Neuro-fuzzy and soft computing-a computational approach to learning and machine intelligence [Book Review] JSR Jang, CT Sun, E Mizutani IEEE Transactions on automatic control 42 (10), 1482-1484, 1997 | 13243 | 1997 |
Motivation in education: Theory, research, and applications PR Pintrich, DH Schunk (No Title), 2002 | 12689* | 2002 |
Neuro-fuzzy modeling and control JSR Jang, CT Sun Proceedings of the IEEE 83 (3), 378-406, 1995 | 3424 | 1995 |
Functional equivalence between radial basis function networks and fuzzy inference systems JSR Jang, CT Sun IEEE transactions on Neural Networks 4 (1), 156-159, 1993 | 1344 | 1993 |
Edge adaptive image steganography based on LSB matching revisited W Luo, F Huang, J Huang IEEE Transactions on information forensics and security 5 (2), 201-214, 2010 | 865 | 2010 |
Genome-wide association study identifies susceptibility loci for polycystic ovary syndrome on chromosome 2p16. 3, 2p21 and 9q33. 3 ZJ Chen, H Zhao, L He, Y Shi, Y Qin, Y Shi, Z Li, L You, J Zhao, J Liu, ... Nature genetics 43 (1), 55-59, 2011 | 819 | 2011 |
5-methylcytosine promotes mRNA export—NSUN2 as the methyltransferase and ALYREF as an m5C reader X Yang, Y Yang, BF Sun, YS Chen, JW Xu, WY Lai, A Li, X Wang, ... Cell research 27 (5), 606-625, 2017 | 785 | 2017 |
11 Survey of Image Steganography and Steganalysis M Bachrach, FY Shih Multimedia Security: Watermarking, Steganography, and Forensics, 201, 2012 | 717 | 2012 |
A new cost function for spatial image steganography B Li, M Wang, J Huang, X Li 2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014 | 651 | 2014 |
Robust detection of region-duplication forgery in digital image W Luo, J Huang, G Qiu 18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006 | 542 | 2006 |
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression X Kang, J Huang, YQ Shi, Y Lin IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003 | 496 | 2003 |
Embedding image watermarks in DC components J Huang, YQ Shi, Y Shi IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000 | 491 | 2000 |
Game reward systems: Gaming experiences and social meanings H Wang, CT Sun Proceedings of DiGRA 2011 Conference: Think Design Play, 2011 | 396 | 2011 |
Efficiently self-synchronized audio watermarking for assured audio data transmission S Wu, J Huang, D Huang, YQ Shi IEEE Transactions on Broadcasting 51 (1), 69-76, 2005 | 377 | 2005 |
Automatic steganographic distortion learning using a generative adversarial network W Tang, S Tan, B Li, J Huang IEEE Signal Processing Letters 24 (10), 1547-1551, 2017 | 372 | 2017 |
Digital image splicing detection based on Markov features in DCT and DWT domain Z He, W Lu, W Sun, J Huang Pattern recognition 45 (12), 4292-4299, 2012 | 370 | 2012 |
Forty years of IVF C Niederberger, A Pellicer, J Cohen, DK Gardner, GD Palermo, ... Fertility and sterility 110 (2), 185-324. e5, 2018 | 330 | 2018 |
JPEG error analysis and its applications to digital image forensics W Luo, J Huang, G Qiu IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010 | 330 | 2010 |
Rule-base structure identification in an adaptive-network-based fuzzy inference system CT Sun IEEE Transactions on Fuzzy Systems 2 (1), 64-73, 1994 | 324 | 1994 |
Identification of deep network generated images using disparities in color components H Li, B Li, S Tan, J Huang Signal Processing 174, 107616, 2020 | 282 | 2020 |