关注
Wow Sun
Wow Sun
Teacher
在 fawesil.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Neuro-fuzzy and soft computing-a computational approach to learning and machine intelligence [Book Review]
JSR Jang, CT Sun, E Mizutani
IEEE Transactions on automatic control 42 (10), 1482-1484, 1997
132431997
Motivation in education: Theory, research, and applications
PR Pintrich, DH Schunk
(No Title), 2002
12689*2002
Neuro-fuzzy modeling and control
JSR Jang, CT Sun
Proceedings of the IEEE 83 (3), 378-406, 1995
34241995
Functional equivalence between radial basis function networks and fuzzy inference systems
JSR Jang, CT Sun
IEEE transactions on Neural Networks 4 (1), 156-159, 1993
13441993
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
8652010
Genome-wide association study identifies susceptibility loci for polycystic ovary syndrome on chromosome 2p16. 3, 2p21 and 9q33. 3
ZJ Chen, H Zhao, L He, Y Shi, Y Qin, Y Shi, Z Li, L You, J Zhao, J Liu, ...
Nature genetics 43 (1), 55-59, 2011
8192011
5-methylcytosine promotes mRNA export—NSUN2 as the methyltransferase and ALYREF as an m5C reader
X Yang, Y Yang, BF Sun, YS Chen, JW Xu, WY Lai, A Li, X Wang, ...
Cell research 27 (5), 606-625, 2017
7852017
11 Survey of Image Steganography and Steganalysis
M Bachrach, FY Shih
Multimedia Security: Watermarking, Steganography, and Forensics, 201, 2012
7172012
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014
6512014
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
5422006
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
4962003
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
4912000
Game reward systems: Gaming experiences and social meanings
H Wang, CT Sun
Proceedings of DiGRA 2011 Conference: Think Design Play, 2011
3962011
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3772005
Automatic steganographic distortion learning using a generative adversarial network
W Tang, S Tan, B Li, J Huang
IEEE Signal Processing Letters 24 (10), 1547-1551, 2017
3722017
Digital image splicing detection based on Markov features in DCT and DWT domain
Z He, W Lu, W Sun, J Huang
Pattern recognition 45 (12), 4292-4299, 2012
3702012
Forty years of IVF
C Niederberger, A Pellicer, J Cohen, DK Gardner, GD Palermo, ...
Fertility and sterility 110 (2), 185-324. e5, 2018
3302018
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3302010
Rule-base structure identification in an adaptive-network-based fuzzy inference system
CT Sun
IEEE Transactions on Fuzzy Systems 2 (1), 64-73, 1994
3241994
Identification of deep network generated images using disparities in color components
H Li, B Li, S Tan, J Huang
Signal Processing 174, 107616, 2020
2822020
系统目前无法执行此操作,请稍后再试。
文章 1–20