Jiantao Zhou

ORCID: 0000-0002-6015-2618
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image and Signal Denoising Methods
  • Advanced Image Processing Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Sparse and Compressive Sensing Techniques
  • Advanced Steganography and Watermarking Techniques
  • Advanced Image Fusion Techniques
  • Advanced Vision and Imaging
  • Image Enhancement Techniques
  • Image and Video Quality Assessment
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Video Coding and Compression Technologies
  • Generative Adversarial Networks and Image Synthesis
  • Image Processing Techniques and Applications
  • Advanced Data Compression Techniques
  • Video Surveillance and Tracking Methods
  • Advanced Image and Video Retrieval Techniques
  • Wireless Communication Security Techniques
  • Advanced Memory and Neural Computing
  • Visual Attention and Saliency Detection
  • Algorithms and Data Compression
  • Cellular Automata and Applications
  • Autonomous Vehicle Technology and Safety
  • Medical Image Segmentation Techniques

University of Macau
2015-2024

City University of Macau
2019-2024

Ningbo Institute of Industrial Technology
2024

Chinese Academy of Sciences
2024

Lanzhou University
2024

Inner Mongolia University
2015-2024

Nanjing University of Science and Technology
2023-2024

Institute of Electrical and Electronics Engineers
2023

Signal Processing (United States)
2023

Intel (United States)
2023

Transformer-based methods have shown impressive performance in low-level vision tasks, such as image super-resolution. However, we find that these networks can only utilize a limited spatial range of input information through attribution analysis. This implies the potential Transformer is still not fully exploited existing networks. In order to activate more pixels for better reconstruction, propose novel Hybrid Attention (HAT). It combines both channel attention and window-based...

10.1109/cvpr52729.2023.02142 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023-06-01

Passive crossbar resistive random access memory (RRAM) arrays require select devices with nonlinear I-V characteristics to address the sneak-path problem. Here, we present a systematical analysis evaluate performance requirements of during read operation RRAM for proposed one-selector-one-resistor (1S1R) configuration serially connected selector/storage element. We found high selector current density is critical and nonlinearity (ON/OFF) requirement can be relaxed at present. Different...

10.1109/ted.2014.2310200 article EN IEEE Transactions on Electron Devices 2014-03-25

Nanoscale resistive switching devices (memristive or memristors) have been studied for a number of applications ranging from non-volatile memory, logic to neuromorphic systems. However major challenge is address the potentially large variations in space and time these nanoscale devices. Here we show that metal-filament based memristive can be fully stochastic. While individual events are random, distribution probability well predicted controlled. Rather than trying force high probabilities...

10.1039/c3nr01176c article EN Nanoscale 2013-01-01

The topics of visual and audio quality assessment (QA) have been widely researched for decades, yet nearly all this prior work has focused only on single-mode or signals. However, signals rarely are presented without accompanying audio, including heavy-bandwidth video streaming applications. Moreover, the distortions that may separately (or conjointly) afflict collectively shape user-perceived experience (QoE). This motivated us to conduct a subjective study (A/V) quality, which we then used...

10.1109/tip.2020.2988148 article EN IEEE Transactions on Image Processing 2020-01-01

A comprehensive analysis of write operations (SET and RESET) in a resistance-change memory (resistive random access memory) crossbar array is carried out. Three types resistive switching cells-nonlinear, rectifying-SET, rectifying-RESET-are compared with each other terms voltage delivery, current power consumption. Two different schemes, V/2 V/3, were considered, the scheme preferred due to much lower simple numerical method was developed that simulates entire flows node voltages within...

10.1109/ted.2014.2327514 article EN IEEE Transactions on Electron Devices 2014-06-19

To enhance the visibility and usability of images captured in hazy conditions, many image dehazing algorithms (DHAs) have been proposed. With so DHAs, there is a need to evaluate compare these DHAs. Due lack reference haze-free images, DHAs are generally evaluated qualitatively using real images. But it possible perform quantitative evaluation synthetic since available full-reference (FR) quality assessment (IQA) measures can be utilized. In this paper, we follow strategy study DHA...

10.1109/tmm.2019.2902097 article EN IEEE Transactions on Multimedia 2019-02-27

This paper proposes a novel reversible image data hiding scheme over encrypted domain. Data embedding is achieved through public key modulation mechanism, in which access to the secret encryption not needed. At decoder side, powerful two-class SVM classifier designed distinguish and nonencrypted patches, allowing us jointly decode embedded message original signal. Compared with state-of-the-art methods, proposed approach provides higher capacity able perfectly reconstruct as well message....

10.1109/tcsvt.2015.2416591 article EN IEEE Transactions on Circuits and Systems for Video Technology 2015-03-25

Audio information has been bypassed by most of current visual attention prediction studies. However, sound could have influence on and such widely investigated proofed many psychological In this paper, we propose a novel multi-modal saliency (MMS) model for videos containing scenes with high audio-visual correspondence. scenes, humans tend to be attracted the sources it is also possible localize via cross-modal analysis. Specifically, first detect spatial temporal maps from modality using...

10.1109/tip.2020.2966082 article EN IEEE Transactions on Image Processing 2020-01-01

In many practical scenarios, image encryption has to be conducted prior compression. This led the problem of how design a pair and compression algorithms such that compressing encrypted images can still efficiently performed. this paper, we highly efficient encryption-then-compression (ETC) system, where both lossless lossy are considered. The proposed scheme operated in prediction error domain is shown able provide reasonably high level security. We also demonstrate an arithmetic...

10.1109/tifs.2013.2291625 article EN IEEE Transactions on Information Forensics and Security 2014-01-01

Copy-move forgery is one of the most commonly used manipulations for tampering digital images. Keypoint-based detection methods have been reported to be very effective in revealing copy-move evidence due their robustness against various attacks, such as large-scale geometric transformations. However, these fail handle cases when forgeries only involve small or smooth regions, where number keypoints limited. To tackle this challenge, we propose a fast and algorithm through hierarchical...

10.1109/tifs.2018.2876837 article EN IEEE Transactions on Information Forensics and Security 2018-10-22

The increasing abuse of image editing software causes the authenticity digital images questionable. Meanwhile, widespread availability online social networks (OSNs) makes them dominant channels for transmitting forged to report fake news, propagate rumors, etc. Unfortunately, various lossy operations, e.g., compression and resizing, adopted by OSNs impose great challenges implementing robust forgery detection. To fight against OSN-shared forgeries, in this work, a novel training scheme is...

10.1109/tifs.2022.3144878 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

Owning to the recorded light ray distributions, field contains much richer information and provides possibilities of some enlightening applications, it has becoming more popular. To facilitate relevant many processing techniques have been proposed recently. These operations also bring loss visual quality, thus there is need a quality metric quantify loss. reduce complexity resource consumption, fields are generally sparsely sampled, compressed, finally reconstructed displayed users. We...

10.1109/tip.2020.2966081 article EN IEEE Transactions on Image Processing 2020-01-01

The state-of-the-art graph wavelet decomposition was constructed by maximum spanning tree (MST)-based downsampling and two-channel filter banks. In this work, we first show that: 1) the existing MST-based could become unbalanced, i.e., sampling rate is far from 1/2, which eventually leads to low representation efficiency of decomposition; 2) not only low-pass components, but also some high-pass ones can be decomposed potentially achieve better performance. Based on these observations,...

10.1109/tsp.2019.2896246 article EN IEEE Transactions on Signal Processing 2019-02-01

To solve the "big data" problems that are hindered by Von Neumann bottleneck and semiconductor device scaling limitation, a new efficient in-memory computing architecture based on crossbar array is developed. The corresponding basic operation principles design rules proposed verified using emerging nonvolatile devices such as very low-power resistive random access memory (RRAM). prove architecture, we demonstrate parallel 1-bit full adder (FA) both experiment simulation. A 4-bit multiplier...

10.1109/iedm.2015.7409720 article EN 2021 IEEE International Electron Devices Meeting (IEDM) 2015-12-01

Through exploiting the image nonlocal self-similarity (NSS) prior by clustering similar patches to construct patch groups, recent studies have revealed that structural sparse representation (SSR) models can achieve promising performance in various restoration tasks. However, most existing SSR methods only exploit NSS from input degraded (internal) image, and few utilize external clean corpus; how jointly priors of internal corpus is still an open problem. In this article, we propose a novel...

10.1109/tip.2020.3015545 article EN IEEE Transactions on Image Processing 2020-01-01

To resolve the sneak leakage problem and reduce power consumption in crossbar RRAM arrays, a Cu/Al <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> O xmlns:xlink="http://www.w3.org/1999/xlink">3</sub> /aSi/Ta cell with self-rectifying characteristics is developed. The exhibits low operating current (~nA), high ON/OFF ratios (>100×), pronounced nonlinearity. use of low-programming-current elements avoids current-driving capability...

10.1109/led.2016.2530942 article EN IEEE Electron Device Letters 2016-02-19

Sparse coding has achieved a great success in various image processing tasks. However, benchmark to measure the sparsity of patch/group is missing since sparse essentially an NP-hard problem. This work attempts fill gap from perspective rank minimization. We firstly design adaptive dictionary bridge between group-based (GSC) and Then, we show that under designed dictionary, GSC minimization problems are equivalent, therefore coefficients each patch group can be measured by estimating...

10.1109/tip.2020.2972109 article EN IEEE Transactions on Image Processing 2020-01-01

In this paper, we propose a novel approach to the rank minimization problem, termed residual constraint (RRC) model. Different from existing low-rank based approaches, such as well-known nuclear norm (NNM) and weighted (WNNM), which estimate underlying matrix directly corrupted observations, progressively approximate via minimizing residual. Through integrating image nonlocal self-similarity (NSS) prior with proposed RRC model, apply it restoration tasks, including denoising compression...

10.1109/tip.2019.2958309 article EN IEEE Transactions on Image Processing 2019-12-12

Group sparse representation (GSR) has made great strides in image restoration producing superior performance, realized through employing a powerful mechanism to integrate the local sparsity and nonlocal self-similarity of images. However, due some form degradation (e.g., noise, down-sampling or pixels missing), traditional GSR models may fail faithfully estimate each group an image, thus resulting distorted reconstruction original image. This motivates us design simple yet effective model...

10.1109/tip.2020.3021291 article EN IEEE Transactions on Image Processing 2020-01-01

Sparse representation has achieved great success in various image processing and computer vision tasks. For processing, typical patch-based sparse (PSR) models usually tend to generate undesirable visual artifacts, while group-based (GSR) lean produce over-smooth effects. In this paper, we propose a new model, termed joint patch-group based (JPG-SR). Compared with existing models, the proposed JPG-SR provides an effective mechanism integrate local sparsity nonlocal self-similarity of images....

10.1109/tip.2020.3005515 article EN IEEE Transactions on Image Processing 2020-01-01

Deep learning (DL) has demonstrated its powerful capabilities in the field of image inpainting, which could produce visually plausible results. Meanwhile, malicious use advanced inpainting tools (e.g. removing key objects to report fake news, erasing visible copyright watermarks, etc.) led increasing threats reliability data. To fight against forgeries (not only DL-based but also traditional ones), this work, we propose a novel end-to-end Image Inpainting Detection Network (IID-Net), detect...

10.1109/tcsvt.2021.3075039 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-04-22

By recording the whole scene around capturer, virtual reality (VR) techniques can provide viewers sense of presence. To a satisfactory quality experience, there should be at least 60 pixels per degree, so resolution panoramas reach 21600 × 10800. The huge amount data will put great demands on processing and transmission. However, when exploring in environment, only perceive content current field view (FOV). Therefore if we predict head eye movements which are important behaviors viewer, more...

10.1109/tmm.2019.2957986 article EN IEEE Transactions on Multimedia 2019-12-12
Coming Soon ...