default search action
Bin Ma 0003
Person information
- affiliation: Qilu University of Technology, School of Cyber Security, Jinan, China
- affiliation (2013 - 2015): New Jersey Institute of Technology at Newark, NJ, USA
- affiliation (2008 - 2013): Shandong University of Political Science and Law, School of Information Science, Jinan, China
- affiliation (PhD 2008): Shandong University, Jinan, China
Other persons with the same name
- Bin Ma — disambiguation page
- Bin Ma 0001 — Alibaba Group, Speech Lab, Singapore (and 3 more)
- Bin Ma 0002 — University of Waterloo, School of Computer Science, ON, Canada (and 2 more)
- Bin Ma 0004 — Beihang University, School of Computer Science and Engineering, State Key Laboratory of Virtual Reality Technology and Systems, Beijing, China
- Bin Ma 0005 — Chongqing University of Posts and Telecommunications, Key Laboratory of Computer Network and Communications Technology, China (and 1 more)
- Bin Ma 0006 — Singapore Institute of Manufacturing Technology, Singapore
- Bin Ma 0007 — Shenyang Jianzhu University, Faculty of Information and Control Engineering, China
- Bin Ma 0008 — Beihang University, School of Transportation Science and Engineering, Beijing, China
- Bin Ma 0009 — Central South University of Forestry & Technology, College of Computer Science, Changsha, China
- Bin Ma 0010 — HiSilicon Technologies Company Ltd., Shanghai, China (and 1 more)
- Bin Ma 0011 — Soochow University, School of Computer Science and Technology, Suzhou City, China (and 1 more)
- Bin Ma 0012 — Chinese Academy and Sciences, Institute of Automation, Beijing, China
- Bin Ma 0013 — University of Manitoba, Department of Mechanical and Industrial Engineering, Winnipeg, Canada
- Bin Ma 0014 — Beijing University of Aeronautics and Astronautics, Robotics Institute, Beijing, China
- Bin Ma 0015 — University of Maryland, Department of Geography, College Park, MD, USA
- Bin Ma 0016 — Xidian University, Xi'an, School of Life Sciences and Technology, China
- Bin Ma 0017 — ABB Corporate Research Center, Västerås, Sweden
- Bin Ma 0018 — Xi'an University of Technology, State Key Laboratory Base of Eco-hydraulic Engineering in Arid Area, China
- Bin Ma 0019 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Bin Ma 0020 — Chongqing Industrial and Commercial University, Mechanical Engineering College, China
- Bin Ma 0021 — China Ship Development and Design Center, Wuhan, China
- Bin Ma 0022 — Chinese Academy of Sciences, National Astronomical Observatories, Beijing, China
- Bin Ma 0023 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, China
- Bin Ma 0024 — CuraCloud, Seattle, WA, USA
- Bin Ma 0025 — University of Southern California, Department of Electrical and Computer Engineering, Los Angeles, CA, USA
- Bin Ma 0026 — State Grid Henan Electric Power Company Research Institute, China
- Bin Ma 0027 — Tianjin University, School of Architecture, China (and 1 more)
- Bin Ma 0028 — Meituan Inc., Beijing, China
- Bin Ma 0029 — Beijing MedPeer Information Technology Co. Ltd., China
- Bin Ma 0030 — Shanghai University, School of Mechatronic Engineering and Automation, China
- Bin Ma 0031 — Dalian Jiaotong University, School of Computer and Communication Engineering, China
- Bin Ma 0032 — Xi'an Jiaotong University, Institute of Artificial Intelligence and Robotics, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Chunpeng Wang, Xinying Li, Zhiqiu Xia, Qi Li, Hao Zhang, Jian Li, Bing Han, Bin Ma:
HIWANet: A high imperceptibility watermarking attack network. Eng. Appl. Artif. Intell. 133: 108039 (2024) - [j64]Maoyuan Wang, Jinwei Wang, Bin Ma, Xiangyang Luo:
Improving the transferability of adversarial examples through black-box feature attacks. Neurocomputing 595: 127863 (2024) - [j63]Jiawei Zhang, Jinwei Wang, Hao Wang, Xiangyang Luo, Bin Ma:
Trustworthy adaptive adversarial perturbations in social networks. J. Inf. Secur. Appl. 80: 103675 (2024) - [j62]Jinwei Wang, Wanyun Huang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Adversarial watermark: A robust and reliable watermark against removal. J. Inf. Secur. Appl. 82: 103750 (2024) - [j61]Xiaoyu Wang, Xingyuan Wang, Bin Ma, Qi Li, Chunpeng Wang, Yongjin Xian, Bing Han:
Reversible data hiding algorithm based on adaptive prediction and code division multiplexing. Multim. Tools Appl. 83(2): 3725-3743 (2024) - [j60]Bin Ma, Kun Li, Jian Xu, Chunpeng Wang, Xiaolong Li:
A High-Performance Image Steganography Scheme Based on Dual-Adversarial Networks. IEEE Signal Process. Lett. 31: 2655-2659 (2024) - [j59]Chunpeng Wang, Chaoyi Shi, Simiao Wang, Zhiqiu Xia, Bin Ma:
Dual-Task Mutual Learning With QPHFM Watermarking for Deepfake Detection. IEEE Signal Process. Lett. 31: 2740-2744 (2024) - [j58]Qi Li, Bin Ma, Xiaoyu Wang, Chunpeng Wang, Suo Gao:
Image Steganography in Color Conversion. IEEE Trans. Circuits Syst. II Express Briefs 71(1): 106-110 (2024) - [j57]Xin Cheng, Jinwei Wang, Hao Wang, Xiangyang Luo, Bin Ma:
Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge. IEEE Trans. Circuits Syst. Video Technol. 34(1): 632-646 (2024) - [j56]Bin Ma, Zhongquan Tao, Ruihe Ma, Chunpeng Wang, Jian Li, Xiaolong Li:
A High-Performance Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2763-2774 (2024) - [j55]Hao Wang, Jinwei Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma, Bin Li, Jinsheng Sun:
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference. IEEE Trans. Circuits Syst. Video Technol. 34(6): 5191-5206 (2024) - [c35]Bin Ma, Hongtao Duan, Ruihe Ma, Chunpeng Wang, Xiaolong Li:
A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data Hiding. ICIC (9) 2024: 375-385 - [c34]Jian Li, Tao Zuo, Bin Ma, Chunpeng Wang, Peng Zhang, Huanhuan Zhao, Zhengzhong Zhao:
Robust Video Watermarking Network Based on Channel Spatial Attention. IJCNN 2024: 1-8 - [e1]Bin Ma, Jian Li, Qi Li:
Digital Forensics and Watermarking - 22nd International Workshop, IWDW 2023, Jinan, China, November 25-26, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14511, Springer 2024, ISBN 978-981-97-2584-7 [contents] - 2023
- [j54]Zhiqiu Xia, Chunpeng Wang, Bin Ma, Qi Li, Hao Zhang, Mingxu Wang, Xingyuan Wang:
Geometric attacks resistant double zero-watermarking using discrete Fourier transform and fractional-order Exponent-Fourier moments. Digit. Signal Process. 140: 104097 (2023) - [j53]Bin Ma, Kun Li, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang:
Enhancing the security of image steganography via multiple adversarial networks and channel attention modules. Digit. Signal Process. 141: 104121 (2023) - [j52]Bin Ma, Songkun Wang, Jian Xu, Chunpeng Wang, Jian Li, Xiaolong Li:
A multi-level sorting prediction enhancement-based two-dimensional reversible data hiding algorithm for JPEG images. Digit. Signal Process. 141: 104145 (2023) - [j51]Chunpeng Wang, Qinghua Zhang, Zhiqiu Xia, Linna Zhou, Ziqi Wei, Hao Zhang, Bin Ma:
Multi-dimensional hypercomplex continuous orthogonal moments for light-field images. Expert Syst. Appl. 217: 119553 (2023) - [j50]Jian Li, Xiaobo Zhang, Bin Ma, Chuan Qin, Chunpeng Wang:
Reversible PRNU anonymity for device privacy protection based on data hiding. Expert Syst. Appl. 234: 121017 (2023) - [j49]Jian Li, Xiaobo Zhang, Bin Ma, Meihong Yang, Chunpeng Wang, Yang Liu, Xinan Cui, Xiaotong Yang:
PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication Systems. Int. J. Semantic Web Inf. Syst. 19(1): 1-19 (2023) - [j48]Bin Ma, Kaixin Du, Jian Xu, Chunpeng Wang, Jian Li, Linna Zhou:
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition. J. Inf. Secur. Appl. 78: 103605 (2023) - [j47]Zhiqiu Xia, Chunpeng Wang, Yongwei Li, Baosheng Yu, Yibing Zhan, Qi Li, Xingyuan Wang, Bin Ma:
Geometrical attacks resilient statistical watermark decoder using polar harmonic Fourier moments. J. Frankl. Inst. 360(7): 4493-4518 (2023) - [j46]Chunpeng Wang, Fanran Sun, Zhiqiu Xia, Qi Li, Jian Li, Bing Han, Bin Ma:
Wavelet-FCWAN: Fast and Covert Watermarking Attack Network in Wavelet Domain. J. Vis. Commun. Image Represent. 95: 103875 (2023) - [j45]Xiaoyu Wang, Xingyuan Wang, Bin Ma, Qi Li, Chunpeng Wang, Yunqing Shi:
High-performance reversible data hiding based on ridge regression prediction algorithm. Signal Process. 204: 108818 (2023) - [j44]Wenfa Qi, Tong Zhang, Xiaolong Li, Bin Ma, Zongming Guo:
Reversible data hiding based on prediction-error value ordering and multiple-embedding. Signal Process. 207: 108956 (2023) - [j43]Qinghua Zhang, Chunpeng Wang, Bin Ma, Zhiqiu Xia, Jian Li, Hao Zhang, Qi Li:
Sedenion polar harmonic Fourier moments and their application in multi-view color image watermarking. Signal Process. 209: 109010 (2023) - [j42]Mengyao Xiao, Xiaolong Li, Yao Zhao, Bin Ma, Guodong Guo:
A Novel Reversible Data Hiding Scheme Based on Pixel-Residual Histogram. ACM Trans. Multim. Comput. Commun. Appl. 19(1s): 46:1-46:19 (2023) - [c33]Hao Wu, Jinwei Wang, Jiawei Zhang, Yufeng Wu, Bin Ma, Xiangyang Luo:
Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum. IJCNN 2023: 1-8 - [c32]Jian Li, Huanhuan Zhao, Bin Ma, Chunpeng Wang, Xiaoming Wu, Tao Zuo, Zhengzhong Zhao:
High-Quality PRNU Anonymous Algorithm for JPEG Images. IWDW 2023: 18-32 - [c31]Bin Ma, Haocheng Wang, Yongjin Xian, Chunpeng Wang, Guanxu Zhao:
Cross-channel Image Steganography Based on Generative Adversarial Network. IWDW 2023: 194-206 - [c30]Chunpeng Wang, Pengfei Tian, Ziqi Wei, Qi Li, Zhiqiu Xia, Bin Ma:
CAWNet: A Channel Attention Watermarking Attack Network Based on CWABlock. PRCV (9) 2023: 41-52 - [c29]Jinwei Wang, Maoyuan Wang, Hao Wu, Bin Ma, Xiangyang Luo:
Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum. PRCV (9) 2023: 421-432 - [c28]Bin Ma, Kun Li, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang:
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks. SciSec 2023: 181-192 - [c27]Bin Ma, Zhongquan Tao, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang:
A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments. SciSec 2023: 386-397 - [c26]Bin Ma, Songkun Wang, Jian Xu, Chunpeng Wang, Jian Li, Xiaolong Li:
A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG Images. SciSec 2023: 481-495 - [c25]Chunpeng Wang, Xinying Li, Zhiqiu Xia, Qi Li, Ziqi Wei, Bin Ma:
FPA-WAN: Feature Pyramid Attention Based Watermarking Attack Network. SMC 2023: 2271-2276 - [i1]Jinwei Wang, Hao Wu, Haihua Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples. CoRR abs/2303.04502 (2023) - 2022
- [j41]Zhiqiu Xia, Xingyuan Wang, Chunpeng Wang, Changxu Wang, Bin Ma, Qi Li, Mingxu Wang, Tingting Zhao:
A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl. Intell. 52(1): 607-621 (2022) - [j40]Chunpeng Wang, Qinghua Zhang, Bin Ma, Zhiqiu Xia, Jian Li, Ting Luo, Qi Li:
Light-field image watermarking based on geranion polar harmonic Fourier moments. Eng. Appl. Artif. Intell. 113: 104970 (2022) - [j39]Bin Ma, Yongkang Fu, Chunpeng Wang, Jian Li, Yuli Wang:
A high-performance insulators location scheme based on YOLOv4 deep learning network with GDIoU loss function. IET Image Process. 16(4): 1124-1134 (2022) - [j38]Junfeng Wu, Jinwei Wang, Junjie Zhao, Xiangyang Luo, Bin Ma:
ESGAN for generating high quality enhanced samples. Multim. Syst. 28(5): 1809-1822 (2022) - [j37]Jinwei Wang, Kehui Zeng, Bin Ma, Xiangyang Luo, Qilin Yin, Guangjie Liu, Sunil Kr. Jha:
GAN-generated fake face detection via two-stream CNN with PRNU in the wild. Multim. Tools Appl. 81(29): 42527-42545 (2022) - [j36]Shi-Mei Ma, Xiaolong Li, Mengyao Xiao, Bin Ma, Yao Zhao:
Fast Expansion-Bins-Determination for Multiple Histograms Modification Based Reversible Data Hiding. IEEE Signal Process. Lett. 29: 662-666 (2022) - [j35]Chunpeng Wang, Bin Ma, Zhiqiu Xia, Jian Li, Qi Li, Yun-Qing Shi:
Stereoscopic Image Description With Trinion Fractional-Order Continuous Orthogonal Moments. IEEE Trans. Circuits Syst. Video Technol. 32(4): 1998-2012 (2022) - [j34]Hao Wang, Jinwei Wang, Xiangyang Luo, Yuhui Zheng, Bin Ma, Jinsheng Sun, Sunil Kr. Jha:
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4065-4080 (2022) - [j33]Qi Li, Xingyuan Wang, Bin Ma, Xiaoyu Wang, Chunpeng Wang, Suo Gao, Yun-Qing Shi:
Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5695-5706 (2022) - [j32]Chunpeng Wang, Qixian Hao, Shujiang Xu, Bin Ma, Zhiqiu Xia, Qi Li, Jian Li, Yun-Qing Shi:
RD-IWAN: Residual Dense Based Imperceptible Watermark Attack Network. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7460-7472 (2022) - [c24]Yongjin Xian, Xingyuan Wang, Xiaoyu Wang, Qi Li, Bin Ma:
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication. ICAIS (3) 2022: 309-322 - [c23]Bin Ma, Dongqi Li, Chunpeng Wang, Jian Li, Gang Li, Xinan Cui:
A Cyberspace Security Knowledge System Based on Knowledge Graph. ICAIS (3) 2022: 349-362 - [c22]Hao Wu, Jinwei Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method. IWDW 2022: 83-97 - 2021
- [j31]Chunpeng Wang, Qixian Hao, Bin Ma, Jian Li, Hongling Gao:
Fractional-order quaternion exponential moments for color images. Appl. Math. Comput. 400: 126061 (2021) - [j30]Chunpeng Wang, Qixian Hao, Bin Ma, Jian Li, Hongling Gao:
Corrigendum to "Fractional-order quaternion exponential moments for color images" [Applied Mathematics and Computation 400 (2021) 126061]. Appl. Math. Comput. 402: 126196 (2021) - [j29]Chunpeng Wang, Hongling Gao, Bin Ma, Meihong Yang, Jian Li, Zhiqiu Xia, Qixian Hao:
Color image analysis with novel trinion decimal-order polar harmonic transforms. Appl. Math. Comput. 410: 126453 (2021) - [j28]Qi Li, Xingyuan Wang, Bin Ma, Xiaoyu Wang, Chunpeng Wang, Zhiqiu Xia, Yunqing Shi:
Image steganography based on style transfer and quaternion exponent moments. Appl. Soft Comput. 110: 107618 (2021) - [j27]Bin Ma, Yuanyuan Hu, Jian Li, Chunpeng Wang, Meihong Yang, Yang Zheng:
PRNU Extraction from Stabilized Video: a Patch Maybe Better than a Bunch. Comput. Syst. Sci. Eng. 36(1): 189-200 (2021) - [j26]Zhiqiu Xia, Xingyuan Wang, Chunpeng Wang, Bin Ma, Hao Zhang, Qi Li:
Novel quaternion polar complex exponential transform and its application in color image zero-watermarking. Digit. Signal Process. 116: 103130 (2021) - [j25]Chunpeng Wang, Qixian Hao, Bin Ma, Xiaoming Wu, Jian Li, Zhiqiu Xia, Hongling Gao:
Octonion continuous orthogonal moments and their applications in color stereoscopic image reconstruction and zero-watermarking. Eng. Appl. Artif. Intell. 106: 104450 (2021) - [j24]Qi Li, Xingyuan Wang, Xiaoyu Wang, Bin Ma, Chunpeng Wang, Yun-Qing Shi:
An encrypted coverless information hiding method based on generative models. Inf. Sci. 553: 19-30 (2021) - [j23]Bin Ma, Lili Chang, Chunpeng Wang, Jian Li, Gang Li, Zhiqiu Xia, Xingyuan Wang:
Double Medical Images Zero-Watermarking Algorithm Based on the Chaotic System and Ternary Accurate Polar Complex Exponential Transform. J. Math. Imaging Vis. 63(9): 1160-1178 (2021) - [j22]Zhiqiu Xia, Xingyuan Wang, Chunpeng Wang, Bin Ma, Mingxu Wang, Yun Qing Shi:
Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images. Knowl. Based Syst. 216: 106568 (2021) - [j21]Bin Ma, Jin-Cheng Hou, Chun-Peng Wang, Xiao-Ming Wu, Yun-Qing Shi:
A reversible data hiding algorithm for audio files based on code division multiplexing. Multim. Tools Appl. 80(12): 17569-17581 (2021) - [j20]Chunpeng Wang, Simiao Wang, Zhiqiu Xia, Qi Li, Bin Ma, Jian Li, Meihong Yang, Yun-Qing Shi:
Medical image super-resolution via deep residual neural network in the shearlet domain. Multim. Tools Appl. 80(17): 26637-26655 (2021) - [j19]Zelin Zhang, Jian Xu, Bin Ma, Chunpeng Wang, Jian Li, Yuli Wang:
Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding. Secur. Commun. Networks 2021: 5511806:1-5511806:11 (2021) - [j18]Chunpeng Wang, Hongling Gao, Meihong Yang, Jian Li, Bin Ma, Qixian Hao:
Invariant Image Representation Using Novel Fractional-Order Polar Harmonic Fourier Moments. Sensors 21(4): 1544 (2021) - [j17]Xiaoyu Wang, Xingyuan Wang, Bin Ma, Qi Li, Yun Q. Shi:
High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding. IEEE Signal Process. Lett. 28: 1125-1129 (2021) - [j16]Mengyao Xiao, Xiaolong Li, Bin Ma, Xinpeng Zhang, Yao Zhao:
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2535-2546 (2021) - [c21]Hongjiao Guan, Bin Ma, Yingtao Zhang, Xianglong Tang:
ExNN-SMOTE: Extended Natural Neighbors Based SMOTE to Deal with Imbalanced Data. ACML 2021: 902-917 - [c20]Mohan Vamsi Kasukurthi, Dominika Houserova, Yulong Huang, Shengyu Li, Dongqi Li, Jingwei Lin, Guanhuan Yang, Shaobo Tan, David Bourrie, Bin Ma, Glen M. Borchert, Jingshan Huang:
SURFR: A Real-Time Platform for Non-Coding RNA Fragmentation Analysis Using Wavelets. BIBM 2021: 2720-2727 - [c19]Shengyu Li, Yulong Huang, Mohan Vamsi Kasukurthi, Jiajie Yang, Dongqi Li, Guanhuan Yang, Jingwei Lin, Shaobo Tan, David Bourrie, Bin Ma, Glen M. Borchert, Jingshan Huang:
A New Classification Algorithm and a New Oversampling Method of Mapping Common Data Elements to the BRIDG Model. BIBM 2021: 2788-2795 - [c18]Hongjiao Guan, Yingtao Zhang, Bin Ma, Jian Li, Chunpeng Wang:
A Generalized Optimization Embedded Framework of Undersampling Ensembles for Imbalanced Classification. DSAA 2021: 1-10 - [c17]Jiawei Zhang, Jinwei Wang, Xiangyang Luo, Bin Ma, Naixue Xiong:
Imperceptible and Reliable Adversarial Attack. FCS 2021: 49-62 - [c16]Bin Ma, Yongkang Fu, Jian Li, Chunpeng Wang, Yuli Wang:
A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images. FCS 2021: 245-256 - [c15]Hao Wang, Jinwei Wang, Xiangyang Luo, Qilin Yin, Bin Ma, Jinsheng Sun:
Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics. IWDW 2021: 72-86 - 2020
- [j15]Qi Li, Xingyuan Wang, Xiaoyu Wang, Bin Ma, Chunpeng Wang, Yongjin Xian, Yun-Qing Shi:
A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks. IEEE Access 8: 168166-168176 (2020) - [j14]Jian Li, Yang Lv, Bin Ma, Meihong Yang, Chunpeng Wang, Yang Zheng:
Video Source Identification Algorithm Based on 3D Geometric Transformation. Comput. Syst. Sci. Eng. 35(6): 513-521 (2020) - [j13]Jian Li, Zelin Zhang, Shengyu Li, Ryan Benton, Yulong Huang, Mohan Vamsi Kasukurthi, Dongqi Li, Jingwei Lin, Glen M. Borchert, Shaobo Tan, Gang Li, Bin Ma, Meihong Yang, Jingshan Huang:
A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology. BMC Medical Informatics Decis. Mak. 20-S(14): 297 (2020) - [j12]Bin Ma, Zhaolong Wu, Shengyu Li, Ryan Benton, Dongqi Li, Yulong Huang, Mohan Vamsi Kasukurthi, Jingwei Lin, Glen M. Borchert, Shaobo Tan, Gang Li, Meihong Yang, Jingshan Huang:
Development of a support vector machine learning and smart phone Internet of Things-based architecture for real-time sleep apnea diagnosis. BMC Medical Informatics Decis. Mak. 20-S(14): 298 (2020) - [j11]Shujiang Xu, Qixian Hao, Bin Ma, Chunpeng Wang, Jian Li:
Accurate Computation of Fractional-Order Exponential Moments. Secur. Commun. Networks 2020: 8822126:1-8822126:16 (2020) - [j10]Bin Ma, Lili Chang, Chunpeng Wang, Jian Li, Xingyuan Wang, Yun-Qing Shi:
Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Process. 172: 107544 (2020) - [j9]Chunpeng Wang, Xingyuan Wang, Zhiqiu Xia, Bin Ma, Yunqing Shi:
Image Description With Polar Harmonic Fourier Moments. IEEE Trans. Circuits Syst. Video Technol. 30(12): 4440-4452 (2020) - [c14]Bin Ma, Qi Li, Xiaoyu Wang, Chunpeng Wang, Yun-Qing Shi:
Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package. ICAIS (2) 2020: 545-556
2010 – 2019
- 2019
- [j8]Bin Ma, Xiao-Yu Wang, Bing Li:
A New Kind of High Capacity and Security Reversible Data Hiding Scheme. Int. J. Digit. Crime Forensics 11(4): 118-129 (2019) - [j7]Bin Ma, Xiaoyu Wang, Qi Li, Bing Li, Jian Li, Chunpeng Wang, Yunqing Shi:
Adaptive error prediction method based on multiple linear regression for reversible data hiding. J. Real Time Image Process. 16(4): 821-834 (2019) - [j6]Bin Ma, Bing Li, Xiaoyu Wang, Chunpeng Wang, Jian Li, Yun-Qing Shi:
A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images. J. Real Time Image Process. 16(4): 857-869 (2019) - [j5]Bin Ma, Chunxiao Li, Zhaolong Wu, Yulong Huang, Ada Chaeli van der Zijp-Tan, Shaobo Tan, Dongqi Li, Ada Fong, Chandan Basetty, Glen M. Borchert, Ryan Benton, Bin Wu, Jingshan Huang:
Muscle fatigue detection and treatment system driven by internet of things. BMC Medical Informatics Decis. Mak. 19-S(7): 275 (2019) - [j4]Bin Ma, Bing Li, Xiao-Yu Wang, Chunpeng Wang, Jian Li, Yun-Qing Shi:
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image. Secur. Commun. Networks 2019: 4732632:1-4732632:9 (2019) - [c13]Mohan Vamsi Kasukurthi, Shengyu Li, Glen M. Borchert, Jingshan Huang, Dihua Zhang, Mika Housevera, Yulong Huang, Shaobo Tan, Bin Ma, Dongqi Li, Ryan Benton, Jingwei Lin:
SURFr: Algorithm for identification and analysis of ncRNA-derived RNAs. BIBM 2019: 1504-1507 - [c12]Jian Li, Shaobo Tan, Bin Ma, Meihong Yang, Jingshan Huang, Zelin Zhang, Shengyu Li, Ryan Benton, Yulong Huang, Mohan Vamsi Kasukurthi, Dongqi Li, Jingwei Lin, Glen M. Borchert:
Reversible Data Hiding Based Key Region Protection Method in Medical Images. BIBM 2019: 1526-1530 - [c11]Bin Ma, Shaobo Tan, Meihong Yang, Jingshan Huang, Zhaolong Wu, Shengyu Li, Ryan Benton, Dongqi Li, Yulong Huang, Mohan Vamsi Kasukurthi, Jingwei Lin, Glen M. Borchert:
A SVM-Based Algorithm to Diagnose Sleep Apnea. BIBM 2019: 1556-1560 - [c10]Guanyi Yang, Ryan Benton, Glen M. Borchert, Bin Ma, Jingshan Huang, Xiuyu Leng, Fangwan Huang, Mohan Vamsi Kasukurthi, Yulong Huang, Dongqi Li, Jingwei Lin, Shaobo Tan, Guiying Lu:
Use CPET data to predict the intervention effect of aerobic exercise on young hypertensive patients. BIBM 2019: 1699-1702 - [c9]Chunpeng Wang, Simiao Wang, Bin Ma, Jian Li, Xiangjun Dong, Zhiqiu Xia:
Transform Domain Based Medical Image Super-resolution via Deep Multi-scale Network. ICASSP 2019: 2387-2391 - 2018
- [j3]Jian Li, Bin Ma, Chunpeng Wang:
Extraction of PRNU noise from partly decoded video. J. Vis. Commun. Image Represent. 57: 183-191 (2018) - [c8]Bin Ma, Chunxiao Li, Zhaolong Wu, Yulong Huang, Ada Chaeli van der Zijp-Tan, Shaobo Tan, Dongqi Li, Ada Fong, Chandan Basetty, Glen M. Borchert, Jingshan Huang:
A PWM-Based Muscle Fatigue Detection and Recovery System. BIBM 2018: 1013-1016 - [c7]Bin Ma, Yecheng Sun:
Research on Real-Time Monitoring of Human Body Temperature Based on Fiber Bragg Grating Sensing Technology. ICCCS (2) 2018: 124-133 - [c6]Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. ICCCS (4) 2018: 135-146 - [c5]Bin Ma, Qi Li:
High Speed Pharmaceutical Packaging Detection System Based on Genetic Algorithm and Memory Optimization. ICCCS (5) 2018: 356-368 - [c4]Bin Ma, Xiaoyu Wang, Bing Li, Yun-Qing Shi:
A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding. IWDW 2018: 195-205 - [c3]Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. SecureComm (2) 2018: 441-452 - 2016
- [j2]Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, Bin Ma:
Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4: 3210-3237 (2016) - [j1]Bin Ma, Yun Q. Shi:
A Reversible Data Hiding Scheme Based on Code Division Multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9): 1914-1927 (2016) - [c2]Bin Ma, Jian Xu, Yun Q. Shi:
A Novel CDMA Based High Performance Reversible Data Hiding Scheme. IH&MMSec 2016: 39-44 - 2014
- [c1]Bin Ma, Yun-Qing Shi:
A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm. IWDW 2014: 420-432
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint