A visual model-based perceptual image hash for content authentication X Wang, K Pang, X Zhou, Y Zhou, L Li, J Xue IEEE Transactions on Information Forensics and Security 10 (7), 1336-1349, 2015 | 140 | 2015 |
Time series prediction method based on variant LSTM recurrent neural network J Hu, X Wang, Y Zhang, D Zhang, M Zhang, J Xue Neural Processing Letters 52, 1485-1500, 2020 | 67 | 2020 |
Source camera identification from image texture features B Xu, X Wang, X Zhou, J Xi, S Wang Neurocomputing 207, 131-140, 2016 | 64 | 2016 |
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection L Tian, N Zheng, J Xue, C Li, X Wang Signal Processing: Image Communication 26 (8-9), 427-437, 2011 | 57 | 2011 |
Image forensic signature for content authenticity analysis X Wang, J Xue, Z Zheng, Z Liu, N Li Journal of Visual Communication and Image Representation 23 (5), 782-797, 2012 | 54 | 2012 |
Image alignment based perceptual image hash for content authentication X Wang, X Zhou, Q Zhang, B Xu, J Xue Signal Processing: Image Communication 80, 115642, 2020 | 38 | 2020 |
Hash key-based video encryption scheme for H. 264/AVC X Wang, N Zheng, L Tian Signal Processing: Image Communication 25 (6), 427-437, 2010 | 38 | 2010 |
Multi-step-ahead time series prediction method with stacking LSTM neural network XF Wang, Y Zhang 2020 3rd International Conference on Artificial Intelligence and Big Data …, 2020 | 26 | 2020 |
Coarse-to-fine-grained method for image splicing region detection X Wang, Y Wang, J Lei, B Li, Q Wang, J Xue Pattern Recognition 122, 108347, 2022 | 25 | 2022 |
A statistical feature based approach to distinguish PRCG from photographs X Wang, Y Liu, B Xu, L Li, J Xue Computer Vision and Image Understanding 128, 84-93, 2014 | 25 | 2014 |
An efficient batch images encryption method based on DNA encoding and PWLCM X Wang, B Li, Y Wang, J Lei, J Xue Multimedia Tools and Applications 80 (1), 943-971, 2021 | 21 | 2021 |
FCD-Net: Learning to detect multiple types of homologous deepfake face images R Han, X Wang, N Bai, Q Wang, Z Liu, J Xue IEEE Transactions on Information Forensics and Security 18, 2653-2666, 2023 | 15 | 2023 |
A novel image signature method for content authentication X Wang, N Zheng, J Xue, Z Liu The Computer Journal 55 (6), 686-701, 2012 | 13 | 2012 |
Perceptual hash-based coarse-to-fine grained image tampering forensics method X Wang, Q Zhang, C Jiang, J Xue Journal of Visual Communication and Image Representation 78, 103124, 2021 | 11 | 2021 |
Coarse-to-fine grained image splicing localization method based on noise level inconsistency X Wang, Q Zhang, C Jiang, Y Zhang 2020 International Conference on Computing, Networking and Communications …, 2020 | 9 | 2020 |
Class-imbalanced time series anomaly detection method based on cost-sensitive hybrid network X Wang, Y Zhang, N Bai, Q Yu, Q Wang Expert Systems with Applications 238, 122192, 2024 | 6 | 2024 |
Super-resolution image reconstruction using surface fitting with hierarchical structure X Wang, D Zhou, N Zeng, X Yu, S Hu Journal of Visual Communication and Image Representation 53, 65-75, 2018 | 5 | 2018 |
HDF-Net: Capturing homogeny difference features to localize the tampered image R Han, X Wang, N Bai, Y Wang, J Hou, J Xue IEEE Transactions on Pattern Analysis and Machine Intelligence, 2024 | 4 | 2024 |
PAFormer: Anomaly Detection of Time Series With Parallel-Attention Transformer N Bai, X Wang, R Han, Q Wang, Z Liu IEEE Transactions on Neural Networks and Learning Systems, 2023 | 4 | 2023 |
Image splicing region localization with adaptive multi-feature filtration J Hou, X Wang, R Han, M Jia, D Liu, Q Yu, S Pang Expert Systems with Applications 247, 123250, 2024 | 2 | 2024 |