Robust image hash in Radon transform domain for authentication Y Lei, Y Wang, J Huang Signal Processing: Image Communication 26 (6), 280-288, 2011 | 145 | 2011 |
SDD-FIQA: unsupervised face image quality assessment with similarity distribution distance FZ Ou, X Chen, R Zhang, Y Huang, S Li, J Li, Y Li, L Cao, YG Wang Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 102 | 2021 |
A novel blind image quality assessment method based on refined natural scene statistics FZ Ou, YG Wang, G Zhu 2019 IEEE International Conference on Image Processing (ICIP), 1004-1008, 2019 | 61 | 2019 |
Video sequence matching based on the invariance of color correlation Y Lei, W Luo, Y Wang, J Huang IEEE transactions on circuits and systems for video technology 22 (9), 1332-1343, 2012 | 53 | 2012 |
Security Analysis on Spatial 1 Steganography for JPEG Decompressed Images W Luo, Y Wang, J Huang IEEE Signal Processing Letters 18 (1), 39-42, 2010 | 45 | 2010 |
Transportation spherical watermarking YG Wang, G Zhu, YQ Shi IEEE Transactions on Image Processing 27 (4), 2063-2077, 2018 | 38 | 2018 |
A novel rank learning based no-reference image quality assessment method FZ Ou, YG Wang, J Li, G Zhu, S Kwong IEEE Transactions on Multimedia 24, 4197-4211, 2021 | 31 | 2021 |
Detection of quantization artifacts and its applications to transform encoder identification W Luo, Y Wang, J Huang IEEE Transactions on Information Forensics and Security 5 (4), 810-815, 2010 | 29 | 2010 |
A study on the security levels of spread-spectrum embedding schemes in the WOA framework YG Wang, G Zhu, S Kwong, YQ Shi IEEE Transactions on Cybernetics 48 (8), 2307-2320, 2017 | 27 | 2017 |
Robust dual watermarking algorithm for AVS video YG Wang, ZM Lu, L Fan, Y Zheng Signal Processing: Image Communication 24 (4), 333-344, 2009 | 21 | 2009 |
StarVQA: Space-time attention for video quality assessment F Xing, YG Wang, H Wang, L Li, G Zhu 2022 IEEE International Conference on Image Processing (ICIP), 2326-2330, 2022 | 17 | 2022 |
A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition Z Liu, G Zhu, YG Wang, J Yang, S Kwong ACM Transactions on Multimedia Computing Communications and Applications 16 …, 2020 | 14 | 2020 |
A study on the collusion security of LUT-based client-side watermark embedding YG Wang, D Xie, BB Gupta IEEE Access 6, 15816-15822, 2018 | 12 | 2018 |
An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy YG Wang, G Zhu Information Sciences 316, 40-53, 2015 | 12 | 2015 |
关联规则在课程相关性模式中的研究与应用 王员根, 李爱凤 现代计算机, 79-82, 2007 | 12 | 2007 |
通信工程专业实验实践教学研究与改革 肖明明, 王员根 中国现代教育装备, 74-75, 2007 | 11 | 2007 |
Query-efficient adversarial attack based on Latin hypercube sampling D Wang, J Lin, YG Wang 2022 IEEE International Conference on Image Processing (ICIP), 546-550, 2022 | 9 | 2022 |
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism W Tang, B Li, W Li, YG Wang, J Huang SCIENCE CHINA Information Sciences, 1-15, 2022 | 9 | 2022 |
(T,∊)-Greedy Reinforcement Learning for Anti-Jamming Wireless Communications PG Ye, YG Wang, J Li, L Xiao, G Zhu GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 9 | 2020 |
Defeating lattice-based data hiding code via decoding security hole YG Wang, G Zhu, J Li, M Conti, J Huang IEEE Transactions on Circuits and Systems for Video Technology, 1-12, 2020 | 9 | 2020 |