default search action
Wan-Yi Sabrina Lin
Person information
- affiliation: IBM Research
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c36]Yu-Jui Huang, Shih-Chun Lin, Yu-Chih Huang, Kuan-Hui Lyu, Hsin-Hua Shen, Wan-Yi Sabrina Lin:
On characterizing optimal Wasserstein GAN solutions for non-Gaussian data. ISIT 2023: 909-914
2010 – 2019
- 2019
- [j19]Donghao Ren, Laura R. Marusich, John O'Donovan, Jonathan Z. Bakdash, James Austin Schaffer, Daniel N. Cassenti, Sue E. Kase, Heather E. Roy, Wan-Yi Sabrina Lin, Tobias Höllerer:
Understanding node-link and matrix visualizations of networks: A large-scale online experiment. Netw. Sci. 7(2): 242-264 (2019) - 2016
- [j18]Anni Coden, W. Sabrina Lin, Keith Houck, Michael A. Tanenblatt, Jeff Boston, Julie MacNaught, Danny Soroker, Justin D. Weisz, Shimei Pan, Jui-Hsin Lai, Jie Lu, Steve Wood, Yinglong Xia, Ching-Yung Lin:
Uncovering insider threats from the digital footprints of individuals. IBM J. Res. Dev. 60(4): 8 (2016) - [j17]Nan Cao, Conglei Shi, W. Sabrina Lin, Jie Lu, Yu-Ru Lin, Ching-Yung Lin:
TargetVue: Visual Analysis of Anomalous User Behaviors in Online Communication Systems. IEEE Trans. Vis. Comput. Graph. 22(1): 280-289 (2016) - [c35]James Schaffer, Brandon Huynh, John O'Donovan, Tobias Höllerer, Yinglong Xia, W. Sabrina Lin:
An analysis of student behavior in two massive open online courses. ASONAM 2016: 380-385 - 2015
- [c34]Ching-Yung Lin, Danny L. Yeh, Nan Cao, Jui-Hsin Lai, Chun-Fu (Richard) Chen, Conglei Shi, Jie Lu, Jason Crawford, Keith Houck, Yinglong Xia, Wan-Yi Sabrina Lin, Richard B. Hull, Fenno F. Terry Heath III, Piyawadee Sukaviriya, SweeFen Goh:
IBM system G Social Media Solution: Analyze multimedia content, people, and network dynamics in context. ICME Workshops 2015: 1-4 - [c33]Chun-Fu (Richard) Chen, Gwo Giun Chris Lee, Yinglong Xia, W. Sabrina Lin, Toyotaro Suzumura, Ching-Yung Lin:
Efficient Multi-training Framework of Image Deep Learning on GPU Cluster. ISM 2015: 489-494 - [c32]Yi-Chi Shao, Meng-Hsi Chen, Shih-Chun Lin, W. Sabrina Lin:
On two-way relay channel with an active malicious relay. WCSP 2015: 1-6 - 2014
- [c31]Joseph G. Ellis, W. Sabrina Lin, Ching-Yung Lin, Shih-Fu Chang:
Predicting Evoked Emotions in Video. ISM 2014: 287-294 - 2013
- [j16]Yu-Han Yang, Beibei Wang, W. Sabrina Lin, K. J. Ray Liu:
Near-Optimal Waveform Design for Sum Rate Optimization in Time-Reversal Multiuser Downlink Systems. IEEE Trans. Wirel. Commun. 12(1): 346-357 (2013) - 2012
- [j15]Matthew C. Stamm, W. Sabrina Lin, K. J. Ray Liu:
Temporal Forensics and Anti-Forensics for Motion Compensated Video. IEEE Trans. Inf. Forensics Secur. 7(4): 1315-1329 (2012) - [j14]Liang Xiao, Yan Chen, W. Sabrina Lin, K. J. Ray Liu:
Indirect Reciprocity Security Game for Large-Scale Wireless Networks. IEEE Trans. Inf. Forensics Secur. 7(4): 1368-1380 (2012) - [j13]W. Sabrina Lin, K. J. Ray Liu:
Game-Theoretic Pricing for Video Streaming in Mobile Networks. IEEE Trans. Image Process. 21(5): 2667-2680 (2012) - [j12]H. Vicky Zhao, W. Sabrina Lin, K. J. Ray Liu:
Cooperation and Coalition in Multimedia Fingerprinting Colluder Social Networks. IEEE Trans. Multim. 14(3-2): 717-733 (2012) - [c30]W. Sabrina Lin, Yang Gao, K. J. Ray Liu:
Template matching for image prediction: A game-theoretical approach. ICASSP 2012: 821-824 - [c29]Matthew C. Stamm, W. Sabrina Lin, K. J. Ray Liu:
Forensics vs. anti-forensics: A decision and game theoretic framework. ICASSP 2012: 1749-1752 - [c28]Xiaoyu Chu, Matthew C. Stamm, W. Sabrina Lin, K. J. Ray Liu:
Forensic identification of compressively sensed images. ICASSP 2012: 1837-1840 - [c27]Liang Xiao, W. Sabrina Lin, Yan Chen, Kuo J. Ray Liu:
Indirect reciprocity game modelling for secure wireless networks. ICC 2012: 928-933 - [c26]Yan Chen, W. Sabrina Lin, Feng Han, Yu-Han Yang, Zoltan Safar, K. J. Ray Liu:
A cheat-proof game theoretic demand response scheme for smart grids. ICC 2012: 3362-3366 - [c25]Feng Han, Zoltan Safar, W. Sabrina Lin, Yan Chen, K. J. Ray Liu:
Energy-efficient cellular network operation via base station cooperation. ICC 2012: 4374-4378 - 2011
- [j11]Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Charles Clancy:
Extrinsic Channel-Like Fingerprinting Overlays Using Subspace Embedding. IEEE Trans. Inf. Forensics Secur. 6(4): 1355-1369 (2011) - [j10]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks. IEEE Trans. Multim. 13(2): 191-205 (2011) - [j9]Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Charles Clancy:
Best-Effort Cooperative Relaying. IEEE Trans. Wirel. Commun. 10(6): 1833-1843 (2011) - [j8]Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Charles Clancy:
Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems. IEEE Trans. Wirel. Commun. 10(12): 4270-4281 (2011) - [c24]Wan-Yi Sabrina Lin, K. J. Ray Liu:
Pricing game and evolution dynamics for mobile video streaming. ICASSP 2011: 2348-2351 - 2010
- [j7]Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, K. J. Ray Liu:
Cooperative Peer-to-Peer Streaming: An Evolutionary Game-Theoretic Approach. IEEE Trans. Circuits Syst. Video Technol. 20(10): 1346-1357 (2010) - [j6]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks. IEEE Trans. Image Process. 19(7): 1768-1784 (2010) - [j5]Yan Chen, W. Sabrina Lin, K. J. Ray Liu:
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game. IEEE Trans. Image Process. 19(7): 1798-1807 (2010) - [c23]Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Charles Clancy:
Authenticating MIMO Transmissions Using Channel-Like Fingerprinting. GLOBECOM 2010: 1-6 - [c22]W. Sabrina Lin, K. J. Ray Liu:
Optimal Pricing for Mobile Video Streaming Using Behavior Analysis. GLOBECOM 2010: 1-4 - [c21]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Attack-Resistant Collaboration in Wireless Video Streaming Social Networks. GLOBECOM 2010: 1-4 - [c20]Steven K. Tjoa, Matthew C. Stamm, W. Sabrina Lin, K. J. Ray Liu:
Harmonic variable-size dictionary learning for music source separation. ICASSP 2010: 413-416 - [c19]Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, K. J. Ray Liu:
Anti-forensics of JPEG compression. ICASSP 2010: 1694-1697 - [c18]Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, K. J. Ray Liu:
Undetectable image tampering through JPEG compression anti-forensics. ICIP 2010: 2109-2112 - [c17]Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, K. J. Ray Liu:
Evolutionary games for cooperative P2P video streaming. ICIP 2010: 4453-4456
2000 – 2009
- 2009
- [j4]H. Vicky Zhao, W. Sabrina Lin, K. J. Ray Liu:
Behavior modeling and forensics for multimedia social networks. IEEE Signal Process. Mag. 26(1): 118-139 (2009) - [j3]W. Sabrina Lin, Steven K. Tjoa, H. Vicky Zhao, K. J. Ray Liu:
Digital image source coder forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Secur. 4(3): 460-475 (2009) - [j2]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Behavior forensics with side information for multimedia fingerprinting social networks. IEEE Trans. Inf. Forensics Secur. 4(4): 911-927 (2009) - [j1]Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks. IEEE Trans. Multim. 11(3): 396-412 (2009) - [c16]Yan Chen, W. Sabrina Lin, K. J. Ray Liu:
Risk-distortion analysis for video collusion attack. ICASSP 2009: 1441-1444 - [c15]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Time-sensitive behavior dynamics in multimedia fingerprinting social networks. ICASSP 2009: 1465-1468 - [c14]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Cheat-proof cooperation strategies for wireless live streaming social networks. ICASSP 2009: 3469-3472 - [c13]W. Sabrina Lin, Shan He, Jeffrey Bloom:
Binary forensic code for multimedia signals: resisting minority collusion attacks. Media Forensics and Security 2009: 725411 - [c12]W. Sabrina Lin, Shan He, Jeffrey Bloom:
Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia. MM&Sec 2009: 93-98 - 2008
- [c11]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Attack-resistant cooperation strategies in P2P live streaming social networks. ACSCC 2008: 1373-1377 - [c10]W. Sabrina Lin, K. J. Ray Liu:
Modulation forensics for wireless digital communications. ICASSP 2008: 1789-1792 - [c9]W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
A game theoretic framework for incentive-based peer-to-peer live-streaming social networks. ICASSP 2008: 2141-2144 - [c8]H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu:
Game-theoretic analysis of maximum-payoff multiuser collusion. ICIP 2008: 1276-1279 - [c7]Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Fairness dynamics in multimedia colluders' social networks. ICIP 2008: 3132-3135 - 2007
- [c6]Steven K. Tjoa, Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Block Size Forensic Analysis in Digital Images. ICASSP (1) 2007: 633-636 - [c5]Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
A Game Theoretic Framework for Colluder-Detector Behavior Forensics. ICASSP (2) 2007: 721-724 - [c4]Steven K. Tjoa, Wan-Yi Sabrina Lin, K. J. Ray Liu:
Transform Coder Classification for Digital Image Forensics. ICIP (6) 2007: 105-108 - [c3]Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics. ICIP (6) 2007: 109-112 - [c2]Wan-Yi Sabrina Lin, Steven K. Tjoa, H. Vicky Zhao, K. J. Ray Liu:
Image Source Coding Forensics via Intrinsic Fingerprints. ICME 2007: 1127-1130 - 2006
- [c1]Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu:
Scalable Multimedia Fingerprinting Forensics with Side Information. ICIP 2006: 2293-2296
Coauthor Index
aka: Kuo J. Ray Liu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-06 22:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint