关注
Xiaochen Yuan
Xiaochen Yuan
Macao Polytechnic University
在 mpu.edu.mo 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Image forgery detection using adaptive oversegmentation and feature point matching
CM Pun, XC Yuan, XL Bi
IEEE Transactions on Information Forensics and Security 10 (8), 1705-1716, 2015
3362015
Triple-Classification of Respiratory Sounds Using Optimized S-Transform and Deep Residual Networks
H Chen, X Yuan, Z Pei, M Li, J Li
IEEE Access 7, 32845-32852, 2019
1272019
Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection
X Bi, CM Pun, XC Yuan
Information Sciences 345, 226-242, 2016
1022016
Multi-scale noise estimation for image splicing forgery detection
CM Pun, B Liu, XC Yuan
Journal of Visual Communication and Image Representation 38, 195-206, 2016
832016
Quaternion-Based Image Hashing for Adaptive Tampering Localization
CP Yan, CM Pun, XC Yuan
IEEE Transactions on Information Forensics and Security 11 (12), 2664-2677, 2016
822016
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection
CP Yan, CM Pun, XC Yuan
Signal Processing 121, 1-16, 2016
822016
Robust segments detector for de-synchronization resilient audio watermarking
CM Pun, XC Yuan
IEEE Transactions on Audio, Speech, and Language Processing 21 (11), 2412-2424, 2013
652013
Digital image forgery detection using JPEG features and local noise discrepancies
B Liu, CM Pun, XC Yuan
The Scientific World Journal 2014 (1), 230425, 2014
542014
Multi-scale feature extraction and adaptive matching for copy-move forgery detection
XL Bi, CM Pun, XC Yuan
Multimedia Tools and Applications 77, 363-385, 2018
482018
Robust Mel-Frequency Cepstral coefficients feature detection and dual-tree complex wavelet transform for digital audio watermarking
XC Yuan, CM Pun, CLP Chen
Information Sciences 298, 159-179, 2015
432015
Geometric invariant watermarking by local Zernike moments of binary image patches
XC Yuan, CM Pun, CLP Chen
Signal Processing 93 (7), 2087-2095, 2013
432013
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme
M Li, Z Tian, X Du, X Yuan, C Shan, M Guizani
Neurocomputing 518, 165-173, 2023
382023
Local multi-watermarking method based on robust and adaptive feature extraction
XC Yuan, M Li
Signal Processing 149, 103-117, 2018
382018
Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems
K Fang, T Wang, X Yuan, C Miao, Y Pan, J Li
Future Generation Computer Systems 126, 295-304, 2022
372022
Feature extraction and local Zernike moments based geometric invariant watermarking
XC Yuan, CM Pun
Multimedia tools and applications 72, 777-799, 2014
352014
Quaternion Discrete Fourier Transform-Based Color Image Watermarking Method Using Quaternion QR Decomposition
M Li, X Yuan, H Chen, J Li
IEEE Access 8, 72308-72315, 2020
312020
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection
CM Pun, C Yan, XC Yuan
IEEE Transactions on Information Forensics and Security 12 (2), 377-391, 2017
272017
Robust image hashing using progressive feature selection for tampering detection
CM Pun, CP Yan, XC Yuan
Multimedia Tools and Applications 77, 11609-11633, 2018
262018
Quaternion-valued correlation learning for few-shot semantic segmentation
Z Zheng, G Huang, X Yuan, CM Pun, H Liu, WK Ling
IEEE Transactions on Circuits and Systems for Video Technology 33 (5), 2102-2115, 2022
252022
Gauss–Jordan elimination-based image tampering detection and self-recovery
X Yuan, X Li, T Liu
Signal Processing: Image Communication 90, 116038, 2021
162021
系统目前无法执行此操作,请稍后再试。
文章 1–20