Rotation, scale, and translation resilient watermarking for images CY Lin, M Wu, JA Bloom, IJ Cox, ML Miller, YM Lui IEEE Transactions on image processing 10 (5), 767-782, 2001 | 1276 | 2001 |
Nisp: Pruning networks using neuron importance score propagation R Yu, A Li, CF Chen, JH Lai, VI Morariu, X Han, M Gao, CY Lin, LS Davis Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 989 | 2018 |
A robust image authentication method distinguishing JPEG compression from malicious manipulation CY Lin, SF Chang IEEE Transactions on Circuits and Systems for Video Technology 11 (2), 153-168, 2001 | 822 | 2001 |
Semifragile watermarking for authenticating JPEG visual content CY Lin, SF Chang Security and watermarking of multimedia contents II 3971, 140-151, 2000 | 467 | 2000 |
IBM Research TRECVID-2003 Video Retrieval System. A Amir, J Argillander, M Campbell, A Haubold, G Iyengar, S Ebadollahi, ... TRECVID, 2003 | 353 | 2003 |
Robust image authentication method surviving JPEG lossy compression CY Lin, SF Chang Storage and Retrieval for Image and Video Databases VI 3312, 296-307, 1997 | 261 | 1997 |
Searching for experts in the enterprise: combining text and social network analysis K Ehrlich, CY Lin, V Griffiths-Fisher Proceedings of the 2007 ACM International Conference on Supporting Group …, 2007 | 241 | 2007 |
Generating robust digital signature for image/video authentication CY Lin, SF Chang Multimedia and Security Workshop at ACM Multimedia 98, 49-54, 1998 | 241 | 1998 |
Personalized recommendation driven by information flow X Song, BL Tseng, CY Lin, MT Sun Proceedings of the 29th annual international ACM SIGIR conference on …, 2006 | 234 | 2006 |
Semantic indexing of multimedia content using visual, audio, and text cues WH Adams, G Iyengar, CY Lin, MR Naphade, C Neti, HJ Nock, JR Smith EURASIP Journal on Advances in Signal Processing 2003, 1-16, 2003 | 231 | 2003 |
Using MPEG-7 and MPEG-21 for personalizing video BL Tseng, CY Lin, JR Smith iEEE Multimedia 11 (1), 42-52, 2004 | 194 | 2004 |
Multimedia security technologies for digital rights management W Zeng, H Yu, CY Lin Elsevier, 2011 | 187 | 2011 |
GraphBIG: understanding graph computing in the context of industrial solutions L Nai, Y Xia, IG Tanase, H Kim, CY Lin Proceedings of the International Conference for High Performance Computing …, 2015 | 186 | 2015 |
Non-negative residual matrix factorization with application to graph anomaly detection H Tong, CY Lin Proceedings of the 2011 SIAM International Conference on Data Mining, 143-153, 2011 | 182 | 2011 |
Method and apparatus for image authentication SF Chang, CY Lin US Patent 6,532,541, 2003 | 172 | 2003 |
Multi-modal fusion in content-based retrieval CY Lin, A Natsev, MR Naphade, JR Smith, BL Tseng US Patent 7,610,306, 2009 | 171 | 2009 |
Issues and solutions for authenticating MPEG video CY Lin, SF Chang Security and watermarking of multimedia contents 3657, 54-65, 1999 | 171 | 1999 |
Distortion modeling and invariant extraction for digital image print-and-scan process CY Lin, SF Chang Int. Symp. Multimedia Information Processing, 1999 | 169 | 1999 |
Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform JA Bloom, IJ Cox, ML Miller, M Wu, CY Lin, YM Lui US Patent 6,282,300, 2001 | 168 | 2001 |
Targetvue: Visual analysis of anomalous user behaviors in online communication systems N Cao, C Shi, S Lin, J Lu, YR Lin, CY Lin IEEE transactions on visualization and computer graphics 22 (1), 280-289, 2015 | 166 | 2015 |