追蹤
Xiaochen Yuan
Xiaochen Yuan
Macao Polytechnic University
在 mpu.edu.mo 的電子郵件地址已通過驗證 - 首頁
標題
引用次數
引用次數
年份
Image forgery detection using adaptive oversegmentation and feature point matching
CM Pun, XC Yuan, XL Bi
IEEE Transactions on Information Forensics and Security 10 (8), 1705-1716, 2015
3262015
Triple-Classification of Respiratory Sounds Using Optimized S-Transform and Deep Residual Networks
H Chen, X Yuan, Z Pei, M Li, J Li
IEEE Access 7, 32845-32852, 2019
1172019
Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection
X Bi, CM Pun, XC Yuan
Information Sciences 345, 226-242, 2016
972016
Quaternion-Based Image Hashing for Adaptive Tampering Localization
CP Yan, CM Pun, XC Yuan
IEEE Transactions on Information Forensics and Security 11 (12), 2664-2677, 2016
812016
Multi-scale noise estimation for image splicing forgery detection
CM Pun, B Liu, XC Yuan
Journal of Visual Communication and Image Representation 38, 195-206, 2016
812016
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection
CP Yan, CM Pun, XC Yuan
Signal Processing 121, 1-16, 2016
782016
Robust segments detector for de-synchronization resilient audio watermarking
CM Pun, XC Yuan
IEEE Transactions on Audio, Speech, and Language Processing 21 (11), 2412-2424, 2013
632013
Digital Image Forgery Detection Using JPEG Features and Local Noise Discrepancies
B Liu, CM Pun, XC Yuan
The Scientific World Journal 2014, 2014
532014
Multi-scale feature extraction and adaptive matching for copy-move forgery detection
XL Bi, CM Pun, XC Yuan
Multimedia Tools and Applications 77, 363-385, 2018
462018
Geometric invariant watermarking by local Zernike moments of binary image patches
XC Yuan, CM Pun, CLP Chen
Signal Processing 93 (7), 2087-2095, 2013
432013
Robust Mel-Frequency Cepstral coefficients feature detection and dual-tree complex wavelet transform for digital audio watermarking
XC Yuan, CM Pun, CLP Chen
Information Sciences 298, 159-179, 2015
422015
Local multi-watermarking method based on robust and adaptive feature extraction
XC Yuan, M Li
Signal Processing 149, 103-117, 2018
382018
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme
M Li, Z Tian, X Du, X Yuan, C Shan, M Guizani
Neurocomputing 518, 165-173, 2023
342023
Feature extraction and local Zernike moments based geometric invariant watermarking
XC Yuan, CM Pun
Multimedia tools and applications 72, 777-799, 2014
332014
Quaternion Discrete Fourier Transform-Based Color Image Watermarking Method Using Quaternion QR Decomposition
M Li, X Yuan, H Chen, J Li
IEEE Access 8, 72308-72315, 2020
282020
Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems
K Fang, T Wang, X Yuan, C Miao, Y Pan, J Li
Future Generation Computer Systems 126, 295-304, 2022
272022
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection
CM Pun, C Yan, XC Yuan
IEEE Transactions on Information Forensics and Security 12 (2), 377-391, 2017
262017
Robust image hashing using progressive feature selection for tampering detection
CM Pun, CP Yan, XC Yuan
Multimedia Tools and Applications 77, 11609-11633, 2018
252018
Quaternion-valued Correlation Learning for Few-Shot Semantic Segmentation
Z Zheng, G Huang, X Yuan, CM Pun, H Liu, WK Ling
IEEE Transactions on Circuits and Systems for Video Technology, 2022
152022
Gauss–Jordan elimination-based image tampering detection and self-recovery
X Yuan, X Li, T Liu
Signal Processing: Image Communication 90, 116038, 2021
152021
系統目前無法執行作業,請稍後再試。
文章 1–20