and Xiaogang Wang and Jing Shao}, title = {Context and Attribute Grounded Dense Captioning}, booktitle = {{IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2019, Long Beach, CA, USA, June 16-20, 2019}, pages = {6241--6250}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2019}, url = {http://openaccess.thecvf.com/content\_CVPR\_2019/html/Yin\_Context\_and\_Attribute\_Grounded\_Dense\_Captioning\_CVPR\_2019\_paper.html}, doi = {10.1109/CVPR.2019.00640}, timestamp = {Mon, 20 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/YinSLYWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/ZhouCZFZY19, author = {Hang Zhou and Kejiang Chen and Weiming Zhang and Han Fang and Wenbo Zhou and Nenghai Yu}, title = {DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense}, booktitle = {2019 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2019, Seoul, Korea (South), October 27 - November 2, 2019}, pages = {1961--1970}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCV.2019.00205}, doi = {10.1109/ICCV.2019.00205}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccv/ZhouCZFZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/HanDZ0ZY0019, author = {Jiangfan Han and Xiaoyi Dong and Ruimao Zhang and Dongdong Chen and Weiming Zhang and Nenghai Yu and Ping Luo and Xiaogang Wang}, title = {Once a {MAN:} Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once}, booktitle = {2019 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2019, Seoul, Korea (South), October 27 - November 2, 2019}, pages = {5157--5166}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCV.2019.00526}, doi = {10.1109/ICCV.2019.00526}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/HanDZ0ZY0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/LiCLYZ19, author = {Suichan Li and Dapeng Chen and Bin Liu and Nenghai Yu and Rui Zhao}, title = {Memory-Based Neighbourhood Embedding for Visual Recognition}, booktitle = {2019 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2019, Seoul, Korea (South), October 27 - November 2, 2019}, pages = {6101--6110}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCV.2019.00620}, doi = {10.1109/ICCV.2019.00620}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccv/LiCLYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/HongCTLLY19, author = {Zheran Hong and Sheng Chen and Zhentao Tan and Qiankun Liu and Bin Liu and Nenghai Yu}, editor = {Yao Zhao and Nick Barnes and Baoquan Chen and R{\"{u}}diger Westermann and Xiangwei Kong and Chunyu Lin}, title = {Enhanced Video Segmentation with Object Tracking}, booktitle = {Image and Graphics - 10th International Conference, {ICIG} 2019, Beijing, China, August 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11901}, pages = {381--392}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34120-6\_31}, doi = {10.1007/978-3-030-34120-6\_31}, timestamp = {Fri, 09 Apr 2021 18:44:46 +0200}, biburl = {https://dblp.org/rec/conf/icig/HongCTLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/ZhaoLLY19, author = {Zhiwei Zhao and Bin Liu and Weihai Li and Nenghai Yu}, editor = {Yao Zhao and Nick Barnes and Baoquan Chen and R{\"{u}}diger Westermann and Xiangwei Kong and Chunyu Lin}, title = {Learning Cross Camera Invariant Features with {CCSC} Loss for Person Re-identification}, booktitle = {Image and Graphics - 10th International Conference, {ICIG} 2019, Beijing, China, August 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11901}, pages = {429--441}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34120-6\_35}, doi = {10.1007/978-3-030-34120-6\_35}, timestamp = {Tue, 31 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/ZhaoLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icigp/HouZLZCY19, author = {Dongdong Hou and Weiming Zhang and Jiayang Liu and Siyan Zhou and Dongdong Chen and Nenghai Yu}, editor = {Xudong Jiang and Lipo Wang and Nobuhiko Mukai and Lih{-}Shyang Chen}, title = {Emerging applications of reversible data hiding}, booktitle = {Proceedings of the 2nd International Conference on Image and Graphics Processing, {ICIGP} '19, Singapore, February 23-25, 2019}, pages = {105--109}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3313950.3313952}, doi = {10.1145/3313950.3313952}, timestamp = {Fri, 22 Sep 2023 15:13:41 +0200}, biburl = {https://dblp.org/rec/conf/icigp/HouZLZCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhaoLSLY19, author = {Kun Zhao and Bin Liu and Luchuan Song and Weihai Li and Nenghai Yu}, title = {Cascaded Residual Density Network for Crowd Counting}, booktitle = {2019 {IEEE} International Conference on Image Processing, {ICIP} 2019, Taipei, Taiwan, September 22-25, 2019}, pages = {2199--2203}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICIP.2019.8803208}, doi = {10.1109/ICIP.2019.8803208}, timestamp = {Tue, 31 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/ZhaoLSLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhaZQY19, author = {Hongyue Zha and Weiming Zhang and Chuan Qin and Nenghai Yu}, title = {Direct Adversarial Attack on Stego Sandwiched Between Black Boxes}, booktitle = {2019 {IEEE} International Conference on Image Processing, {ICIP} 2019, Taipei, Taiwan, September 22-25, 2019}, pages = {2284--2288}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICIP.2019.8804415}, doi = {10.1109/ICIP.2019.8804415}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/ZhaZQY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LuHLLY19, author = {Yan Lu and Zheran Hong and Bin Liu and Weihai Li and Nenghai Yu}, title = {Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion}, booktitle = {2019 {IEEE} International Conference on Image Processing, {ICIP} 2019, Taipei, Taiwan, September 22-25, 2019}, pages = {3935--3939}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICIP.2019.8803580}, doi = {10.1109/ICIP.2019.8803580}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/LuHLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/MengZZCYMYL19, author = {Qi Meng and Shuxin Zheng and Huishuai Zhang and Wei Chen and Qiwei Ye and Zhi{-}Ming Ma and Nenghai Yu and Tie{-}Yan Liu}, title = {{G-SGD:} Optimizing ReLU Neural Networks in its Positively Scale-Invariant Space}, booktitle = {7th International Conference on Learning Representations, {ICLR} 2019, New Orleans, LA, USA, May 6-9, 2019}, publisher = {OpenReview.net}, year = {2019}, url = {https://openreview.net/forum?id=SyxfEn09Y7}, timestamp = {Thu, 25 Jul 2019 13:03:15 +0200}, biburl = {https://dblp.org/rec/conf/iclr/MengZZCYMYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiuZY19, author = {Yujia Liu and Weiming Zhang and Nenghai Yu}, title = {Query-Free Embedding Attack Against Deep Learning}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2019, Shanghai, China, July 8-12, 2019}, pages = {380--386}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICME.2019.00073}, doi = {10.1109/ICME.2019.00073}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LiuZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/TanLLY19, author = {Zhengtao Tan and Bin Liu and Weihai Li and Nenghai Yu}, title = {Real Time Compressed Video Object Segmentation}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2019, Shanghai, China, July 8-12, 2019}, pages = {628--633}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICME.2019.00114}, doi = {10.1109/ICME.2019.00114}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/TanLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YangLLY19, author = {Wenfei Yang and Bin Liu and Weihai Li and Nenghai Yu}, title = {Tracking Assisted Faster Video Object Detection}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2019, Shanghai, China, July 8-12, 2019}, pages = {1750--1755}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICME.2019.00301}, doi = {10.1109/ICME.2019.00301}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/YangLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CuiBZY19a, author = {Hao Cui and Huanyu Bian and Weiming Zhang and Nenghai Yu}, title = {Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo)}, booktitle = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May 2, 2019}, pages = {963--964}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFCOMW.2019.8845179}, doi = {10.1109/INFCOMW.2019.8845179}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CuiBZY19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CuiBZY19, author = {Hao Cui and Huanyu Bian and Weiming Zhang and Nenghai Yu}, title = {UnseenCode: Invisible On-screen Barcode with Image-based Extraction}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {1315--1323}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737627}, doi = {10.1109/INFOCOM.2019.8737627}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CuiBZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/ZhongTLLY19, author = {Hangshi Zhong and Zhentao Tan and Bin Liu and Weihai Li and Nenghai Yu}, title = {{PPML:} Metric Learning with Prior Probability for Video Object Segmentation}, booktitle = {2019 {IEEE} Visual Communications and Image Processing, {VCIP} 2019, Sydney, Australia, December 1-4, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VCIP47243.2019.8965961}, doi = {10.1109/VCIP47243.2019.8965961}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vcip/ZhongTLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/ChenLY19, author = {Xiaojiao Chen and Sian{-}Jheng Lin and Nenghai Yu}, title = {Bitcoin Blockchain Compression Algorithm for Blank Node Synchronization}, booktitle = {11th International Conference on Wireless Communications and Signal Processing, {WCSP} 2019, Xi'an, China, October 23-25, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WCSP.2019.8928104}, doi = {10.1109/WCSP.2019.8928104}, timestamp = {Tue, 17 Dec 2019 14:06:26 +0100}, biburl = {https://dblp.org/rec/conf/wcsp/ChenLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-00676, author = {Zheng Zhou and Weiming Zhang and Nenghai Yu}, title = {Data Exfiltration via Multipurpose {RFID} Cards and Countermeasures}, journal = {CoRR}, volume = {abs/1902.00676}, year = {2019}, url = {http://arxiv.org/abs/1902.00676}, eprinttype = {arXiv}, eprint = {1902.00676}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-00676.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-01410, author = {Guojun Yin and Lu Sheng and Bin Liu and Nenghai Yu and Xiaogang Wang and Jing Shao}, title = {Context and Attribute Grounded Dense Captioning}, journal = {CoRR}, volume = {abs/1904.01410}, year = {2019}, url = {http://arxiv.org/abs/1904.01410}, eprinttype = {arXiv}, eprint = {1904.01410}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-01410.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-01480, author = {Guojun Yin and Bin Liu and Lu Sheng and Nenghai Yu and Xiaogang Wang and Jing Shao}, title = {Semantics Disentangling for Text-to-Image Generation}, journal = {CoRR}, volume = {abs/1904.01480}, year = {2019}, url = {http://arxiv.org/abs/1904.01480}, eprinttype = {arXiv}, eprint = {1904.01480}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-01480.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-11784, author = {Guojun Yin and Bin Liu and Huihui Zhu and Tao Gong and Nenghai Yu}, title = {A Large Scale Urban Surveillance Video Dataset for Multiple-Object Tracking and Behavior Analysis}, journal = {CoRR}, volume = {abs/1904.11784}, year = {2019}, url = {http://arxiv.org/abs/1904.11784}, eprinttype = {arXiv}, eprint = {1904.11784}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-11784.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-05852, author = {Qingnan Fan and Dongdong Chen and Lu Yuan and Gang Hua and Nenghai Yu and Baoquan Chen}, title = {A General Decoupled Learning Framework for Parameterized Image Operators}, journal = {CoRR}, volume = {abs/1907.05852}, year = {2019}, url = {http://arxiv.org/abs/1907.05852}, eprinttype = {arXiv}, eprint = {1907.05852}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-05852.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-04992, author = {Suichan Li and Dapeng Chen and Bin Liu and Nenghai Yu and Rui Zhao}, title = {Memory-Based Neighbourhood Embedding for Visual Recognition}, journal = {CoRR}, volume = {abs/1908.04992}, year = {2019}, url = {http://arxiv.org/abs/1908.04992}, eprinttype = {arXiv}, eprint = {1908.04992}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-04992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-05185, author = {Jiangfan Han and Xiaoyi Dong and Ruimao Zhang and Dongdong Chen and Weiming Zhang and Nenghai Yu and Ping Luo and Xiaogang Wang}, title = {Once a {MAN:} Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once}, journal = {CoRR}, volume = {abs/1908.05185}, year = {2019}, url = {http://arxiv.org/abs/1908.05185}, eprinttype = {arXiv}, eprint = {1908.05185}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-05185.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-06470, author = {Kejiang Chen and Hang Zhou and Yuefeng Chen and Xiaofeng Mao and Yuhong Li and Yuan He and Hui Xue and Weiming Zhang and Nenghai Yu}, title = {Self-supervised Adversarial Training}, journal = {CoRR}, volume = {abs/1911.06470}, year = {2019}, url = {http://arxiv.org/abs/1911.06470}, eprinttype = {arXiv}, eprint = {1911.06470}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-06470.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-09034, author = {Xiaojuan Dong and Weiming Zhang and Mohsin Shah and Bei Wang and Nenghai Yu}, title = {A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret}, journal = {CoRR}, volume = {abs/1912.09034}, year = {2019}, url = {http://arxiv.org/abs/1912.09034}, eprinttype = {arXiv}, eprint = {1912.09034}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-09034.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijig/LuLLY18, author = {Yan Lu and Bin Liu and Weihai Li and Nenghai Yu}, title = {Fast Video Stitching for Aerially Captured {HD} Videos}, journal = {Int. J. Image Graph.}, volume = {18}, number = {3}, pages = {1850018:1--1850018:13}, year = {2018}, url = {https://doi.org/10.1142/S0219467818500183}, doi = {10.1142/S0219467818500183}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijig/LuLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/HouQYZ18, author = {Dongdong Hou and Chuan Qin and Nenghai Yu and Weiming Zhang}, title = {Reversible visual transformation via exploring the correlations within color images}, journal = {J. Vis. Commun. Image Represent.}, volume = {53}, pages = {134--145}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2017.11.014}, doi = {10.1016/J.JVCIR.2017.11.014}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/HouQYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/ZhouCZQY18, author = {Hang Zhou and Kejiang Chen and Weiming Zhang and Zhenxing Qian and Nenghai Yu}, title = {Targeted attack and security enhancement on texture synthesis based steganography}, journal = {J. Vis. Commun. Image Represent.}, volume = {54}, pages = {100--107}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2018.04.011}, doi = {10.1016/J.JVCIR.2018.04.011}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/ZhouCZQY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/JiangZHWY18, author = {Ruiqi Jiang and Weiming Zhang and Dongdong Hou and Hui Wang and Nenghai Yu}, title = {Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification}, journal = {Multim. Tools Appl.}, volume = {77}, number = {5}, pages = {5263--5280}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4430-6}, doi = {10.1007/S11042-017-4430-6}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/JiangZHWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WeiZLYS18, author = {Yao Wei and Weiming Zhang and Weihai Li and Nenghai Yu and Xi Sun}, title = {Which gray level should be given the smallest cost for adaptive steganography?}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {17861--17874}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4565-5}, doi = {10.1007/S11042-017-4565-5}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WeiZLYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangZLY18, author = {Yang Yang and Weiming Zhang and Dong Liang and Nenghai Yu}, title = {A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {18043--18065}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4444-0}, doi = {10.1007/S11042-017-4444-0}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YangZLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/XueHMWHY18, author = {Kaiping Xue and Jianan Hong and Yongjin Ma and David S. L. Wei and Peilin Hong and Nenghai Yu}, title = {Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {7--13}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700341}, doi = {10.1109/MNET.2018.1700341}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/XueHMWHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/HouWZY18, author = {Dongdong Hou and Haoqian Wang and Weiming Zhang and Nenghai Yu}, title = {Reversible data hiding in {JPEG} image based on {DCT} frequency and block selection}, journal = {Signal Process.}, volume = {148}, pages = {41--47}, year = {2018}, url = {https://doi.org/10.1016/j.sigpro.2018.02.002}, doi = {10.1016/J.SIGPRO.2018.02.002}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/HouWZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZhuWY18, author = {Feng Zhu and Xiaogang Wang and Nenghai Yu}, title = {Crowd Tracking by Group Structure Evolution}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {28}, number = {3}, pages = {772--786}, year = {2018}, url = {https://doi.org/10.1109/TCSVT.2016.2615460}, doi = {10.1109/TCSVT.2016.2615460}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ZhuWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/HouZYY18, author = {Dongdong Hou and Weiming Zhang and Yang Yang and Nenghai Yu}, title = {Reversible Data Hiding Under Inconsistent Distortion Metrics}, journal = {{IEEE} Trans. Image Process.}, volume = {27}, number = {10}, pages = {5087--5099}, year = {2018}, url = {https://doi.org/10.1109/TIP.2018.2851074}, doi = {10.1109/TIP.2018.2851074}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/HouZYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/JiangZZY18, author = {Ruiqi Jiang and Hang Zhou and Weiming Zhang and Nenghai Yu}, title = {Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models}, journal = {{IEEE} Trans. Multim.}, volume = {20}, number = {1}, pages = {55--67}, year = {2018}, url = {https://doi.org/10.1109/TMM.2017.2723244}, doi = {10.1109/TMM.2017.2723244}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/JiangZZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/avr/FangbemiLYZ18, author = {Abassin Sourou Fangbemi and Bin Liu and Nenghai Yu and Yanxiang Zhang}, editor = {Lucio Tommaso De Paolis and Patrick Bourdot}, title = {Efficient Human Action Recognition Interface for Augmented and Virtual Reality Applications Based on Binary Descriptor}, booktitle = {Augmented Reality, Virtual Reality, and Computer Graphics - 5th International Conference, {AVR} 2018, Otranto, Italy, June 24-27, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10850}, pages = {252--260}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95270-3\_21}, doi = {10.1007/978-3-319-95270-3\_21}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/avr/FangbemiLYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ChenYLYH18, author = {Dongdong Chen and Lu Yuan and Jing Liao and Nenghai Yu and Gang Hua}, title = {Stereoscopic Neural Style Transfer}, booktitle = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2018, Salt Lake City, UT, USA, June 18-22, 2018}, pages = {6654--6663}, publisher = {Computer Vision Foundation / {IEEE} Computer Society}, year = {2018}, url = {http://openaccess.thecvf.com/content\_cvpr\_2018/html/Chen\_Stereoscopic\_Neural\_Style\_CVPR\_2018\_paper.html}, doi = {10.1109/CVPR.2018.00696}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/ChenYLYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/DiaoWZLY18, author = {Wen Diao and Yuanxin Wu and Weiming Zhang and Bin Liu and Nenghai Yu}, title = {Robust Audio Watermarking Algorithm Based on Air Channel Characteristics}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {288--293}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00048}, doi = {10.1109/DSC.2018.00048}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/DiaoWZLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/QinZZY18, author = {Chuan Qin and Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Ensemble Steganography}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {582--587}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00093}, doi = {10.1109/DSC.2018.00093}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/QinZZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/YinSLYWSL18, author = {Guojun Yin and Lu Sheng and Bin Liu and Nenghai Yu and Xiaogang Wang and Jing Shao and Chen Change Loy}, editor = {Vittorio Ferrari and Martial Hebert and Cristian Sminchisescu and Yair Weiss}, title = {Zoom-Net: Mining Deep Feature Interactions for Visual Relationship Recognition}, booktitle = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11207}, pages = {330--347}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01219-9\_20}, doi = {10.1007/978-3-030-01219-9\_20}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eccv/YinSLYWSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/FanCYHYC18, author = {Qingnan Fan and Dongdong Chen and Lu Yuan and Gang Hua and Nenghai Yu and Baoquan Chen}, editor = {Vittorio Ferrari and Martial Hebert and Cristian Sminchisescu and Yair Weiss}, title = {Decouple Learning for Parameterized Image Operators}, booktitle = {Computer Vision - {ECCV} 2018 - 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part {XIII}}, series = {Lecture Notes in Computer Science}, volume = {11217}, pages = {455--471}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01261-8\_27}, doi = {10.1007/978-3-030-01261-8\_27}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eccv/FanCYHYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LiLLLY18, author = {Xiaodan Li and Weihai Li and Bin Liu and Qiankun Liu and Nenghai Yu}, title = {Object-Oriented Anomaly Detection in Surveillance Videos}, booktitle = {2018 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2018, Calgary, AB, Canada, April 15-20, 2018}, pages = {1907--1911}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICASSP.2018.8461422}, doi = {10.1109/ICASSP.2018.8461422}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/LiLLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HuZZY18, author = {Huanhuan Hu and Xin Zuo and Weiming Zhang and Nenghai Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Covert Communication by Exploring Statistical and Linguistical Distortion in Text}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {288--301}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_25}, doi = {10.1007/978-3-030-00015-8\_25}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/HuZZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZuoHZY18, author = {Xin Zuo and Huanhuan Hu and Weiming Zhang and Nenghai Yu}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Text Semantic Steganalysis Based on Word Embedding}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11066}, pages = {485--495}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00015-8\_42}, doi = {10.1007/978-3-030-00015-8\_42}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZuoHZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimcs/FangbemiLYZ18, author = {Abassin Sourou Fangbemi and Bin Liu and Nenghai Yu and Yanxiang Zhang}, title = {Binary "proximity patches motion" descriptor for action recognition in videos}, booktitle = {Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, Nanjing, China, August 17-19, 2018}, pages = {17:1--17:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3240876.3240893}, doi = {10.1145/3240876.3240893}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icimcs/FangbemiLYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WangLLY18, author = {Guokun Wang and Bin Liu and Weihai Li and Nenghai Yu}, title = {Flow Guided Siamese Network for Visual Tracking}, booktitle = {2018 {IEEE} International Conference on Image Processing, {ICIP} 2018, Athens, Greece, October 7-10, 2018}, pages = {231--235}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICIP.2018.8451324}, doi = {10.1109/ICIP.2018.8451324}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/WangLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/GongLLY18, author = {Tao Gong and Bin Liu and Weihai Li and Nenghai Yu}, title = {Pyramid Sub-Region Sensitive Network for Object Detection}, booktitle = {2018 {IEEE} International Conference on Image Processing, {ICIP} 2018, Athens, Greece, October 7-10, 2018}, pages = {1303--1307}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICIP.2018.8451801}, doi = {10.1109/ICIP.2018.8451801}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/GongLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/ZhaoLLYL18, author = {Kun Zhao and Bin Liu and Weihai Li and Nenghai Yu and Zhiqiang Liu}, title = {Anomaly Detection and Localization: {A} Novel Two-Phase Framework Based on Trajectory-Level Characteristics}, booktitle = {2018 {IEEE} International Conference on Multimedia {\&} Expo Workshops, {ICME} Workshops 2018, San Diego, CA, USA, July 23-27, 2018}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICMEW.2018.8551517}, doi = {10.1109/ICMEW.2018.8551517}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/ZhaoLLYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/XiaTTQYL18, author = {Yingce Xia and Xu Tan and Fei Tian and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, editor = {Jennifer G. Dy and Andreas Krause}, title = {Model-Level Dual Learning}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {5379--5388}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/xia18a.html}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/XiaTTQYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icvip/ZhuLLLY18, author = {Huihui Zhu and Bin Liu and Yan Lu and Weihai Li and Nenghai Yu}, title = {Real-time Anomaly Detection with {HMOF} Feature}, booktitle = {Proceedings of the 2nd International Conference on Video and Image Processing, {ICVIP} 2018, Hong Kong, China, December 29-31, 2018}, pages = {49--54}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3301506.3301510}, doi = {10.1145/3301506.3301510}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icvip/ZhuLLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiZCZY18, author = {Weixiang Li and Weiming Zhang and Kejiang Chen and Wenbo Zhou and Nenghai Yu}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Defining Joint Distortion for {JPEG} Steganography}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {5--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206008}, doi = {10.1145/3206004.3206008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiZCZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangZCLLY18, author = {Yiwei Zhang and Weiming Zhang and Kejiang Chen and Jiayang Liu and Yujia Liu and Nenghai Yu}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Adversarial Examples Against Deep Neural Network based Steganalysis}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {67--72}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206012}, doi = {10.1145/3206004.3206012}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangZCLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbi/ChenWSLY18, author = {Sheng Chen and Zhe Wang and Jianping Shi and Bin Liu and Nenghai Yu}, title = {A multi-task framework with feature passing module for skin lesion classification and segmentation}, booktitle = {15th {IEEE} International Symposium on Biomedical Imaging, {ISBI} 2018, Washington, DC, USA, April 4-7, 2018}, pages = {1126--1129}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBI.2018.8363769}, doi = {10.1109/ISBI.2018.8363769}, timestamp = {Wed, 04 Oct 2023 17:01:25 +0200}, biburl = {https://dblp.org/rec/conf/isbi/ChenWSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YangCZY18, author = {Kuan Yang and Kejiang Chen and Weiming Zhang and Nenghai Yu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Provably Secure Generative Steganography Based on Autoregressive Model}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {55--68}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_5}, doi = {10.1007/978-3-030-11389-6\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YangCZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YuCZWY18, author = {Xinzhi Yu and Kejiang Chen and Weiming Zhang and Yaofei Wang and Nenghai Yu}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Improving the Embedding Strategy for Batch Adaptive Steganography}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {248--260}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_19}, doi = {10.1007/978-3-030-11389-6\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YuCZWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/MengXXHY18, author = {Wei Meng and Kaiping Xue and Jie Xu and Jianan Hong and Nenghai Yu}, title = {Low-Latency Authentication Against Satellite Compromising for Space Information Network}, booktitle = {15th {IEEE} International Conference on Mobile Ad Hoc and Sensor Systems, {MASS} 2018, Chengdu, China, October 9-12, 2018}, pages = {237--244}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/MASS.2018.00045}, doi = {10.1109/MASS.2018.00045}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mass/MengXXHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/ChenLFLY18, author = {Zhu Chen and Weihai Li and Chi Fei and Bin Liu and Nenghai Yu}, title = {Robust Anomaly Detection via Fusion of Appearance and Motion Features}, booktitle = {{IEEE} Visual Communications and Image Processing, {VCIP} 2018, Taichung, Taiwan, December 9-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VCIP.2018.8698703}, doi = {10.1109/VCIP.2018.8698703}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/vcip/ChenLFLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-03218, author = {Zheng Zhou and Weiming Zhang and Nenghai Yu}, title = {{IREXF:} Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals}, journal = {CoRR}, volume = {abs/1801.03218}, year = {2018}, url = {http://arxiv.org/abs/1801.03218}, eprinttype = {arXiv}, eprint = {1801.03218}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-03218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-10591, author = {Dongdong Chen and Lu Yuan and Jing Liao and Nenghai Yu and Gang Hua}, title = {Stereoscopic Neural Style Transfer}, journal = {CoRR}, volume = {abs/1802.10591}, year = {2018}, url = {http://arxiv.org/abs/1802.10591}, eprinttype = {arXiv}, eprint = {1802.10591}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-10591.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-09186, author = {Jiayang Liu and Weiming Zhang and Yiwei Zhang and Dongdong Hou and Yujia Liu and Nenghai Yu}, title = {Detecting Adversarial Examples Based on Steganalysis}, journal = {CoRR}, volume = {abs/1806.09186}, year = {2018}, url = {http://arxiv.org/abs/1806.09186}, eprinttype = {arXiv}, eprint = {1806.09186}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-09186.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-04979, author = {Guojun Yin and Lu Sheng and Bin Liu and Nenghai Yu and Xiaogang Wang and Jing Shao and Chen Change Loy}, title = {Zoom-Net: Mining Deep Feature Interactions for Visual Relationship Recognition}, journal = {CoRR}, volume = {abs/1807.04979}, year = {2018}, url = {http://arxiv.org/abs/1807.04979}, eprinttype = {arXiv}, eprint = {1807.04979}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-04979.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-08186, author = {Qingnan Fan and Dongdong Chen and Lu Yuan and Gang Hua and Nenghai Yu and Baoquan Chen}, title = {Decouple Learning for Parameterized Image Operators}, journal = {CoRR}, volume = {abs/1807.08186}, year = {2018}, url = {http://arxiv.org/abs/1807.08186}, eprinttype = {arXiv}, eprint = {1807.08186}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-08186.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-07122, author = {Shuxin Zheng and Qi Meng and Huishuai Zhang and Wei Chen and Nenghai Yu and Tie{-}Yan Liu}, title = {Capacity Control of ReLU Neural Networks by Basis-path Norm}, journal = {CoRR}, volume = {abs/1809.07122}, year = {2018}, url = {http://arxiv.org/abs/1809.07122}, eprinttype = {arXiv}, eprint = {1809.07122}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-07122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-00189, author = {Jiayang Liu and Dongdong Hou and Weiming Zhang and Nenghai Yu}, title = {Reversible Adversarial Examples}, journal = {CoRR}, volume = {abs/1811.00189}, year = {2018}, url = {http://arxiv.org/abs/1811.00189}, eprinttype = {arXiv}, eprint = {1811.00189}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-00189.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-01225, author = {Xiaoyi Dong and Weiming Zhang and Nenghai Yu}, title = {{CAAD} 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network}, journal = {CoRR}, volume = {abs/1811.01225}, year = {2018}, url = {http://arxiv.org/abs/1811.01225}, eprinttype = {arXiv}, eprint = {1811.01225}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-01225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-02928, author = {Dongdong Hou and Weiming Zhang and Jiayang Liu and Siyan Zhou and Dongdong Chen and Nenghai Yu}, title = {Emerging Applications of Reversible Data Hiding}, journal = {CoRR}, volume = {abs/1811.02928}, year = {2018}, url = {http://arxiv.org/abs/1811.02928}, eprinttype = {arXiv}, eprint = {1811.02928}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-02928.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-03456, author = {Jiayang Liu and Weiming Zhang and Nenghai Yu}, title = {{CAAD} 2018: Iterative Ensemble Adversarial Attack}, journal = {CoRR}, volume = {abs/1811.03456}, year = {2018}, url = {http://arxiv.org/abs/1811.03456}, eprinttype = {arXiv}, eprint = {1811.03456}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-03456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-03732, author = {Kejiang Chen and Hang Zhou and Dongdong Hou and Hanqing Zhao and Weiming Zhang and Nenghai Yu}, title = {Provably Secure Steganography on Generative Media}, journal = {CoRR}, volume = {abs/1811.03732}, year = {2018}, url = {http://arxiv.org/abs/1811.03732}, eprinttype = {arXiv}, eprint = {1811.03732}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-03732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-04980, author = {Huihui Zhu and Bin Liu and Guojun Yin and Yan Lu and Weihai Li and Nenghai Yu}, title = {Real-Time Anomaly Detection With {HMOF} Feature}, journal = {CoRR}, volume = {abs/1812.04980}, year = {2018}, url = {http://arxiv.org/abs/1812.04980}, eprinttype = {arXiv}, eprint = {1812.04980}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-04980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-11017, author = {Hang Zhou and Kejiang Chen and Weiming Zhang and Han Fang and Wenbo Zhou and Nenghai Yu}, title = {Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal}, journal = {CoRR}, volume = {abs/1812.11017}, year = {2018}, url = {http://arxiv.org/abs/1812.11017}, eprinttype = {arXiv}, eprint = {1812.11017}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-11017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/XiaQDLZYL17, author = {Yingce Xia and Tao Qin and Wenkui Ding and Haifang Li and Xudong Zhang and Nenghai Yu and Tie{-}Yan Liu}, title = {Finite budget analysis of multi-armed bandit problems}, journal = {Neurocomputing}, volume = {258}, pages = {13--29}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2016.12.079}, doi = {10.1016/J.NEUCOM.2016.12.079}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/XiaQDLZYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WuHLLSY17, author = {Yue Wu and Steven C. H. Hoi and Chenghao Liu and Jing Lu and Doyen Sahoo and Nenghai Yu}, title = {{SOL:} {A} library for scalable online learning algorithms}, journal = {Neurocomputing}, volume = {260}, pages = {9--12}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2017.03.077}, doi = {10.1016/J.NEUCOM.2017.03.077}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/WuHLLSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YangZY17, author = {Ce Yang and Weiming Zhang and Nenghai Yu}, title = {Semi-order preserving encryption}, journal = {Inf. Sci.}, volume = {387}, pages = {266--279}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.12.025}, doi = {10.1016/J.INS.2016.12.025}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YangZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LvHSYW17, author = {Dongyue Lv and Zhipei Huang and Lixin Sun and Nenghai Yu and Jiankang Wu}, title = {Smart motion reconstruction system for golf swing: a {DBN} model based transportable, non-intrusive and inexpensive golf swing capture and reconstruction system}, journal = {Multim. Tools Appl.}, volume = {76}, number = {1}, pages = {1313--1330}, year = {2017}, url = {https://doi.org/10.1007/s11042-015-3102-7}, doi = {10.1007/S11042-015-3102-7}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LvHSYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XuZJY17, author = {Jiajia Xu and Weiming Zhang and Ruiqi Jiang and Nenghai Yu}, title = {Unified entropy-based sorting for reversible data hiding}, journal = {Multim. Tools Appl.}, volume = {76}, number = {3}, pages = {3829--3850}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3989-7}, doi = {10.1007/S11042-016-3989-7}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XuZJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XuZJHY17, author = {Jiajia Xu and Weiming Zhang and Ruiqi Jiang and Xiaocheng Hu and Nenghai Yu}, title = {Optimal structural similarity constraint for reversible data hiding}, journal = {Multim. Tools Appl.}, volume = {76}, number = {14}, pages = {15491--15511}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3850-z}, doi = {10.1007/S11042-016-3850-Z}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XuZJHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZY17, author = {Yujia Liu and Weiming Zhang and Nenghai Yu}, title = {Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {1897438:1--1897438:15}, year = {2017}, url = {https://doi.org/10.1155/2017/1897438}, doi = {10.1155/2017/1897438}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/XueHXWYH17, author = {Kaiping Xue and Jianan Hong and Yingjie Xue and David S. L. Wei and Nenghai Yu and Peilin Hong}, title = {{CABE:} {A} New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding}, journal = {{IEEE} Trans. Computers}, volume = {66}, number = {9}, pages = {1491--1503}, year = {2017}, url = {https://doi.org/10.1109/TC.2017.2693265}, doi = {10.1109/TC.2017.2693265}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/XueHXWYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ZhangZZLY17, author = {Weiming Zhang and Zhuo Zhang and Lili Zhang and Hanyi Li and Nenghai Yu}, title = {Decomposing Joint Distortion for Adaptive Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {27}, number = {10}, pages = {2274--2280}, year = {2017}, url = {https://doi.org/10.1109/TCSVT.2016.2587388}, doi = {10.1109/TCSVT.2016.2587388}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ZhangZZLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XueLHXYH17, author = {Kaiping Xue and Shaohua Li and Jianan Hong and Yingjie Xue and Nenghai Yu and Peilin Hong}, title = {Two-Cloud Secure Database for Numeric-Related {SQL} Range Queries With Privacy Preserving}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1596--1608}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2675864}, doi = {10.1109/TIFS.2017.2675864}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/XueLHXYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouZY17, author = {Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {A New Rule for Cost Reassignment in Adaptive Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2654--2667}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718480}, doi = {10.1109/TIFS.2017.2718480}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhouZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhouCZY17, author = {Hang Zhou and Kejiang Chen and Weiming Zhang and Nenghai Yu}, title = {Comments on "Steganography Using Reversible Texture Synthesis"}, journal = {{IEEE} Trans. Image Process.}, volume = {26}, number = {4}, pages = {1623--1625}, year = {2017}, url = {https://doi.org/10.1109/TIP.2017.2657886}, doi = {10.1109/TIP.2017.2657886}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhouCZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/WuHMY17, author = {Yue Wu and Steven C. H. Hoi and Tao Mei and Nenghai Yu}, title = {Large-Scale Online Feature Selection for Ultra-High Dimensional Sparse Data}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {11}, number = {4}, pages = {48:1--48:22}, year = {2017}, url = {https://doi.org/10.1145/3070646}, doi = {10.1145/3070646}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkdd/WuHMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZhuLOYW17, author = {Feng Zhu and Hongsheng Li and Wanli Ouyang and Nenghai Yu and Xiaogang Wang}, title = {Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification}, booktitle = {2017 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2017, Honolulu, HI, USA, July 21-26, 2017}, pages = {2027--2036}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CVPR.2017.219}, doi = {10.1109/CVPR.2017.219}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ZhuLOYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ChenYLYH17, author = {Dongdong Chen and Lu Yuan and Jing Liao and Nenghai Yu and Gang Hua}, title = {StyleBank: An Explicit Representation for Neural Image Style Transfer}, booktitle = {2017 {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2017, Honolulu, HI, USA, July 21-26, 2017}, pages = {2770--2779}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CVPR.2017.296}, doi = {10.1109/CVPR.2017.296}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/ChenYLYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/FeiLY17, author = {Chi Fei and Bin Liu and Nenghai Yu}, title = {Extracting Sift Keypoints in {DCT} Domain}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {98--101}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.56}, doi = {10.1109/DSC.2017.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/FeiLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/HuZZY17, author = {Huanhuan Hu and Xin Zuo and Weiming Zhang and Nenghai Yu}, title = {Adaptive Text Steganography by Exploring Statistical and Linguistical Distortion}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {145--150}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.16}, doi = {10.1109/DSC.2017.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/HuZZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/YangZY17, author = {Ce Yang and Weiming Zhang and Nenghai Yu}, title = {Range Queries on Two Column Data}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {578--584}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.49}, doi = {10.1109/DSC.2017.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/YangZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WangWTY17, author = {Guokun Wang and Jingjing Wang and Wenyi Tang and Nenghai Yu}, title = {Robust visual tracking with deep feature fusion}, booktitle = {2017 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2017, New Orleans, LA, USA, March 5-9, 2017}, pages = {1917--1921}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICASSP.2017.7952490}, doi = {10.1109/ICASSP.2017.7952490}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/WangWTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YangZDY17, author = {Ce Yang and Weiming Zhang and Jiachen Ding and Nenghai Yu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Probability-p Order-Preserving Encryption}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {16--28}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_2}, doi = {10.1007/978-3-319-68542-7\_2}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YangZDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/ChenLYYH17, author = {Dongdong Chen and Jing Liao and Lu Yuan and Nenghai Yu and Gang Hua}, title = {Coherent Online Video Style Transfer}, booktitle = {{IEEE} International Conference on Computer Vision, {ICCV} 2017, Venice, Italy, October 22-29, 2017}, pages = {1114--1123}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICCV.2017.126}, doi = {10.1109/ICCV.2017.126}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/ChenLYYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/ChuOLWLY17, author = {Qi Chu and Wanli Ouyang and Hongsheng Li and Xiaogang Wang and Bin Liu and Nenghai Yu}, title = {Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism}, booktitle = {{IEEE} International Conference on Computer Vision, {ICCV} 2017, Venice, Italy, October 22-29, 2017}, pages = {4846--4855}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICCV.2017.518}, doi = {10.1109/ICCV.2017.518}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccv/ChuOLWLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/TangLY17, author = {Wenyi Tang and Bin Liu and Nenghai Yu}, editor = {Yao Zhao and Xiangwei Kong and David Taubman}, title = {Deep Scale Feature for Visual Tracking}, booktitle = {Image and Graphics - 9th International Conference, {ICIG} 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10666}, pages = {306--315}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71607-7\_27}, doi = {10.1007/978-3-319-71607-7\_27}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/TangLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/LiuLY17, author = {Qiankun Liu and Bin Liu and Nenghai Yu}, editor = {Yao Zhao and Xiangwei Kong and David Taubman}, title = {{TCCF:} Tracking Based on Convolutional Neural Network and Correlation Filters}, booktitle = {Image and Graphics - 9th International Conference, {ICIG} 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10666}, pages = {316--327}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71607-7\_28}, doi = {10.1007/978-3-319-71607-7\_28}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/LiuLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/TanLY17, author = {Zhentao Tan and Bin Liu and Nenghai Yu}, editor = {Yao Zhao and Xiangwei Kong and David Taubman}, title = {PPEDNet: Pyramid Pooling Encoder-Decoder Network for Real-Time Semantic Segmentation}, booktitle = {Image and Graphics - 9th International Conference, {ICIG} 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10666}, pages = {328--339}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71607-7\_29}, doi = {10.1007/978-3-319-71607-7\_29}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/TanLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/HuZHY17, author = {Xianjun Hu and Weiming Zhang and Honggang Hu and Nenghai Yu}, editor = {Yao Zhao and Xiangwei Kong and David Taubman}, title = {Secure Image Denoising over Two Clouds}, booktitle = {Image and Graphics - 9th International Conference, {ICIG} 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10668}, pages = {471--482}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71598-8\_42}, doi = {10.1007/978-3-319-71598-8\_42}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/HuZHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/YangLY17, author = {Wenfei Yang and Bin Liu and Nenghai Yu}, editor = {Yao Zhao and Xiangwei Kong and David Taubman}, title = {Key-Region Representation Learning for Anomaly Detection}, booktitle = {Image and Graphics - 9th International Conference, {ICIG} 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10666}, pages = {687--697}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71607-7\_60}, doi = {10.1007/978-3-319-71607-7\_60}, timestamp = {Wed, 10 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/YangLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WangBY17, author = {Yunong Wang and Huanyu Bian and Nenghai Yu}, title = {Neural network with saliency based feature selection ability}, booktitle = {2017 {IEEE} International Conference on Image Processing, {ICIP} 2017, Beijing, China, September 17-20, 2017}, pages = {4502--4506}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICIP.2017.8297134}, doi = {10.1109/ICIP.2017.8297134}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/WangBY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/XiaQCBYL17, author = {Yingce Xia and Tao Qin and Wei Chen and Jiang Bian and Nenghai Yu and Tie{-}Yan Liu}, editor = {Doina Precup and Yee Whye Teh}, title = {Dual Supervised Learning}, booktitle = {Proceedings of the 34th International Conference on Machine Learning, {ICML} 2017, Sydney, NSW, Australia, 6-11 August 2017}, series = {Proceedings of Machine Learning Research}, volume = {70}, pages = {3789--3798}, publisher = {{PMLR}}, year = {2017}, url = {http://proceedings.mlr.press/v70/xia17a.html}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/XiaQCBYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ZhengMWCYML17, author = {Shuxin Zheng and Qi Meng and Taifeng Wang and Wei Chen and Nenghai Yu and Zhiming Ma and Tie{-}Yan Liu}, editor = {Doina Precup and Yee Whye Teh}, title = {Asynchronous Stochastic Gradient Descent with Delay Compensation}, booktitle = {Proceedings of the 34th International Conference on Machine Learning, {ICML} 2017, Sydney, NSW, Australia, 6-11 August 2017}, series = {Proceedings of Machine Learning Research}, volume = {70}, pages = {4120--4129}, publisher = {{PMLR}}, year = {2017}, url = {http://proceedings.mlr.press/v70/zheng17b.html}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/ZhengMWCYML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/XiaBQYL17, author = {Yingce Xia and Jiang Bian and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, editor = {Carles Sierra}, title = {Dual Inference for Machine Learning}, booktitle = {Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August 19-25, 2017}, pages = {3112--3118}, publisher = {ijcai.org}, year = {2017}, url = {https://doi.org/10.24963/ijcai.2017/434}, doi = {10.24963/IJCAI.2017/434}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/XiaBQYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/HanXYHYL17, author = {Jiangping Han and Kaiping Xue and Hao Yue and Peilin Hong and Nenghai Yu and Fenghua Li}, editor = {Liehuang Zhu and Sheng Zhong}, title = {Receive Buffer Pre-division Based Flow Control for {MPTCP}}, booktitle = {Mobile Ad-hoc and Sensor Networks - 13th International Conference, {MSN} 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {747}, pages = {19--31}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-8890-2\_2}, doi = {10.1007/978-981-10-8890-2\_2}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/msn/HanXYHYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/XiaTWLQYL17, author = {Yingce Xia and Fei Tian and Lijun Wu and Jianxin Lin and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, editor = {Isabelle Guyon and Ulrike von Luxburg and Samy Bengio and Hanna M. Wallach and Rob Fergus and S. V. N. Vishwanathan and Roman Garnett}, title = {Deliberation Networks: Sequence Generation Beyond One-Pass Decoding}, booktitle = {Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, {USA}}, pages = {1784--1794}, year = {2017}, url = {https://proceedings.neurips.cc/paper/2017/hash/c6036a69be21cb660499b75718a3ef24-Abstract.html}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/XiaTWLQYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/TangLY17, author = {Wenyi Tang and Bin Liu and Nenghai Yu}, editor = {Bing Zeng and Qingming Huang and Abdulmotaleb El{-}Saddik and Hongliang Li and Shuqiang Jiang and Xiaopeng Fan}, title = {Visual Tracking by Deep Discriminative Map}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10735}, pages = {733--742}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-77380-3\_70}, doi = {10.1007/978-3-319-77380-3\_70}, timestamp = {Tue, 02 Mar 2021 17:33:54 +0100}, biburl = {https://dblp.org/rec/conf/pcm/TangLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/HongLY17, author = {Zheran Hong and Bin Liu and Nenghai Yu}, editor = {Bing Zeng and Qingming Huang and Abdulmotaleb El{-}Saddik and Hongliang Li and Shuqiang Jiang and Xiaopeng Fan}, title = {Anomaly Detection with Passive Aggressive Online Gaussian Model Estimation}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10736}, pages = {900--910}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-77383-4\_88}, doi = {10.1007/978-3-319-77383-4\_88}, timestamp = {Tue, 02 Mar 2021 17:33:54 +0100}, biburl = {https://dblp.org/rec/conf/pcm/HongLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/XiaTQYL17, author = {Yingce Xia and Fei Tian and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, editor = {Michelangelo Ceci and Jaakko Hollm{\'{e}}n and Ljupco Todorovski and Celine Vens and Saso Dzeroski}, title = {Sequence Generation with Target Attention}, booktitle = {Machine Learning and Knowledge Discovery in Databases - European Conference, {ECML} {PKDD} 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10534}, pages = {816--831}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71249-9\_49}, doi = {10.1007/978-3-319-71249-9\_49}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkdd/XiaTQYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhuLOYW17, author = {Feng Zhu and Hongsheng Li and Wanli Ouyang and Nenghai Yu and Xiaogang Wang}, title = {Learning Spatial Regularization with Image-level Supervisions for Multi-label Image Classification}, journal = {CoRR}, volume = {abs/1702.05891}, year = {2017}, url = {http://arxiv.org/abs/1702.05891}, eprinttype = {arXiv}, eprint = {1702.05891}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ZhuLOYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenYLYH17, author = {Dongdong Chen and Lu Yuan and Jing Liao and Nenghai Yu and Gang Hua}, title = {StyleBank: An Explicit Representation for Neural Image Style Transfer}, journal = {CoRR}, volume = {abs/1703.09210}, year = {2017}, url = {http://arxiv.org/abs/1703.09210}, eprinttype = {arXiv}, eprint = {1703.09210}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ChenYLYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenLYYH17, author = {Dongdong Chen and Jing Liao and Lu Yuan and Nenghai Yu and Gang Hua}, title = {Coherent Online Video Style Transfer}, journal = {CoRR}, volume = {abs/1703.09211}, year = {2017}, url = {http://arxiv.org/abs/1703.09211}, eprinttype = {arXiv}, eprint = {1703.09211}, timestamp = {Thu, 09 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ChenLYYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XiaQCBYL17, author = {Yingce Xia and Tao Qin and Wei Chen and Jiang Bian and Nenghai Yu and Tie{-}Yan Liu}, title = {Dual Supervised Learning}, journal = {CoRR}, volume = {abs/1707.00415}, year = {2017}, url = {http://arxiv.org/abs/1707.00415}, eprinttype = {arXiv}, eprint = {1707.00415}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/XiaQCBYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-02843, author = {Qi Chu and Wanli Ouyang and Hongsheng Li and Xiaogang Wang and Bin Liu and Nenghai Yu}, title = {Online Multi-Object Tracking Using CNN-based Single Object Tracker with Spatial-Temporal Attention Mechanism}, journal = {CoRR}, volume = {abs/1708.02843}, year = {2017}, url = {http://arxiv.org/abs/1708.02843}, eprinttype = {arXiv}, eprint = {1708.02843}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-02843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-03235, author = {Zheng Zhou and Weiming Zhang and Zichong Yang and Nenghai Yu}, title = {Exfiltration of Data from Air-gapped Networks via Unmodulated {LED} Status Indicators}, journal = {CoRR}, volume = {abs/1711.03235}, year = {2017}, url = {http://arxiv.org/abs/1711.03235}, eprinttype = {arXiv}, eprint = {1711.03235}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-03235.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-05934, author = {Yujia Liu and Weiming Zhang and Shaohua Li and Nenghai Yu}, title = {Enhanced Attacks on Defensively Distilled Deep Neural Networks}, journal = {CoRR}, volume = {abs/1711.05934}, year = {2017}, url = {http://arxiv.org/abs/1711.05934}, eprinttype = {arXiv}, eprint = {1711.05934}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-05934.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/YangZLY16, author = {Yang Yang and Weiming Zhang and Dong Liang and Nenghai Yu}, title = {Reversible data hiding in medical images with enhanced contrast in texture area}, journal = {Digit. Signal Process.}, volume = {52}, pages = {13--24}, year = {2016}, url = {https://doi.org/10.1016/j.dsp.2016.02.006}, doi = {10.1016/J.DSP.2016.02.006}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/YangZLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhuangWLYMY16, author = {Liansheng Zhuang and Jingjing Wang and Zhouchen Lin and Allen Y. Yang and Yi Ma and Nenghai Yu}, title = {Locality-preserving low-rank representation for graph construction from nonlinear manifolds}, journal = {Neurocomputing}, volume = {175}, pages = {715--722}, year = {2016}, url = {https://doi.org/10.1016/j.neucom.2015.10.119}, doi = {10.1016/J.NEUCOM.2015.10.119}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/ZhuangWLYMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WangYZZ16, author = {Jingjing Wang and Nenghai Yu and Feng Zhu and Liansheng Zhuang}, title = {Multi-level visual tracking with hierarchical tree structural constraint}, journal = {Neurocomputing}, volume = {202}, pages = {1--11}, year = {2016}, url = {https://doi.org/10.1016/j.neucom.2016.03.010}, doi = {10.1016/J.NEUCOM.2016.03.010}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/WangYZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/HouZY16, author = {Dongdong Hou and Weiming Zhang and Nenghai Yu}, title = {Image camouflage by reversible image transformation}, journal = {J. Vis. Commun. Image Represent.}, volume = {40}, pages = {225--236}, year = {2016}, url = {https://doi.org/10.1016/j.jvcir.2016.06.018}, doi = {10.1016/J.JVCIR.2016.06.018}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/HouZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangZHY16, author = {Yang Yang and Weiming Zhang and Xiaocheng Hu and Nenghai Yu}, title = {Improving visual quality of reversible data hiding by twice sorting}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13663--13678}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2824-x}, doi = {10.1007/S11042-015-2824-X}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YangZHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangZY16, author = {Hui Wang and Weiming Zhang and Nenghai Yu}, title = {Protecting patient confidential information based on {ECG} reversible data hiding}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13733--13747}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2706-2}, doi = {10.1007/S11042-015-2706-2}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WangZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/YaoZY16, author = {Yuanzhi Yao and Weiming Zhang and Nenghai Yu}, title = {Inter-frame distortion drift analysis for reversible data hiding in encrypted {H.264/AVC} video bitstreams}, journal = {Signal Process.}, volume = {128}, pages = {531--545}, year = {2016}, url = {https://doi.org/10.1016/j.sigpro.2016.05.004}, doi = {10.1016/J.SIGPRO.2016.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/YaoZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/WangYW16, author = {Yunong Wang and Nenghai Yu and Taifeng Wang}, title = {Ada-Sal Network: emulate the Human Visual System}, journal = {Signal Process. Image Commun.}, volume = {47}, pages = {519--528}, year = {2016}, url = {https://doi.org/10.1016/j.image.2016.05.017}, doi = {10.1016/J.IMAGE.2016.05.017}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/WangYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ZhangWHY16, author = {Weiming Zhang and Hui Wang and Dongdong Hou and Nenghai Yu}, title = {Reversible Data Hiding in Encrypted Images by Reversible Image Transformation}, journal = {{IEEE} Trans. Multim.}, volume = {18}, number = {8}, pages = {1469--1479}, year = {2016}, url = {https://doi.org/10.1109/TMM.2016.2569497}, doi = {10.1109/TMM.2016.2569497}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/ZhangWHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/WuSMTYR16, author = {Yue Wu and Xu Shen and Tao Mei and Xinmei Tian and Nenghai Yu and Yong Rui}, title = {Monet: {A} System for Reliving Your Memories by Theme-Based Photo Storytelling}, journal = {{IEEE} Trans. Multim.}, volume = {18}, number = {11}, pages = {2206--2216}, year = {2016}, url = {https://doi.org/10.1109/TMM.2016.2614185}, doi = {10.1109/TMM.2016.2614185}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/WuSMTYR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/HuZLHY16, author = {Xianjun Hu and Weiming Zhang and Ke Li and Honggang Hu and Nenghai Yu}, title = {Secure Nonlocal Denoising in Outsourced Images}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {12}, number = {3}, pages = {40:1--40:23}, year = {2016}, url = {https://doi.org/10.1145/2886777}, doi = {10.1145/2886777}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/HuZLHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/XiaQYL16, author = {Yingce Xia and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, editor = {Catholijn M. Jonker and Stacy Marsella and John Thangarajah and Karl Tuyls}, title = {Best Action Selection in a Stochastic Environment}, booktitle = {Proceedings of the 2016 International Conference on Autonomous Agents {\&} Multiagent Systems, Singapore, May 9-13, 2016}, pages = {758--766}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2937036}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/XiaQYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdsp/HouZZJYY16, author = {Dongdong Hou and Weiming Zhang and Zihao Zhan and Ruiqi Jiang and Yang Yang and Nenghai Yu}, title = {Reversible image processing via reversible data hiding}, booktitle = {2016 {IEEE} International Conference on Digital Signal Processing, {DSP} 2016, Beijing, China, October 16-18, 2016}, pages = {427--431}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICDSP.2016.7868593}, doi = {10.1109/ICDSP.2016.7868593}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdsp/HouZZJYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhuWY16, author = {Ziping Zhu and Jingjing Wang and Nenghai Yu}, title = {Anomaly detection via 3D-HOF and fast double sparse representation}, booktitle = {2016 {IEEE} International Conference on Image Processing, {ICIP} 2016, Phoenix, AZ, USA, September 25-28, 2016}, pages = {286--290}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICIP.2016.7532364}, doi = {10.1109/ICIP.2016.7532364}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/ZhuWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WangFZY16, author = {Jingjing Wang and Chi Fei and Liansheng Zhuang and Nenghai Yu}, title = {Part-based multi-graph ranking for visual tracking}, booktitle = {2016 {IEEE} International Conference on Image Processing, {ICIP} 2016, Phoenix, AZ, USA, September 25-28, 2016}, pages = {1714--1718}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICIP.2016.7532651}, doi = {10.1109/ICIP.2016.7532651}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/WangFZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhuCY16, author = {Feng Zhu and Qi Chu and Nenghai Yu}, title = {Consistent matching based on boosted salience channels for group re-identification}, booktitle = {2016 {IEEE} International Conference on Image Processing, {ICIP} 2016, Phoenix, AZ, USA, September 25-28, 2016}, pages = {4279--4283}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICIP.2016.7533167}, doi = {10.1109/ICIP.2016.7533167}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/ZhuCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/ZhouZY16, author = {Wenbo Zhou and Weiming Zhang and Nenghai Yu}, title = {Evolving distortion function by exploiting the differences among comparable adaptive steganography}, booktitle = {12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, {ICNC-FSKD} 2016, Changsha, China, August 13-15, 2016}, pages = {2262--2271}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/FSKD.2016.7603534}, doi = {10.1109/FSKD.2016.7603534}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnc/ZhouZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/XiaQMYL16, author = {Yingce Xia and Tao Qin and Weidong Ma and Nenghai Yu and Tie{-}Yan Liu}, editor = {Subbarao Kambhampati}, title = {Budgeted Multi-Armed Bandits with Multiple Plays}, booktitle = {Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, {IJCAI} 2016, New York, NY, USA, 9-15 July 2016}, pages = {2210--2216}, publisher = {{IJCAI/AAAI} Press}, year = {2016}, url = {http://www.ijcai.org/Abstract/16/315}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/XiaQMYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/XuZZJMY16, author = {Jiajia Xu and Hang Zhou and Weiming Zhang and Ruiqi Jiang and Guoli Ma and Nenghai Yu}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Feng Liu}, title = {Second Order Perdicting-Error Sorting for Reversible Data Hiding}, booktitle = {Digital Forensics and Watermarking - 15th International Workshop, {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10082}, pages = {407--420}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53465-7\_30}, doi = {10.1007/978-3-319-53465-7\_30}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/XuZZJMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YaoZY16, author = {Yuanzhi Yao and Weiming Zhang and Nenghai Yu}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Feng Liu}, title = {Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability}, booktitle = {Digital Forensics and Watermarking - 15th International Workshop, {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10082}, pages = {421--435}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53465-7\_31}, doi = {10.1007/978-3-319-53465-7\_31}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YaoZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/HeXQWYLM16, author = {Di He and Yingce Xia and Tao Qin and Liwei Wang and Nenghai Yu and Tie{-}Yan Liu and Wei{-}Ying Ma}, editor = {Daniel D. Lee and Masashi Sugiyama and Ulrike von Luxburg and Isabelle Guyon and Roman Garnett}, title = {Dual Learning for Machine Translation}, booktitle = {Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain}, pages = {820--828}, year = {2016}, url = {https://proceedings.neurips.cc/paper/2016/hash/5b69b9cb83065d403869739ae7f0995e-Abstract.html}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/HeXQWYLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ChenZZYF16, author = {Kejiang Chen and Weiming Zhang and Hang Zhou and Nenghai Yu and Guorui Feng}, title = {Defining cost functions for adaptive steganography at the microscale}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WIFS.2016.7823900}, doi = {10.1109/WIFS.2016.7823900}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ChenZZYF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhengMWCYML16, author = {Shuxin Zheng and Qi Meng and Taifeng Wang and Wei Chen and Nenghai Yu and Zhiming Ma and Tie{-}Yan Liu}, title = {Asynchronous Stochastic Gradient Descent with Delay Compensation for Distributed Deep Learning}, journal = {CoRR}, volume = {abs/1609.08326}, year = {2016}, url = {http://arxiv.org/abs/1609.08326}, eprinttype = {arXiv}, eprint = {1609.08326}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ZhengMWCYML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuHLLSY16, author = {Yue Wu and Steven C. H. Hoi and Chenghao Liu and Jing Lu and Doyen Sahoo and Nenghai Yu}, title = {{SOL:} {A} Library for Scalable Online Learning Algorithms}, journal = {CoRR}, volume = {abs/1610.09083}, year = {2016}, url = {http://arxiv.org/abs/1610.09083}, eprinttype = {arXiv}, eprint = {1610.09083}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuHLLSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XiaHQWYLM16, author = {Yingce Xia and Di He and Tao Qin and Liwei Wang and Nenghai Yu and Tie{-}Yan Liu and Wei{-}Ying Ma}, title = {Dual Learning for Machine Translation}, journal = {CoRR}, volume = {abs/1611.00179}, year = {2016}, url = {http://arxiv.org/abs/1611.00179}, eprinttype = {arXiv}, eprint = {1611.00179}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/XiaHQWYLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YaoZYZ15, author = {Yuanzhi Yao and Weiming Zhang and Nenghai Yu and Xianfeng Zhao}, title = {Defining embedding distortion for motion vector-based video steganography}, journal = {Multim. Tools Appl.}, volume = {74}, number = {24}, pages = {11163--11186}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-2223-8}, doi = {10.1007/S11042-014-2223-8}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YaoZYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYW15, author = {Hao Zhang and Nenghai Yu and Yonggang Wen}, title = {Mobile cloud computing based privacy protection in location-based information survey applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1006--1025}, year = {2015}, url = {https://doi.org/10.1002/sec.1055}, doi = {10.1002/SEC.1055}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WuMXYL15, author = {Yue Wu and Tao Mei and Ying{-}Qing Xu and Nenghai Yu and Shipeng Li}, title = {MoVieUp: Automatic Mobile Video Mashup}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {25}, number = {12}, pages = {1941--1954}, year = {2015}, url = {https://doi.org/10.1109/TCSVT.2015.2416554}, doi = {10.1109/TCSVT.2015.2416554}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/WuMXYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/ZhuZYZ15, author = {Feng Zhu and Weiming Zhang and Nenghai Yu and Xianfeng Zhao}, title = {Robust {FMO} algorithm and adaptive redundant slice allocation for wireless video transmission}, journal = {Telecommun. Syst.}, volume = {59}, number = {3}, pages = {357--363}, year = {2015}, url = {https://doi.org/10.1007/s11235-014-9941-0}, doi = {10.1007/S11235-014-9941-0}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/ZhuZYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuZLY15, author = {Xiaocheng Hu and Weiming Zhang and Xiaolong Li and Nenghai Yu}, title = {Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {653--664}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2392556}, doi = {10.1109/TIFS.2015.2392556}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuZLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZYY15, author = {Ke Li and Weiming Zhang and Ce Yang and Nenghai Yu}, title = {Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1918--1926}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2435697}, doi = {10.1109/TIFS.2015.2435697}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhangHLY15, author = {Weiming Zhang and Xiaocheng Hu and Xiaolong Li and Nenghai Yu}, title = {Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications}, journal = {{IEEE} Trans. Image Process.}, volume = {24}, number = {1}, pages = {294--304}, year = {2015}, url = {https://doi.org/10.1109/TIP.2014.2358881}, doi = {10.1109/TIP.2014.2358881}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhangHLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhuangGTWLMY15, author = {Liansheng Zhuang and Shenghua Gao and Jinhui Tang and Jingjing Wang and Zhouchen Lin and Yi Ma and Nenghai Yu}, title = {Constructing a Nonnegative Low-Rank and Sparse Graph With Data-Adaptive Features}, journal = {{IEEE} Trans. Image Process.}, volume = {24}, number = {11}, pages = {3717--3728}, year = {2015}, url = {https://doi.org/10.1109/TIP.2015.2441632}, doi = {10.1109/TIP.2015.2441632}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tip/ZhuangGTWLMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acml/XiaDZYQ15, author = {Yingce Xia and Wenkui Ding and Xu{-}Dong Zhang and Nenghai Yu and Tao Qin}, title = {Budgeted Bandit Problems with Continuous Random Costs}, booktitle = {Proceedings of The 7th Asian Conference on Machine Learning, {ACML} 2015, Hong Kong, November 20-22, 2015}, series = {{JMLR} Workshop and Conference Proceedings}, volume = {45}, pages = {317--332}, publisher = {JMLR.org}, year = {2015}, url = {http://proceedings.mlr.press/v45/Xia15.html}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acml/XiaDZYQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccbd/YangZY15, author = {Kaichen Yang and Chi Zhang and Nenghai Yu}, title = {Economic Costs of Multi-sever Private Information Retrieval in Cloud Computing}, booktitle = {International Conference on Cloud Computing and Big Data, {CCBD} 2015, Shanghai, China, November 4-6, 2015}, pages = {373--376}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CCBD.2015.29}, doi = {10.1109/CCBD.2015.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccbd/YangZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/WangY15, author = {Jingjing Wang and Nenghai Yu}, editor = {Yu{-}Jin Zhang}, title = {Cooperative Target Tracking in Dual-Camera System with Bidirectional Information Fusion}, booktitle = {Image and Graphics - 8th International Conference, {ICIG} 2015, Tianjin, China, August 13-16, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9218}, pages = {60--74}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21963-9\_6}, doi = {10.1007/978-3-319-21963-9\_6}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/WangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/WangYWW15, author = {Yunong Wang and Nenghai Yu and Taifeng Wang and Qing Wang}, editor = {Yu{-}Jin Zhang}, title = {Improve Neural Network Using Saliency}, booktitle = {Image and Graphics - 8th International Conference, {ICIG} 2015, Tianjin, China, August 13-16, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9218}, pages = {417--429}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21963-9\_38}, doi = {10.1007/978-3-319-21963-9\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/WangYWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/Liu0Y15, author = {Kejia Liu and Bin Liu and Nenghai Yu}, editor = {Yu{-}Jin Zhang}, title = {A Robust Occlusion Judgment Scheme for Target Tracking Under the Framework of Particle Filter}, booktitle = {Image and Graphics - 8th International Conference, {ICIG} 2015, Tianjin, China, August 13-16, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9217}, pages = {423--433}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21978-3\_37}, doi = {10.1007/978-3-319-21978-3\_37}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icig/Liu0Y15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/LiaoZWY15, author = {Qiyu Liao and Bingbing Zhuang and Jingjing Wang and Nenghai Yu}, editor = {Yu{-}Jin Zhang}, title = {Moving Object Segmentation by Length-Unconstrained Trajectory Analysis}, booktitle = {Image and Graphics - 8th International Conference, {ICIG} 2015, Tianjin, China, August 13-16, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9218}, pages = {500--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21963-9\_46}, doi = {10.1007/978-3-319-21963-9\_46}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/LiaoZWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimcs/WangZY15, author = {Jingjing Wang and Liansheng Zhuang and Nenghai Yu}, editor = {Ramesh C. Jain and Shuqiang Jiang and John Smith and Jitao Sang and Guohui Li}, title = {Online shared dictionary learning for visual tracking}, booktitle = {Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, {ICIMCS} 2015, Zhangjiajie, Hunan, China, August 19-21, 2015}, pages = {22:1--22:5}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808492.2808514}, doi = {10.1145/2808492.2808514}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/icimcs/WangZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimcs/ZhuangZSY15, author = {Bingbing Zhuang and Ziping Zhu and Fangbemi Abassin Sourou and Nenghai Yu}, editor = {Ramesh C. Jain and Shuqiang Jiang and John Smith and Jitao Sang and Guohui Li}, title = {Person re-identification by the marriage of {KISS} metric learning and post-rank optimization: {KISSPOP}}, booktitle = {Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, {ICIMCS} 2015, Zhangjiajie, Hunan, China, August 19-21, 2015}, pages = {23:1--23:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808492.2808515}, doi = {10.1145/2808492.2808515}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icimcs/ZhuangZSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/YangZY15, author = {Yang Yang and Weiming Zhang and Nenghai Yu}, editor = {Jeng{-}Shyang Pan and Ivan Lee and Hsiang{-}Cheh Huang and Ching{-}Yu Yang}, title = {Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement}, booktitle = {2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2015, Adelaide, Australia, September 23-25, 2015}, pages = {81--84}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IIH-MSP.2015.70}, doi = {10.1109/IIH-MSP.2015.70}, timestamp = {Tue, 20 Aug 2024 07:54:42 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/YangZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/XiaLQYL15, author = {Yingce Xia and Haifang Li and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, editor = {Qiang Yang and Michael J. Wooldridge}, title = {Thompson Sampling for Budgeted Multi-Armed Bandits}, booktitle = {Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July 25-31, 2015}, pages = {3960--3966}, publisher = {{AAAI} Press}, year = {2015}, url = {http://ijcai.org/Abstract/15/556}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/XiaLQYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/WangY15, author = {Jingjing Wang and Nenghai Yu}, editor = {Yo{-}Sung Ho and Jitao Sang and Yong Man Ro and Junmo Kim and Fei Wu}, title = {Multi-target Tracking via Max-Entropy Target Selection and Heterogeneous Camera Fusion}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2015 - 16th Pacific-Rim Conference on Multimedia, Gwangju, South Korea, September 16-18, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9314}, pages = {149--159}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24075-6\_15}, doi = {10.1007/978-3-319-24075-6\_15}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pcm/WangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/FengWZYF15, author = {Bing Feng and Zhen Wang and Chi Zhang and Nenghai Yu and Yuguang Fang}, editor = {Kuai Xu and Haojin Zhu}, title = {Soft Reservation Based Prioritized Access: Towards Performance Enhancement for VoIP over WLANs}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {123--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_13}, doi = {10.1007/978-3-319-21837-3\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/FengWZYF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XiaLQYL15, author = {Yingce Xia and Haifang Li and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, title = {Thompson Sampling for Budgeted Multi-armed Bandits}, journal = {CoRR}, volume = {abs/1505.00146}, year = {2015}, url = {http://arxiv.org/abs/1505.00146}, eprinttype = {arXiv}, eprint = {1505.00146}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/XiaLQYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HanZWYZ14, author = {Tao Han and Weiming Zhang and Chao Wang and Nenghai Yu and Yue{-}Fei Zhu}, title = {Adaptive {\(\pm\)}1 Steganography in Extended Noisy Region}, journal = {Comput. J.}, volume = {57}, number = {4}, pages = {557--566}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt035}, doi = {10.1093/COMJNL/BXT035}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HanZWYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangYWZ14, author = {Hao Zhang and Nenghai Yu and Yonggang Wen and Weiming Zhang}, title = {Towards optimal noise distribution for privacy preserving in data aggregation}, journal = {Comput. Secur.}, volume = {45}, pages = {210--230}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.05.009}, doi = {10.1016/J.COSE.2014.05.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangYWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/HuZY14, author = {Xiaocheng Hu and Weiming Zhang and Nenghai Yu}, title = {Optimizing Non-Local Pixel Predictors for Reversible Data Hiding}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {3}, pages = {1--15}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014070101}, doi = {10.4018/IJDCF.2014070101}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/HuZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/TangMZY14, author = {Qi Tang and Guoli Ma and Weiming Zhang and Nenghai Yu}, title = {Reversible Data Hiding for {DNA} Sequences and Its Applications}, journal = {Int. J. Digit. Crime Forensics}, volume = {6}, number = {4}, pages = {1--13}, year = {2014}, url = {https://doi.org/10.4018/ijdcf.2014100101}, doi = {10.4018/IJDCF.2014100101}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/TangMZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhangYH14, author = {Hao Zhang and Nenghai Yu and Honggang Hu}, title = {The Optimal Noise Distribution for Privacy Preserving in Mobile Aggregation Applications}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/678098}, doi = {10.1155/2014/678098}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhangYH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChenZMY14, author = {Biao Chen and Weiming Zhang and Kede Ma and Nenghai Yu}, title = {Recursive code construction for reversible data hiding in {DCT} domain}, journal = {Multim. Tools Appl.}, volume = {72}, number = {2}, pages = {1985--2009}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1493-x}, doi = {10.1007/S11042-013-1493-X}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChenZMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ZhangMY14, author = {Weiming Zhang and Kede Ma and Nenghai Yu}, title = {Reversibility improved data hiding in encrypted images}, journal = {Signal Process.}, volume = {94}, pages = {118--127}, year = {2014}, url = {https://doi.org/10.1016/j.sigpro.2013.06.023}, doi = {10.1016/J.SIGPRO.2013.06.023}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/ZhangMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HaoMZLYY14, author = {Zhuo Hao and Yunlong Mao and Sheng Zhong and Li Erran Li and Haifan Yao and Nenghai Yu}, title = {Toward Wireless Security without Computational Assumptions - Oblivious Transfer Based on Wireless Channel Characteristics}, journal = {{IEEE} Trans. Computers}, volume = {63}, number = {6}, pages = {1580--1593}, year = {2014}, url = {https://doi.org/10.1109/TC.2013.27}, doi = {10.1109/TC.2013.27}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HaoMZLYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/XiaQYL14, author = {Yingce Xia and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, editor = {Carla E. Brodley and Peter Stone}, title = {Incentivizing High-Quality Content from Heterogeneous Users: On the Existence of Nash Equilibrium}, booktitle = {Proceedings of the Twenty-Eighth {AAAI} Conference on Artificial Intelligence, July 27 -31, 2014, Qu{\'{e}}bec City, Qu{\'{e}}bec, Canada}, pages = {819--825}, publisher = {{AAAI} Press}, year = {2014}, url = {https://doi.org/10.1609/aaai.v28i1.8824}, doi = {10.1609/AAAI.V28I1.8824}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaai/XiaQYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/XiaY14, author = {Lei Xia and Nenghai Yu}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {Redundant and Relay Assistant Scheduling of Small Satellites}, booktitle = {28th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2014, Victoria, BC, Canada, May 13-16, 2014}, pages = {1017--1024}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AINA.2014.124}, doi = {10.1109/AINA.2014.124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/XiaY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/FuZYMT14, author = {Juntao Fu and Weiming Zhang and Nenghai Yu and Guoli Ma and Qi Tang}, editor = {Dong Xie and Ron Yang and Jinguang Sun and Lipo Wang and Xiaowei Hui and Ying Chen}, title = {Fast tamper location of batch {DNA} sequences based on reversible data hiding}, booktitle = {7th International Conference on Biomedical Engineering and Informatics, {BMEI} 2014, Dalian, China, October 14-16, 2014}, pages = {868--872}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BMEI.2014.7002894}, doi = {10.1109/BMEI.2014.7002894}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmei/FuZYMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/ZhuWY14, author = {Feng Zhu and Xiaogang Wang and Nenghai Yu}, editor = {David J. Fleet and Tom{\'{a}}s Pajdla and Bernt Schiele and Tinne Tuytelaars}, title = {Crowd Tracking with Dynamic Evolution of Group Structures}, booktitle = {Computer Vision - {ECCV} 2014 - 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {8694}, pages = {139--154}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10599-4\_10}, doi = {10.1007/978-3-319-10599-4\_10}, timestamp = {Sat, 30 Sep 2023 09:39:19 +0200}, biburl = {https://dblp.org/rec/conf/eccv/ZhuWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WuZYP14, author = {Tingting Wu and Chi Zhang and Nenghai Yu and Miao Pan}, title = {Quadtree-based optimal path routing with the smallest routing table size}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin, TX, USA, December 8-12, 2014}, pages = {4598--4603}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GLOCOM.2014.7037533}, doi = {10.1109/GLOCOM.2014.7037533}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WuZYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangCZZY14, author = {Hong Zhang and Yun Cao and Xianfeng Zhao and Weiming Zhang and Nenghai Yu}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Video steganography with perturbed macroblock partition}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {115--122}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600936}, doi = {10.1145/2600918.2600936}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangCZZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/HuZY14, author = {Xiaocheng Hu and Weiming Zhang and Nenghai Yu}, editor = {Junzo Watada and Akinori Ito and Jeng{-}Shyang Pan and Han{-}Chieh Chao and Chien{-}Ming Chen}, title = {Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding}, booktitle = {2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2014, Kitakyushu, Japan, August 27-29, 2014}, pages = {481--484}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IIH-MSP.2014.126}, doi = {10.1109/IIH-MSP.2014.126}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/HuZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iov/HuZHY14, author = {Xianjun Hu and Weiming Zhang and Honggang Hu and Nenghai Yu}, editor = {Ching{-}Hsien Robert Hsu and Shangguang Wang}, title = {Non-local Denoising in Encrypted Images}, booktitle = {Internet of Vehicles - Technologies and Services - First International Conference, IOV, Beijing, China, September 1-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8662}, pages = {386--395}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11167-4\_38}, doi = {10.1007/978-3-319-11167-4\_38}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iov/HuZHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WangSYYLW14, author = {Jianfeng Wang and Heng Tao Shen and Shuicheng Yan and Nenghai Yu and Shipeng Li and Jingdong Wang}, editor = {Kien A. Hua and Yong Rui and Ralf Steinmetz and Alan Hanjalic and Apostol Natsev and Wenwu Zhu}, title = {Optimized Distances for Binary Code Ranking}, booktitle = {Proceedings of the {ACM} International Conference on Multimedia, {MM} '14, Orlando, FL, USA, November 03 - 07, 2014}, pages = {517--526}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2647868.2654898}, doi = {10.1145/2647868.2654898}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/WangSYYLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/RenCLYT14, author = {Guangxin Ren and Junjie Cai and Shipeng Li and Nenghai Yu and Qi Tian}, editor = {Kien A. Hua and Yong Rui and Ralf Steinmetz and Alan Hanjalic and Apostol Natsev and Wenwu Zhu}, title = {Salable Image Search with Reliable Binary Code}, booktitle = {Proceedings of the {ACM} International Conference on Multimedia, {MM} '14, Orlando, FL, USA, November 03 - 07, 2014}, pages = {769--772}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2647868.2654956}, doi = {10.1145/2647868.2654956}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/RenCLYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/ShenYLZ14, author = {Chong Shen and Nenghai Yu and Weihai Li and Wei Zhou}, title = {Moving object detection of dynamic scenes using spatio-temporal context and background modeling}, booktitle = {Sixth International Conference on Wireless Communications and Signal Processing, {WCSP} 2014, Hefei, China, October 23-25, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/WCSP.2014.6992045}, doi = {10.1109/WCSP.2014.6992045}, timestamp = {Tue, 12 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcsp/ShenYLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/XiaQYL14, author = {Yingce Xia and Tao Qin and Nenghai Yu and Tie{-}Yan Liu}, title = {Incentivizing High-quality Content from Heterogeneous Users: On the Existence of Nash Equilibrium}, journal = {CoRR}, volume = {abs/1404.5155}, year = {2014}, url = {http://arxiv.org/abs/1404.5155}, eprinttype = {arXiv}, eprint = {1404.5155}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/XiaQYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/ZhangWXY13, author = {Hao Zhang and Yonggang Wen and Haiyong Xie and Nenghai Yu}, title = {Distributed Hash Table - Theory, Platforms and Applications}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-9008-1}, doi = {10.1007/978-1-4614-9008-1}, isbn = {978-1-4614-9007-4}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/ZhangWXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/TangBYZ13, author = {Jinhui Tang and Wei Bian and Nenghai Yu and Yu{-}Jin Zhang}, title = {Intelligent processing techniques for semantic-based image and video retrieval}, journal = {Neurocomputing}, volume = {119}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1016/j.neucom.2012.11.037}, doi = {10.1016/J.NEUCOM.2012.11.037}, timestamp = {Tue, 08 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/TangBYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/JiangYWY13, author = {Kai Jiang and Huagang Yin and Peng Wang and Nenghai Yu}, title = {Learning from contextual information of geo-tagged web photos to rank personalized tourism attractions}, journal = {Neurocomputing}, volume = {119}, pages = {17--25}, year = {2013}, url = {https://doi.org/10.1016/j.neucom.2012.02.049}, doi = {10.1016/J.NEUCOM.2012.02.049}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/JiangYWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/PanSLLY13, author = {Zhaotai Pan and Huifeng Shen and Yan Lu and Shipeng Li and Nenghai Yu}, title = {A Low-Complexity Screen Compression Scheme for Interactive Screen Sharing}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {23}, number = {6}, pages = {949--960}, year = {2013}, url = {https://doi.org/10.1109/TCSVT.2013.2243056}, doi = {10.1109/TCSVT.2013.2243056}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/PanSLLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaZZYL13, author = {Kede Ma and Weiming Zhang and Xianfeng Zhao and Nenghai Yu and Fenghua Li}, title = {Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {3}, pages = {553--562}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2248725}, doi = {10.1109/TIFS.2013.2248725}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaZZYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuZHYZL13, author = {Xiaocheng Hu and Weiming Zhang and Xuexian Hu and Nenghai Yu and Xianfeng Zhao and Fenghua Li}, title = {Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {5}, pages = {779--788}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2256131}, doi = {10.1109/TIFS.2013.2256131}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuZHYZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhangHLY13, author = {Weiming Zhang and Xiaocheng Hu and Xiaolong Li and Nenghai Yu}, title = {Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression}, journal = {{IEEE} Trans. Image Process.}, volume = {22}, number = {7}, pages = {2775--2785}, year = {2013}, url = {https://doi.org/10.1109/TIP.2013.2257814}, doi = {10.1109/TIP.2013.2257814}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhangHLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/JiangSYL13, author = {Jingtian Jiang and Xinying Song and Nenghai Yu and Chin{-}Yew Lin}, title = {FoCUS: Learning to Crawl Web Forums}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {25}, number = {6}, pages = {1293--1306}, year = {2013}, url = {https://doi.org/10.1109/TKDE.2012.56}, doi = {10.1109/TKDE.2012.56}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/JiangSYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/YangLLZY13, author = {Nan Yang and Shujie Liu and Mu Li and Ming Zhou and Nenghai Yu}, title = {Word Alignment Modeling with Context Dependent Deep Neural Network}, booktitle = {Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, {ACL} 2013, 4-9 August 2013, Sofia, Bulgaria, Volume 1: Long Papers}, pages = {166--175}, publisher = {The Association for Computer Linguistics}, year = {2013}, url = {https://aclanthology.org/P13-1017/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/YangLLZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/MaTZY13, author = {Guoli Ma and Qi Tang and Weiming Zhang and Nenghai Yu}, editor = {Jean X. Gao and Dongrong Xu and Xiaoyan Sun and Yingfei Wu}, title = {Tamper restoration on {DNA} sequences based on reversible data hiding}, booktitle = {6th International Conference on Biomedical Engineering and Informatics, {BMEI} 2013, Hangzhou, China, December 16-18, 2013}, pages = {484--489}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/BMEI.2013.6746991}, doi = {10.1109/BMEI.2013.6746991}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmei/MaTZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/ZhangWHY13, author = {Hao Zhang and Yonggang Wen and Honggang Hu and Nenghai Yu}, title = {Toward Optimal Additive Noise Distribution for Privacy Protection in Mobile Statistics Aggregation}, booktitle = {2013 {IEEE} International Conference on Green Computing and Communications (GreenCom) and {IEEE} Internet of Things (iThings) and {IEEE} Cyber, Physical and Social Computing (CPSCom), Beijing, China, August 20-23, 2013}, pages = {1346--1351}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GreenCom-iThings-CPSCom.2013.234}, doi = {10.1109/GREENCOM-ITHINGS-CPSCOM.2013.234}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/greencom/ZhangWHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/QianLYL13, author = {Ruohan Qian and Weihai Li and Nenghai Yu and Bin Liu}, title = {High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance}, booktitle = {Proceedings of the Seventh International Conference on Image and Graphics, {ICIG} 2013, Qingdao, China, July 26-28, 2013}, pages = {106--111}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICIG.2013.27}, doi = {10.1109/ICIG.2013.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/QianLYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/LiaoY013, author = {Qiyu Liao and Nenghai Yu and Bin Liu}, title = {Moving Object Detection for Moving Cameras on Superpixel Level}, booktitle = {Proceedings of the Seventh International Conference on Image and Graphics, {ICIG} 2013, Qingdao, China, July 26-28, 2013}, pages = {307--312}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICIG.2013.67}, doi = {10.1109/ICIG.2013.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/LiaoY013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/HeLYYC13, author = {Lei He and Bin Liu and Yuanzhi Yao and Nenghai Yu and Chang Wen Chen}, title = {MOS-Based Channel Allocation Schemes for Mixed Services over Cognitive Radio Networks}, booktitle = {Proceedings of the Seventh International Conference on Image and Graphics, {ICIG} 2013, Qingdao, China, July 26-28, 2013}, pages = {832--837}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICIG.2013.171}, doi = {10.1109/ICIG.2013.171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/HeLYYC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/DaiSWY13, author = {Lican Dai and Xiaoyan Sun and Feng Wu and Nenghai Yu}, title = {Large scale image retrieval with visual groups}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2013, Melbourne, Australia, September 15-18, 2013}, pages = {2582--2586}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICIP.2013.6738532}, doi = {10.1109/ICIP.2013.6738532}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/DaiSWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/JiangYL13, author = {Kai Jiang and Nenghai Yu and Weihai Li}, title = {Online travel destination recommendation with efficient variable memory Markov model}, booktitle = {2013 {IEEE} International Conference on Multimedia and Expo Workshops, San Jose, CA, USA, July 15-19, 2013}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICMEW.2013.6618292}, doi = {10.1109/ICMEW.2013.6618292}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/JiangYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/QianLY13, author = {Ruohan Qian and Weihai Li and Nenghai Yu}, title = {High precision rotation angle estimation for rotated images}, booktitle = {2013 {IEEE} International Conference on Multimedia and Expo Workshops, San Jose, CA, USA, July 15-19, 2013}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICMEW.2013.6618298}, doi = {10.1109/ICMEW.2013.6618298}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/QianLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/CaoZLY13, author = {Yun Cao and Xianfeng Zhao and Fenghua Li and Nenghai Yu}, editor = {Adnan M. Alattar and Nasir D. Memon and Chad Heitzenrater}, title = {Video steganography with multi-path motion estimation}, booktitle = {Media Watermarking, Security, and Forensics 2013, Burlingame, CA, USA, February 5-7, 2013, Proceedings}, series = {{SPIE} Proceedings}, volume = {8665}, pages = {86650K}, publisher = {{SPIE}}, year = {2013}, url = {https://doi.org/10.1117/12.2007374}, doi = {10.1117/12.2007374}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mediaforensics/CaoZLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WangWYL13, author = {Jianfeng Wang and Jingdong Wang and Nenghai Yu and Shipeng Li}, editor = {Alejandro Jaimes and Nicu Sebe and Nozha Boujemaa and Daniel Gatica{-}Perez and David A. Shamma and Marcel Worring and Roger Zimmermann}, title = {Order preserving hashing for approximate nearest neighbor search}, booktitle = {{ACM} Multimedia Conference, {MM} '13, Barcelona, Spain, October 21-25, 2013}, pages = {133--142}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2502081.2502100}, doi = {10.1145/2502081.2502100}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/WangWYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amm/YangMY12a, author = {Yang Yang and Jun Ming and Nenghai Yu}, title = {Color Image Quality Assessment Based on {CIEDE2000}}, journal = {Adv. Multim.}, volume = {2012}, pages = {273723:1--273723:6}, year = {2012}, url = {https://doi.org/10.1155/2012/273723}, doi = {10.1155/2012/273723}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amm/YangMY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amm/YangMY12, author = {Yang Yang and Jun Ming and Nenghai Yu}, title = {A Design Method of Saturation Test Image Based on {CIEDE2000}}, journal = {Adv. Multim.}, volume = {2012}, pages = {513963:1--513963:4}, year = {2012}, url = {https://doi.org/10.1155/2012/513963}, doi = {10.1155/2012/513963}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amm/YangMY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amm/JiangLXY12, author = {Kai Jiang and Like Liu and Rong Xiao and Nenghai Yu}, title = {Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data}, journal = {Adv. Multim.}, volume = {2012}, pages = {987124:1--987124:9}, year = {2012}, url = {https://doi.org/10.1155/2012/987124}, doi = {10.1155/2012/987124}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amm/JiangLXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/WuHYML12, author = {Lei Wu and Xian{-}Sheng Hua and Nenghai Yu and Wei{-}Ying Ma and Shipeng Li}, title = {Flickr Distance: {A} Relationship Measure for Visual Concepts}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {34}, number = {5}, pages = {863--875}, year = {2012}, url = {https://doi.org/10.1109/TPAMI.2011.195}, doi = {10.1109/TPAMI.2011.195}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/WuHYML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZLY12, author = {Chao Wang and Weiming Zhang and Jiufen Liu and Nenghai Yu}, title = {Fast Matrix Embedding by Matrix Extending}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {1}, pages = {346--350}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2164907}, doi = {10.1109/TIFS.2011.2164907}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhangCY12, author = {Weiming Zhang and Biao Chen and Nenghai Yu}, title = {Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers}, journal = {{IEEE} Trans. Image Process.}, volume = {21}, number = {6}, pages = {2991--3003}, year = {2012}, url = {https://doi.org/10.1109/TIP.2012.2187667}, doi = {10.1109/TIP.2012.2187667}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhangCY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/WuHJZY12, author = {Lei Wu and Steven C. H. Hoi and Rong Jin and Jianke Zhu and Nenghai Yu}, title = {Learning Bregman Distance Functions for Semi-Supervised Clustering}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {24}, number = {3}, pages = {478--491}, year = {2012}, url = {https://doi.org/10.1109/TKDE.2010.215}, doi = {10.1109/TKDE.2010.215}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/WuHJZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcsc/YangZXXY12, author = {Ce Yang and Weiming Zhang and Jun Xu and Jiajia Xu and Nenghai Yu}, title = {A Fast Privacy-Preserving Multi-keyword Search Scheme on Cloud Data}, booktitle = {2012 International Conference on Cloud and Service Computing, {CSC} 2012, Shanghai, China, November 22-24, 2012}, pages = {104--110}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSC.2012.23}, doi = {10.1109/CSC.2012.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcsc/YangZXXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcsc/XuZYXY12, author = {Jun Xu and Weiming Zhang and Ce Yang and Jiajia Xu and Nenghai Yu}, title = {Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data}, booktitle = {2012 International Conference on Cloud and Service Computing, {CSC} 2012, Shanghai, China, November 22-24, 2012}, pages = {124--130}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CSC.2012.26}, doi = {10.1109/CSC.2012.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcsc/XuZYXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/YangLZY12, author = {Nan Yang and Mu Li and Dongdong Zhang and Nenghai Yu}, title = {A Ranking-based Approach to Word Reordering for Statistical Machine Translation}, booktitle = {The 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea - Volume 1: Long Papers}, pages = {912--920}, publisher = {The Association for Computer Linguistics}, year = {2012}, url = {https://aclanthology.org/P12-1096/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/YangLZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZhuangGLMZY12, author = {Liansheng Zhuang and Haoyuan Gao and Zhouchen Lin and Yi Ma and Xin Zhang and Nenghai Yu}, title = {Non-negative low rank and sparse graph for semi-supervised learning}, booktitle = {2012 {IEEE} Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, June 16-21, 2012}, pages = {2328--2335}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CVPR.2012.6247944}, doi = {10.1109/CVPR.2012.6247944}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/ZhuangGLMZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimcs/XuMZYL12, author = {Xiaobin Xu and Tao Mei and Wenjun Zeng and Nenghai Yu and Jiebo Luo}, editor = {Xinguo Yu and Rainer Lienhart and Zheng{-}Jun Zha and Yan Liu and Shin'ichi Satoh}, title = {{AMIGO:} accurate mobile image geotagging}, booktitle = {The 4th International Conference on Internet Multimedia Computing and Service, {ICIMCS} '12, Wuhan, China, September 9-11, 2012}, pages = {11--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382336.2382340}, doi = {10.1145/2382336.2382340}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icimcs/XuMZYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimcs/WuMYL12, author = {Yue Wu and Tao Mei and Nenghai Yu and Shipeng Li}, editor = {Xinguo Yu and Rainer Lienhart and Zheng{-}Jun Zha and Yan Liu and Shin'ichi Satoh}, title = {Accelerometer-based single-handed video browsing on mobile devices: design and user studies}, booktitle = {The 4th International Conference on Internet Multimedia Computing and Service, {ICIMCS} '12, Wuhan, China, September 9-11, 2012}, pages = {157--160}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382336.2382381}, doi = {10.1145/2382336.2382381}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icimcs/WuMYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/QianLYH12, author = {Ruohan Qian and Weihai Li and Nenghai Yu and Zhuo Hao}, editor = {Jian Zhang and Dan Schonfeld and David Dagan Feng}, title = {Image Forensics with Rotation-Tolerant Resampling Detection}, booktitle = {2012 {IEEE} International Conference on Multimedia and Expo Workshops, Melbourne, Australia, July 9-13, 2012}, pages = {61--66}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICMEW.2012.18}, doi = {10.1109/ICMEW.2012.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/QianLYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/DaiWZY12, author = {Lican Dai and Xin{-}Jing Wang and Lei Zhang and Nenghai Yu}, title = {Efficient Tag Mining via Mixture Modeling for Real-Time Search-Based Image Annotation}, booktitle = {Proceedings of the 2012 {IEEE} International Conference on Multimedia and Expo, {ICME} 2012, Melbourne, Australia, July 9-13, 2012}, pages = {134--139}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICME.2012.104}, doi = {10.1109/ICME.2012.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/DaiWZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YinWYZ12, author = {Huagang Yin and Changhu Wang and Nenghai Yu and Lei Zhang}, editor = {Jian Zhang and Dan Schonfeld and David Dagan Feng}, title = {Trip Mining and Recommendation from Geo-tagged Photos}, booktitle = {2012 {IEEE} International Conference on Multimedia and Expo Workshops, Melbourne, Australia, July 9-13, 2012}, pages = {540--545}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICMEW.2012.100}, doi = {10.1109/ICMEW.2012.100}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/YinWYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/LiYY12, author = {Weihai Li and Yupeng Yan and Nenghai Yu}, editor = {Noboru Babaguchi and Kiyoharu Aizawa and John R. Smith and Shin'ichi Satoh and Thomas Plagemann and Xian{-}Sheng Hua and Rong Yan}, title = {Breaking row-column shuffle based image cipher}, booktitle = {Proceedings of the 20th {ACM} Multimedia Conference, {MM} '12, Nara, Japan, October 29 - November 02, 2012}, pages = {1097--1100}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2393347.2396392}, doi = {10.1145/2393347.2396392}, timestamp = {Tue, 20 Jul 2021 15:36:10 +0200}, biburl = {https://dblp.org/rec/conf/mm/LiYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vcip/PanSLYL12, author = {Zhaotai Pan and Huifeng Shen and Yan Lu and Nenghai Yu and Shipeng Li}, title = {A low-complexity screen compression scheme}, booktitle = {2012 Visual Communications and Image Processing, {VCIP} 2012, San Diego, CA, USA, November 27-30, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/VCIP.2012.6410780}, doi = {10.1109/VCIP.2012.6410780}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vcip/PanSLYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/JiangYL12, author = {Jingtian Jiang and Nenghai Yu and Chin{-}Yew Lin}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {FoCUS: learning to crawl web forums}, booktitle = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon, France, April 16-20, 2012 (Companion Volume)}, pages = {33--42}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187980.2187985}, doi = {10.1145/2187980.2187985}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/JiangYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccc/HaoZY11, author = {Zhuo Hao and Sheng Zhong and Nenghai Yu}, title = {A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing}, journal = {Int. J. Comput. Commun. Control}, volume = {6}, number = {2}, pages = {227--235}, year = {2011}, url = {https://doi.org/10.15837/ijccc.2011.2.2170}, doi = {10.15837/IJCCC.2011.2.2170}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijccc/HaoZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/WuHJZY11, author = {Lei Wu and Steven C. H. Hoi and Rong Jin and Jianke Zhu and Nenghai Yu}, title = {Distance metric learning from uncertain side information for automated photo tagging}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {2}, number = {2}, pages = {13:1--13:28}, year = {2011}, url = {https://doi.org/10.1145/1899412.1899417}, doi = {10.1145/1899412.1899417}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/WuHJZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/HaoZY11, author = {Zhuo Hao and Sheng Zhong and Nenghai Yu}, title = {A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {23}, number = {9}, pages = {1432--1437}, year = {2011}, url = {https://doi.org/10.1109/TKDE.2011.62}, doi = {10.1109/TKDE.2011.62}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/HaoZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcsc/LiangHY011, author = {Yi Liang and Zhuo Hao and Nenghai Yu and Bin Liu}, title = {RandTest: Towards more secure and reliable dataflow processing in cloud computing}, booktitle = {2011 International Conference on Cloud and Service Computing, {CSC} 2011, Hong Kong, December 12-14, 2011}, pages = {180--184}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSC.2011.6138517}, doi = {10.1109/CSC.2011.6138517}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcsc/LiangHY011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/XuWLZLY11, author = {Hao Xu and Jingdong Wang and Zhu Li and Gang Zeng and Shipeng Li and Nenghai Yu}, editor = {Dimitris N. Metaxas and Long Quan and Alberto Sanfeliu and Luc Van Gool}, title = {Complementary hashing for approximate nearest neighbor search}, booktitle = {{IEEE} International Conference on Computer Vision, {ICCV} 2011, Barcelona, Spain, November 6-13, 2011}, pages = {1631--1638}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICCV.2011.6126424}, doi = {10.1109/ICCV.2011.6126424}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/XuWLZLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/XuZYZC11, author = {Jiajia Xu and Weiming Zhang and Nenghai Yu and Feng Zhu and Biao Chen}, title = {Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {223--227}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.170}, doi = {10.1109/ICIG.2011.170}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/XuZYZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/AoY11, author = {Huanhuan Ao and Nenghai Yu}, title = {Edge Saliency Map Detection with Texture Suppression}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {309--313}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.46}, doi = {10.1109/ICIG.2011.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/AoY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/ZhouLZZY11, author = {Wei Zhou and Yu Liu and Weiming Zhang and Liansheng Zhuang and Nenghai Yu}, title = {Dynamic Background Subtraction Using Spatial-Color Binary Patterns}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {314--319}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.76}, doi = {10.1109/ICIG.2011.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/ZhouLZZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/YouY11, author = {Xin You and Nenghai Yu}, title = {An Automatic Matching Algorithm Based on {SIFT} Descriptors for Remote Sensing Ship Image}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {377--381}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.188}, doi = {10.1109/ICIG.2011.188}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/YouY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/ZhuangGHY11, author = {Liansheng Zhuang and Haoyuan Gao and Jingjing Huang and Nenghai Yu}, title = {Semi-supervised Classification via Low Rank Graph}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {511--516}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.86}, doi = {10.1109/ICIG.2011.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/ZhuangGHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/GaoZY11, author = {Haoyuan Gao and Liansheng Zhuang and Nenghai Yu}, title = {A New Graph Constructor for Semi-supervised Discriminant Analysis via Group Sparsity}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {691--695}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.82}, doi = {10.1109/ICIG.2011.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/GaoZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/LiuZYY11, author = {Yu Liu and Wei Zhou and Huagang Yin and Nenghai Yu}, title = {Tracking Based on {SURF} and Superpixel}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {714--719}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.60}, doi = {10.1109/ICIG.2011.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/LiuZYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/JiangWY11, author = {Kai Jiang and Peng Wang and Nenghai Yu}, title = {ContextRank: Personalized Tourism Recommendation by Exploiting Context Information of Geotagged Web Photos}, booktitle = {Sixth International Conference on Image and Graphics, {ICIG} 2011, Hefei, Anhui, China, August 12-15, 2011}, pages = {931--937}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICIG.2011.48}, doi = {10.1109/ICIG.2011.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/JiangWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangCY11, author = {Weiming Zhang and Biao Chen and Nenghai Yu}, editor = {Tom{\'{a}}s Filler and Tom{\'{a}}s Pevn{\'{y}} and Scott Craver and Andrew D. Ker}, title = {Capacity-Approaching Codes for Reversible Data Hiding}, booktitle = {Information Hiding - 13th International Conference, {IH} 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6958}, pages = {255--269}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24178-9\_18}, doi = {10.1007/978-3-642-24178-9\_18}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/ZhuangSHLY11, author = {Liansheng Zhuang and Lanbo She and Jingjing Huang and Jiebo Luo and Nenghai Yu}, editor = {Kuo{-}Tien Lee and Wen{-}Hsiang Tsai and Hong{-}Yuan Mark Liao and Tsuhan Chen and Jun{-}Wei Hsieh and Chien{-}Cheng Tseng}, title = {Regularized Semi-supervised Latent Dirichlet Allocation for Visual Concept Learning}, booktitle = {Advances in Multimedia Modeling - 17th International Multimedia Modeling Conference, {MMM} 2011, Taipei, Taiwan, January 5-7, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6523}, pages = {403--412}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17832-0\_38}, doi = {10.1007/978-3-642-17832-0\_38}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmm/ZhuangSHLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmap/WuYLL11, author = {Lei Wu and Nenghai Yu and Jing Liu and Mingjing Li}, editor = {Alejandro Linares{-}Barranco and George A. Tsihrintzis}, title = {Latent Topic Visual Language Model for Object Categorization}, booktitle = {{SIGMAP} 2011 - Proceedings of the International Conference on Signal Processing and Multimedia Applications, Seville, Spain, 18-21 July, 2011, {SIGMAP} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {149--158}, publisher = {SciTePress}, year = {2011}, timestamp = {Tue, 12 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmap/WuYLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcit/LiuY10, author = {Xiaojiang Liu and Nenghai Yu}, title = {People Summarization by Combining Named Entity Recognition and Relation Extraction}, journal = {J. Convergence Inf. Technol.}, volume = {5}, number = {10}, pages = {233--241}, year = {2010}, url = {http://www.aicit.org/jcit/ppl/030\_FASTJCIT4-874154.pdf}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcit/LiuY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangLWY10, author = {Weiming Zhang and Jiufen Liu and Xin Wang and Nenghai Yu}, title = {Generalization and Analysis of the Paper Folding Method for Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {4}, pages = {694--704}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2065804}, doi = {10.1109/TIFS.2010.2065804}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangLWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/WuHY10, author = {Lei Wu and Steven C. H. Hoi and Nenghai Yu}, title = {Semantics-Preserving Bag-of-Words Models and Applications}, journal = {{IEEE} Trans. Image Process.}, volume = {19}, number = {7}, pages = {1908--1920}, year = {2010}, url = {https://doi.org/10.1109/TIP.2010.2045169}, doi = {10.1109/TIP.2010.2045169}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/WuHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LiYH10, author = {Zheng Li and Nenghai Yu and Zhuo Hao}, title = {A Novel Parallel Traffic Control Mechanism for Cloud Computing}, booktitle = {Cloud Computing, Second International Conference, CloudCom 2010, November 30 - December 3, 2010, Indianapolis, Indiana, USA, Proceedings}, pages = {376--382}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CloudCom.2010.9}, doi = {10.1109/CLOUDCOM.2010.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/LiYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/geoinformatics/YuanSZY10, author = {Jing Yuan and Guangzhong Sun and Zhong Zhang and Nenghai Yu}, title = {CkNN monitoring based on parallel pre-computing}, booktitle = {The 18th International Conference on Geoinformatics: GIScience in Change, Geoinformatics 2010, Peking University, Beijing, China, June, 18-20, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GEOINFORMATICS.2010.5568155}, doi = {10.1109/GEOINFORMATICS.2010.5568155}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/geoinformatics/YuanSZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiY10, author = {Weihai Li and Nenghai Yu}, title = {Rotation robust detection of copy-move forgery}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, pages = {2113--2116}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICIP.2010.5652519}, doi = {10.1109/ICIP.2010.5652519}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/LiY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhuangZYL10, author = {Liansheng Zhuang and Rui Zhao and Nenghai Yu and Bin Liu}, title = {{SVD} based linear filtering in {DCT} domain}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, pages = {2769--2772}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICIP.2010.5651004}, doi = {10.1109/ICIP.2010.5651004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/ZhuangZYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/ZhouZY10, author = {Wei Zhou and Liansheng Zhuang and Nenghai Yu}, title = {A robust part-based tracker}, booktitle = {Proceedings of the 2010 {IEEE} International Conference on Multimedia and Expo, {ICME} 2010, 19-23 July 2010, Singapore}, pages = {766--771}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICME.2010.5583855}, doi = {10.1109/ICME.2010.5583855}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/ZhouZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiuY10, author = {Yijie Liu and Nenghai Yu}, title = {Dual linkage refinement for YouTube video topic discovery}, booktitle = {Proceedings of the 2010 {IEEE} International Conference on Multimedia and Expo, {ICME} 2010, 19-23 July 2010, Singapore}, pages = {1576--1581}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICME.2010.5582943}, doi = {10.1109/ICME.2010.5582943}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LiuY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LiuYL10, author = {Ming Liu and Nenghai Yu and Weihai Li}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {Camera Model Identification for {JPEG} Images via Tensor Analysis}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {462--465}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.118}, doi = {10.1109/IIHMSP.2010.118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/LiuYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/LiuNYW10, author = {Xiaojiang Liu and Zaiqing Nie and Nenghai Yu and Ji{-}Rong Wen}, editor = {Bharat Rao and Balaji Krishnapuram and Andrew Tomkins and Qiang Yang}, title = {BioSnowball: automated population of Wikis}, booktitle = {Proceedings of the 16th {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010}, pages = {969--978}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835804.1835926}, doi = {10.1145/1835804.1835926}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/LiuNYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ChenYLC10, author = {Yuxin Chen and Nenghai Yu and Bo Luo and Xue{-}wen Chen}, editor = {Alberto Del Bimbo and Shih{-}Fu Chang and Arnold W. M. Smeulders}, title = {iLike: integrating visual and textual features for vertical search}, booktitle = {Proceedings of the 18th International Conference on Multimedia 2010, Firenze, Italy, October 25-29, 2010}, pages = {221--230}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873951.1873984}, doi = {10.1145/1873951.1873984}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/ChenYLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/YinLWYZ10, author = {Huagang Yin and Xin Lu and Changhu Wang and Nenghai Yu and Lei Zhang}, editor = {Alberto Del Bimbo and Shih{-}Fu Chang and Arnold W. M. Smeulders}, title = {Photo2Trip: an interactive trip planning system based on geo-tagged photos}, booktitle = {Proceedings of the 18th International Conference on Multimedia 2010, Firenze, Italy, October 25-29, 2010}, pages = {1579--1582}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873951.1874291}, doi = {10.1145/1873951.1874291}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/YinLWYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/KangY10, author = {Yujie Kang and Nenghai Yu}, editor = {Guoping Qiu and Kin{-}Man Lam and Hitoshi Kiya and Xiangyang Xue and C.{-}C. Jay Kuo and Michael S. Lew}, title = {Soft-Constraint Based Online {LDA} for Community Recommendation}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6298}, pages = {494--505}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15696-0\_46}, doi = {10.1007/978-3-642-15696-0\_46}, timestamp = {Mon, 26 Jun 2023 20:47:39 +0200}, biburl = {https://dblp.org/rec/conf/pcm/KangY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/LiYY10, author = {Weihai Li and Nenghai Yu and Yuan Yuan}, title = {Identifying camera and processing from cropped {JPEG} photos via tensor analysis}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Istanbul, Turkey, 10-13 October 2010}, pages = {3889--3895}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICSMC.2010.5641757}, doi = {10.1109/ICSMC.2010.5641757}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smc/LiYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiYY09, author = {Weihai Li and Yuan Yuan and Nenghai Yu}, title = {Passive detection of doctored {JPEG} image via block artifact grid extraction}, journal = {Signal Process.}, volume = {89}, number = {9}, pages = {1821--1829}, year = {2009}, url = {https://doi.org/10.1016/j.sigpro.2009.03.025}, doi = {10.1016/J.SIGPRO.2009.03.025}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LiYY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/WuHLYH09, author = {Lei Wu and Yang Hu and Mingjing Li and Nenghai Yu and Xian{-}Sheng Hua}, title = {Scale-Invariant Visual Language Modeling for Object Categorization}, journal = {{IEEE} Trans. Multim.}, volume = {11}, number = {2}, pages = {286--294}, year = {2009}, url = {https://doi.org/10.1109/TMM.2008.2009692}, doi = {10.1109/TMM.2008.2009692}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/WuHLYH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LiLYM09, author = {Yang Li and Zheng Li and Nenghai Yu and Ke Ma}, editor = {Martin Gilje Jaatun and Gansen Zhao and Chunming Rong}, title = {{APFA:} Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing}, booktitle = {Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5931}, pages = {529--540}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10665-1\_48}, doi = {10.1007/978-3-642-10665-1\_48}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/LiLYM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/XiaLY09, author = {Tianze Xia and Zheng Li and Nenghai Yu}, editor = {Martin Gilje Jaatun and Gansen Zhao and Chunming Rong}, title = {Research on Cloud Computing Based on Deep Analysis to Typical Platforms}, booktitle = {Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5931}, pages = {601--608}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10665-1\_59}, doi = {10.1007/978-3-642-10665-1\_59}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/XiaLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csie/ZhuangTYZ09, author = {Liansheng Zhuang and Ketan Tang and Nenghai Yu and Wei Zhou}, editor = {Mark Burgin and Masud H. Chowdhury and Chan H. Ham and Simone A. Ludwig and Weilian Su and Sumanth Yenduri}, title = {Unsupervised Object Learning with AM-pLSA}, booktitle = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information Engineering, March 31 - April 2, 2009, Los Angeles, California, USA, 7 Volumes}, pages = {701--704}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSIE.2009.866}, doi = {10.1109/CSIE.2009.866}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csie/ZhuangTYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/ChenJZLY09, author = {Yukun Chen and Kai Jiang and Yu Zheng and Chunping Li and Nenghai Yu}, editor = {Xiaofang Zhou and Xing Xie}, title = {Trajectory simplification method for location-based social networking services}, booktitle = {Proceedings of the 2009 International Workshop on Location Based Social Networks, {LBSN} 2009, November 3, 2009, Seattle, Washington, USA, Proceedings}, pages = {33--40}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1629890.1629898}, doi = {10.1145/1629890.1629898}, timestamp = {Sat, 08 Feb 2020 13:18:29 +0100}, biburl = {https://dblp.org/rec/conf/gis/ChenJZLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/ZhuangWYYQ09, author = {Liansheng Zhuang and Mengliao Wang and Wen Yu and Nenghai Yu and Yangchun Qian}, title = {Low-Resolution Face Recognition via Sparse Representation of Patches}, booktitle = {Proceedings of the Fifth International Conference on Image and Graphics, {ICIG} 2009, Xi'an, Shanxi, China, 20-23 September 2009}, pages = {200--204}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICIG.2009.154}, doi = {10.1109/ICIG.2009.154}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/ZhuangWYYQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/ZhuangSJTY09, author = {Liansheng Zhuang and Lanbo She and Yuning Jiang and Ketan Tang and Nenghai Yu}, title = {Image Classification via Semi-supervised pLSA}, booktitle = {Proceedings of the Fifth International Conference on Image and Graphics, {ICIG} 2009, Xi'an, Shanxi, China, 20-23 September 2009}, pages = {205--208}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICIG.2009.153}, doi = {10.1109/ICIG.2009.153}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icig/ZhuangSJTY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiY09, author = {Weihai Li and Nenghai Yu}, title = {A robust chaos-based image encryption scheme}, booktitle = {Proceedings of the 2009 {IEEE} International Conference on Multimedia and Expo, {ICME} 2009, June 28 - July 2, 2009, New York City, NY, {USA}}, pages = {1034--1037}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICME.2009.5202674}, doi = {10.1109/ICME.2009.5202674}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LiY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/RuiYLW09, author = {Xiaoguang Rui and Nenghai Yu and Mingjing Li and Lei Wu}, title = {On cross-language image annotations}, booktitle = {Proceedings of the 2009 {IEEE} International Conference on Multimedia and Expo, {ICME} 2009, June 28 - July 2, 2009, New York City, NY, {USA}}, pages = {1608--1611}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICME.2009.5202826}, doi = {10.1109/ICME.2009.5202826}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/RuiYLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WuHY09, author = {Lei Wu and Steven C. H. Hoi and Nenghai Yu}, editor = {Rong Yan and Qi Tian and John R. Smith and Rahul Sukthankar}, title = {Semantics-preserving bag-of-words models for efficient image annotation}, booktitle = {Proceedings of the First {ACM} workshop on Large-scale multimedia retrieval and mining, LS-MMRM@ACM Multimedia 2009, Beijing, China, October 23, 2009}, pages = {19--26}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1631058.1631064}, doi = {10.1145/1631058.1631064}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/mm/WuHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WuHJZY09, author = {Lei Wu and Steven C. H. Hoi and Rong Jin and Jianke Zhu and Nenghai Yu}, editor = {Wen Gao and Yong Rui and Alan Hanjalic and Changsheng Xu and Eckehard G. Steinbach and Abdulmotaleb El{-}Saddik and Michelle X. Zhou}, title = {Distance metric learning from uncertain side information with application to automated photo tagging}, booktitle = {Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009}, pages = {135--144}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1631272.1631293}, doi = {10.1145/1631272.1631293}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/WuHJZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WuJHZY09, author = {Lei Wu and Rong Jin and Steven C. H. Hoi and Jianke Zhu and Nenghai Yu}, editor = {Yoshua Bengio and Dale Schuurmans and John D. Lafferty and Christopher K. I. Williams and Aron Culotta}, title = {Learning Bregman Distance Functions and Its Application for Semi-Supervised Clustering}, booktitle = {Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, Vancouver, British Columbia, Canada}, pages = {2089--2097}, publisher = {Curran Associates, Inc.}, year = {2009}, url = {https://proceedings.neurips.cc/paper/2009/hash/2f2b265625d76a6704b08093c652fd79-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/WuJHZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WuYYH09, author = {Lei Wu and Linjun Yang and Nenghai Yu and Xian{-}Sheng Hua}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {Learning to tag}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {361--370}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526758}, doi = {10.1145/1526709.1526758}, timestamp = {Thu, 03 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/WuYYH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/LiuCHYT08, author = {Duo Liu and Zheng Chen and Bei Hua and Nenghai Yu and Xinan Tang}, title = {High-performance packet classification algorithm for multithreaded {IXP} network processor}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {7}, number = {2}, pages = {16:1--16:25}, year = {2008}, url = {https://doi.org/10.1145/1331331.1331340}, doi = {10.1145/1331331.1331340}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/LiuCHYT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/ZhuSYW08, author = {Mingjie Zhu and Shuming Shi and Nenghai Yu and Ji{-}Rong Wen}, editor = {James G. Shanahan and Sihem Amer{-}Yahia and Ioana Manolescu and Yi Zhang and David A. Evans and Aleksander Kolcz and Key{-}Sun Choi and Abdur Chowdhury}, title = {Can phrase indexing help to process non-phrase queries?}, booktitle = {Proceedings of the 17th {ACM} Conference on Information and Knowledge Management, {CIKM} 2008, Napa Valley, California, USA, October 26-30, 2008}, pages = {679--688}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1458082.1458174}, doi = {10.1145/1458082.1458174}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/ZhuSYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/clef/JiangRY08, author = {Jingtian Jiang and Xiaoguang Rui and Nenghai Yu}, editor = {Carol Peters and Nicola Ferro}, title = {Feature Annotation for Visual Concept Detection in ImageCLEF 2008}, booktitle = {Working Notes for {CLEF} 2008 Workshop co-located with the 12th European Conference on Digital Libraries {(ECDL} 2008) , Aarhus, Denmark, September 17-19, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {1174}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-1174/CLEF2008wn-ImageCLEF-JiangEt2008.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:42 +0100}, biburl = {https://dblp.org/rec/conf/clef/JiangRY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/HuLY08, author = {Yang Hu and Mingjing Li and Nenghai Yu}, title = {Multiple-instance ranking: Learning to rank images for image retrieval}, booktitle = {2008 {IEEE} Computer Society Conference on Computer Vision and Pattern Recognition {(CVPR} 2008), 24-26 June 2008, Anchorage, Alaska, {USA}}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CVPR.2008.4587352}, doi = {10.1109/CVPR.2008.4587352}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/HuLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/depcos/ZiliNZ08, author = {Zi{-}Li Deng and Nenghai Yu and Zheng Li}, editor = {Wojciech Zamojski and Jacek Mazurkiewicz and Jaroslaw Sugier and Tomasz Walkowiak}, title = {Designing Fault Tolerant Networks Topologies Based on Greedy Algorithm}, booktitle = {Third International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2008, June 26-28, 2008, Szklarska Poreba, Poland}, pages = {227--234}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/DepCoS-RELCOMEX.2008.35}, doi = {10.1109/DEPCOS-RELCOMEX.2008.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/depcos/ZiliNZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/HuWYH08, author = {Yang Hu and Jingdong Wang and Nenghai Yu and Xian{-}Sheng Hua}, title = {Maximum Margin Clustering with Pairwise Constraints}, booktitle = {Proceedings of the 8th {IEEE} International Conference on Data Mining {(ICDM} 2008), December 15-19, 2008, Pisa, Italy}, pages = {253--262}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDM.2008.65}, doi = {10.1109/ICDM.2008.65}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdm/HuWYH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/JiaYRL08, author = {Jimin Jia and Nenghai Yu and Xiaoguang Rui and Mingjing Li}, title = {Multi-graph similarity reinforcement for image annotation refinement}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}}, pages = {993--996}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICIP.2008.4711924}, doi = {10.1109/ICIP.2008.4711924}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/JiaYRL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LingJYL08, author = {Xiao Ling and Jimin Jia and Nenghai Yu and Mingjing Li}, title = {Tagrank - Measuring tag importance for image annotation}, booktitle = {Proceedings of the 2008 {IEEE} International Conference on Multimedia and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany}, pages = {109--112}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICME.2008.4607383}, doi = {10.1109/ICME.2008.4607383}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LingJYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/RuiYJL08, author = {Xiaoguang Rui and Nenghai Yu and Jimin Jia and Mingjing Li}, title = {SocialRank: {A} ranking model for web image retrieval in web 2.0}, booktitle = {Proceedings of the 2008 {IEEE} International Conference on Multimedia and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany}, pages = {113--116}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICME.2008.4607384}, doi = {10.1109/ICME.2008.4607384}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/RuiYJL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiYY08, author = {Weihai Li and Nenghai Yu and Yuan Yuan}, title = {Doctored {JPEG} image detection}, booktitle = {Proceedings of the 2008 {IEEE} International Conference on Multimedia and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany}, pages = {253--256}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICME.2008.4607419}, doi = {10.1109/ICME.2008.4607419}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LiYY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/HuLY08, author = {Yang Hu and Mingjing Li and Nenghai Yu}, title = {Efficient near-duplicate image detection by learning from examples}, booktitle = {Proceedings of the 2008 {IEEE} International Conference on Multimedia and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany}, pages = {657--660}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICME.2008.4607520}, doi = {10.1109/ICME.2008.4607520}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/HuLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WuLYL08, author = {Lei Wu and Jing Liu and Nenghai Yu and Mingjing Li}, title = {Query oriented subspace shifting for near-duplicate image detection}, booktitle = {Proceedings of the 2008 {IEEE} International Conference on Multimedia and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany}, pages = {661--664}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICME.2008.4607521}, doi = {10.1109/ICME.2008.4607521}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/WuLYL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/ZhuangZTY08, author = {Liansheng Zhuang and Wei Zhou and Qi Tian and Nenghai Yu}, title = {Learning object from small and imbalanced dataset with Boost-BFKO}, booktitle = {Proceedings of the 2008 {IEEE} International Conference on Multimedia and Expo, {ICME} 2008, June 23-26 2008, Hannover, Germany}, pages = {1449--1452}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICME.2008.4607718}, doi = {10.1109/ICME.2008.4607718}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/ZhuangZTY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WuHYML08, author = {Lei Wu and Xian{-}Sheng Hua and Nenghai Yu and Wei{-}Ying Ma and Shipeng Li}, editor = {Abdulmotaleb El{-}Saddik and Son Vuong and Carsten Griwodz and Alberto Del Bimbo and K. Sel{\c{c}}uk Candan and Alejandro Jaimes}, title = {Flickr distance}, booktitle = {Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008}, pages = {31--40}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1459359.1459364}, doi = {10.1145/1459359.1459364}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/WuHYML08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/JiaYH08, author = {Jimin Jia and Nenghai Yu and Xian{-}Sheng Hua}, editor = {Abdulmotaleb El{-}Saddik and Son Vuong and Carsten Griwodz and Alberto Del Bimbo and K. Sel{\c{c}}uk Candan and Alejandro Jaimes}, title = {Annotating personal albums via web mining}, booktitle = {Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008}, pages = {459--468}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1459359.1459421}, doi = {10.1145/1459359.1459421}, timestamp = {Thu, 03 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/JiaYH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/YangZGYLY08, author = {Yang Yang and Bin B. Zhu and Rui Guo and Linjun Yang and Shipeng Li and Nenghai Yu}, editor = {Abdulmotaleb El{-}Saddik and Son Vuong and Carsten Griwodz and Alberto Del Bimbo and K. Sel{\c{c}}uk Candan and Alejandro Jaimes}, title = {A comprehensive human computation framework: with application to image labeling}, booktitle = {Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008}, pages = {479--488}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1459359.1459423}, doi = {10.1145/1459359.1459423}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/YangZGYLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/HeYR08, author = {Fang He and Nenghai Yu and Xiaoguang Rui}, editor = {Abdulmotaleb El{-}Saddik and Son Vuong and Carsten Griwodz and Alberto Del Bimbo and K. Sel{\c{c}}uk Candan and Alejandro Jaimes}, title = {Multi-progressive model for web image annotation}, booktitle = {Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008}, pages = {825--828}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1459359.1459497}, doi = {10.1145/1459359.1459497}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/HeYR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/WuLLMY07, author = {Lei Wu and Zhiwei Li and Mingjing Li and Wei{-}Ying Ma and Nenghai Yu}, editor = {Aparna S. Varde and Jian Pei}, title = {Mutually beneficial learning with application to on-line news classification}, booktitle = {Proceedings of the First Ph.D. Workshop in CIKM, {PIKM} 2007, Sixteenth {ACM} Conference on Information and Knowledge Management, {CIKM} 2007, Lisbon, Portugal, November 9, 2007}, pages = {85--92}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1316874.1316889}, doi = {10.1145/1316874.1316889}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/WuLLMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WuLYL07, author = {Lei Wu and Houqiang Li and Nenghai Yu and Mingjing Li}, title = {Volume Graph Model for 3D Facial Surface Extraction}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {268--271}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284638}, doi = {10.1109/ICME.2007.4284638}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/WuLYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/HuYLL07, author = {Yang Hu and Nenghai Yu and Zhiwei Li and Mingjing Li}, title = {Image Search Result Clustering and Re-Ranking via Partial Grouping}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {603--606}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284722}, doi = {10.1109/ICME.2007.4284722}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/HuYLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/RuiYWL07, author = {Xiaoguang Rui and Nenghai Yu and Taifeng Wang and Mingjing Li}, title = {A Search-Based Web Image Annotation Method}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {655--658}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284735}, doi = {10.1109/ICME.2007.4284735}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/RuiYWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WangLYL07, author = {Bin Wang and Zhiwei Li and Nenghai Yu and Mingjing Li}, title = {Image Annotation in a Progressive Way}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {811--814}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284774}, doi = {10.1109/ICME.2007.4284774}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/WangLYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiWLYL07, author = {Dongfang Li and Bin Wang and Zhiwei Li and Nenghai Yu and Mingjing Li}, title = {On Detection of Advertising Images}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {1758--1761}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4285011}, doi = {10.1109/ICME.2007.4285011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LiWLYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mir/WuLLMY07, author = {Lei Wu and Mingjing Li and Zhiwei Li and Wei{-}Ying Ma and Nenghai Yu}, editor = {James Ze Wang and Nozha Boujemaa and Alberto Del Bimbo and Jia Li}, title = {Visual language modeling for image classification}, booktitle = {Proceedings of the 9th {ACM} {SIGMM} International Workshop on Multimedia Information Retrieval, {MIR} 2007, Augsburg, Bavaria, Germany, September 24-29, 2007}, pages = {115--124}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1290082.1290101}, doi = {10.1145/1290082.1290101}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mir/WuLLMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/RuiLLMY07, author = {Xiaoguang Rui and Mingjing Li and Zhiwei Li and Wei{-}Ying Ma and Nenghai Yu}, editor = {Rainer Lienhart and Anand R. Prasad and Alan Hanjalic and Sunghyun Choi and Brian P. Bailey and Nicu Sebe}, title = {Bipartite graph reinforcement model for web image annotation}, booktitle = {Proceedings of the 15th International Conference on Multimedia 2007, Augsburg, Germany, September 24-29, 2007}, pages = {585--594}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1291233.1291378}, doi = {10.1145/1291233.1291378}, timestamp = {Thu, 04 Nov 2021 14:40:54 +0100}, biburl = {https://dblp.org/rec/conf/mm/RuiLLMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/WuLYL07, author = {Lei Wu and Houqiang Li and Nenghai Yu and Mingjing Li}, editor = {Tat{-}Jen Cham and Jianfei Cai and Chitra Dorai and Deepu Rajan and Tat{-}Seng Chua and Liang{-}Tien Chia}, title = {Accurate 3D Facial Synthesis for Plastic Surgery Simulation}, booktitle = {Advances in Multimedia Modeling, 13th International Multimedia Modeling Conference, {MMM} 2007, Singapore, January 9-12, 2007. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4352}, pages = {269--278}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69429-8\_27}, doi = {10.1007/978-3-540-69429-8\_27}, timestamp = {Wed, 10 Jun 2020 15:40:49 +0200}, biburl = {https://dblp.org/rec/conf/mmm/WuLYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/PangLY06, author = {Yanwei Pang and Zhengkai Liu and Nenghai Yu}, title = {A new nonlinear feature extraction method for face recognition}, journal = {Neurocomputing}, volume = {69}, number = {7-9}, pages = {949--953}, year = {2006}, url = {https://doi.org/10.1016/j.neucom.2005.07.005}, doi = {10.1016/J.NEUCOM.2005.07.005}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/PangLY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WangYLL06, author = {Taifeng Wang and Nenghai Yu and Zhiwei Li and Mingjing Li}, editor = {Gary M. Olson and Robin Jeffries}, title = {nReader: reading news quickly, deeply and vividly}, booktitle = {Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, {CHI} 2006, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, April 22-27, 2006}, pages = {1385--1390}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1125451.1125707}, doi = {10.1145/1125451.1125707}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/WangYLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/PangY06, author = {Yanwei Pang and Nenghai Yu}, title = {Regularized Local Discrimimant Embedding}, booktitle = {2006 {IEEE} International Conference on Acoustics Speech and Signal Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006}, pages = {780--783}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICASSP.2006.1660770}, doi = {10.1109/ICASSP.2006.1660770}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/PangY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/RuiYY06, author = {Xiaoguang Rui and Pingbo Yuan and Nenghai Yu}, editor = {Yueting Zhuang and Shiqiang Yang and Yong Rui and Qinming He}, title = {Image Annotations Based on Semi-supervised Clustering with Semantic Soft Constraints}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2006, 7th Pacific Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4261}, pages = {624--632}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922162\_72}, doi = {10.1007/11922162\_72}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/pcm/RuiYY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/PangZLYL05, author = {Yanwei Pang and Lei Zhang and Zhengkai Liu and Nenghai Yu and Houqiang Li}, editor = {De{-}Shuang Huang and Xiao{-}Ping (Steven) Zhang and Guang{-}Bin Huang}, title = {Neighborhood Preserving Projections {(NPP):} {A} Novel Linear Dimension Reduction Method}, booktitle = {Advances in Intelligent Computing, International Conference on Intelligent Computing, {ICIC} 2005, Hefei, China, August 23-26, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3644}, pages = {117--125}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11538059\_13}, doi = {10.1007/11538059\_13}, timestamp = {Thu, 12 Dec 2019 16:43:34 +0100}, biburl = {https://dblp.org/rec/conf/icic/PangZLYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/PangYLZL05, author = {Yanwei Pang and Nenghai Yu and Houqiang Li and Rong Zhang and Zhengkai Liu}, editor = {Yo{-}Sung Ho and Hyoung Joong Kim}, title = {Face Recognition Using Neighborhood Preserving Projections}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3768}, pages = {854--864}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11582267\_74}, doi = {10.1007/11582267\_74}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pcm/PangYLZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/PangYZRL04, author = {Yanwei Pang and Nenghai Yu and Rong Zhang and Jiawei Rong and Zhengkai Liu}, title = {Fusion of {SVD} and {LDA} for face recognition}, booktitle = {Proceedings of the 2004 International Conference on Image Processing, {ICIP} 2004, Singapore, October 24-27, 2004}, pages = {1417--1420}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICIP.2004.1419768}, doi = {10.1109/ICIP.2004.1419768}, timestamp = {Mon, 08 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/PangYZRL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lanman/ChenYRGY04, author = {Yuzhong Chen and Bingqing Yang and Rong Ren and Yanhui Geng and Nenghai Yu}, title = {Traffic engineering with constraint-based routing in DiffServ/MPLS network}, booktitle = {The 13th {IEEE} Workshop on Local and Metropolitan Area Networks, {LANMAN} 2004, San Francisco, CA, USA, April 25-28, 2004}, pages = {125--128}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/LANMAN.2004.1338416}, doi = {10.1109/LANMAN.2004.1338416}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/lanman/ChenYRGY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/LiYYY03, author = {Xuelong Li and Tianqiang Yuan and Nenghai Yu and Yuan Yuan}, title = {Adaptive color quantization based on perceptive edge protection}, journal = {Pattern Recognit. Lett.}, volume = {24}, number = {16}, pages = {3165--3176}, year = {2003}, url = {https://doi.org/10.1016/j.patrec.2003.08.010}, doi = {10.1016/J.PATREC.2003.08.010}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/LiYYY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/LiuXY03, author = {Ping Liu and Zhengyuan Xu and Nenghai Yu}, title = {On performance study of data based multiuser detection methods for uplink long-code {CDMA} systems}, booktitle = {Proceedings of the {IEEE} 14th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2003, 7-10 September 2003, Beijing, China}, pages = {2910--2914}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/PIMRC.2003.1259281}, doi = {10.1109/PIMRC.2003.1259281}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/LiuXY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/YuX03, author = {Nenghai Yu and Zhengyuan Xu}, title = {On the second-order statistics of the sample covariance}, booktitle = {Proceedings of the {IEEE} 14th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2003, 7-10 September 2003, Beijing, China}, pages = {2953--2957}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/PIMRC.2003.1259292}, doi = {10.1109/PIMRC.2003.1259292}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/YuX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/XuLY03, author = {Zhengyuan Xu and Ping Liu and Nenghai Yu}, title = {Performance of channel estimation assisted linear multiuser receivers for downlink {CDMA} systems with long spreading codes}, booktitle = {Proceedings of the {IEEE} 14th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2003, 7-10 September 2003, Beijing, China}, pages = {2978--2982}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/PIMRC.2003.1259297}, doi = {10.1109/PIMRC.2003.1259297}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/XuLY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.