关注
Xiaofeng Wang
Xiaofeng Wang
Xi'an University of Technology
在 sina.com.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A visual model-based perceptual image hash for content authentication
X Wang, K Pang, X Zhou, Y Zhou, L Li, J Xue
IEEE Transactions on Information Forensics and Security 10 (7), 1336-1349, 2015
1402015
Time series prediction method based on variant LSTM recurrent neural network
J Hu, X Wang, Y Zhang, D Zhang, M Zhang, J Xue
Neural Processing Letters 52, 1485-1500, 2020
672020
Source camera identification from image texture features
B Xu, X Wang, X Zhou, J Xi, S Wang
Neurocomputing 207, 131-140, 2016
642016
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection
L Tian, N Zheng, J Xue, C Li, X Wang
Signal Processing: Image Communication 26 (8-9), 427-437, 2011
572011
Image forensic signature for content authenticity analysis
X Wang, J Xue, Z Zheng, Z Liu, N Li
Journal of Visual Communication and Image Representation 23 (5), 782-797, 2012
542012
Image alignment based perceptual image hash for content authentication
X Wang, X Zhou, Q Zhang, B Xu, J Xue
Signal Processing: Image Communication 80, 115642, 2020
382020
Hash key-based video encryption scheme for H. 264/AVC
X Wang, N Zheng, L Tian
Signal Processing: Image Communication 25 (6), 427-437, 2010
382010
Multi-step-ahead time series prediction method with stacking LSTM neural network
XF Wang, Y Zhang
2020 3rd International Conference on Artificial Intelligence and Big Data …, 2020
262020
Coarse-to-fine-grained method for image splicing region detection
X Wang, Y Wang, J Lei, B Li, Q Wang, J Xue
Pattern Recognition 122, 108347, 2022
252022
A statistical feature based approach to distinguish PRCG from photographs
X Wang, Y Liu, B Xu, L Li, J Xue
Computer Vision and Image Understanding 128, 84-93, 2014
252014
An efficient batch images encryption method based on DNA encoding and PWLCM
X Wang, B Li, Y Wang, J Lei, J Xue
Multimedia Tools and Applications 80 (1), 943-971, 2021
212021
FCD-Net: Learning to detect multiple types of homologous deepfake face images
R Han, X Wang, N Bai, Q Wang, Z Liu, J Xue
IEEE Transactions on Information Forensics and Security 18, 2653-2666, 2023
152023
A novel image signature method for content authentication
X Wang, N Zheng, J Xue, Z Liu
The Computer Journal 55 (6), 686-701, 2012
132012
Perceptual hash-based coarse-to-fine grained image tampering forensics method
X Wang, Q Zhang, C Jiang, J Xue
Journal of Visual Communication and Image Representation 78, 103124, 2021
112021
Coarse-to-fine grained image splicing localization method based on noise level inconsistency
X Wang, Q Zhang, C Jiang, Y Zhang
2020 International Conference on Computing, Networking and Communications …, 2020
92020
Class-imbalanced time series anomaly detection method based on cost-sensitive hybrid network
X Wang, Y Zhang, N Bai, Q Yu, Q Wang
Expert Systems with Applications 238, 122192, 2024
62024
Super-resolution image reconstruction using surface fitting with hierarchical structure
X Wang, D Zhou, N Zeng, X Yu, S Hu
Journal of Visual Communication and Image Representation 53, 65-75, 2018
52018
HDF-Net: Capturing homogeny difference features to localize the tampered image
R Han, X Wang, N Bai, Y Wang, J Hou, J Xue
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2024
42024
PAFormer: Anomaly Detection of Time Series With Parallel-Attention Transformer
N Bai, X Wang, R Han, Q Wang, Z Liu
IEEE Transactions on Neural Networks and Learning Systems, 2023
42023
Image splicing region localization with adaptive multi-feature filtration
J Hou, X Wang, R Han, M Jia, D Liu, Q Yu, S Pang
Expert Systems with Applications 247, 123250, 2024
22024
系统目前无法执行此操作,请稍后再试。
文章 1–20