Hyperdimensional Perception and Frontier Security Intelligence Laboratory
Hyperdimensional Perception and Frontier Security Intelligence Laboratory
News
People
Current Member
Alumni
Research
Publications
Datasets
Teaching
Contact
article-journal
SPA-Net: A Deep Learning Approach Enhanced Using a Span-Partial Structure and Attention Mechanism for Image Copy-Move Forgery Detection
With the wide application of visual sensors and development of digital image processing technology, image copy-move forgery detection …
Kaiqi Zhao
,
Xiaochen Yuan
,
Zhiyao Xie
,
Yan Xiang
,
Guoheng Huang
,
Li Feng
Cite
DOI
URL
Reversible multi-watermarking for color images with grayscale invariance
As a special way of hiding information, reversible data hiding is mostly used to embed data into digital multimedia. The original …
Sun Ying
,
Xiaochen Yuan
,
Xingrun Wang
,
Jianqing Li
Cite
DOI
URL
Collaborative multi-feature extraction and scale-aware semantic information mining for medical image segmentation
Objective. In recent years, methods based on U-shaped structure and skip connection have achieved remarkable results in many medical …
Ruijun Zhang
,
Zixuan He
,
Jian Zhu
,
Xiaochen Yuan
,
Guoheng Huang
,
Chi-Man Pun
,
Jianhong Peng
,
Junzhong Lin
,
Jian Zhou
Cite
DOI
URL
Blind Dual Watermarking Scheme Using Stucki Kernel and SPIHT for Image Self-Recovery
In this paper we propose a blind dual watermarking scheme using Set Partitioning in Hierarchical Trees (SPIHT) and Stucki Kernel …
Qiyuan Zhang
,
Xiaochen Yuan
,
Tong Liu
Cite
Project
DOI
CD-SDN: Unsupervised Sensitivity Disparity Networks for Hyper-Spectral Image Change Detection
Deep neural networks (DNNs) could be affected by the regression level of learning frameworks and challenging changes caused by external …
Jinlong Li
,
Xiaochen Yuan
,
Jinfeng Li
,
Guoheng Huang
,
Ping Li
,
Li Feng
PDF
Cite
DOI
Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems
In Industrial Internet of Things (IIoT) systems, the intelligent devices are vulnerable to be attacked by weak Electromagnetic …
Kai Fang
,
Tingting Wang
,
Xiaochen Yuan
,
Chunyu Miao
,
Yuanyuan Pan
,
Jianqing Li
Cite
DOI
URL
Parallel Multiple Watermarking Using Adaptive Inter-Block Correlation
People pay more and more attention to copyright protection and digital watermarking technology is a reliable method for copyright …
Xingrun Wang
,
Xiaochen Yuan
,
Mianjie Li
,
Sun Ying
,
Jinyu Tian
,
Hongfei Guo
,
Jianqing Li
Cite
DOI
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme
Deep Neural Networks (DNNs) have developed rapidly in data privacy protection applications such as medical treatment and finance. …
Mianjie Li
,
Zhihong Tian
,
Xiaojiang Du
,
Xiaochen Yuan
,
Chun Shan
,
Mohsen Guizani
Cite
DOI
URL
Reinforcement Learning-Based Optimization for Mobile Edge Computing Scheduling Game
Task scheduling on edge computing servers is a critical concern affecting user experience. Current scheduling methods attain an overall …
Tingting Wang
,
Bingxian Lu
,
Wei Wang
,
Wei Wei
,
Xiaochen Yuan
,
Jianqing Li
Cite
DOI
RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain
Group-buying is an intriguing e-commerce model that aims to recruit more participants to generate sufficient orders to establish a …
Yungui Chen
,
Li Feng
,
Hong Liang
,
Shumin Yao
,
Liwei Tian
,
Xiaochen Yuan
PDF
Cite
DOI
«
»
Cite
×