Haibo Yu

ORCID: 0000-0002-9631-923X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Semantic Web and Ontologies
  • Chaos-based Image/Signal Encryption
  • Software Testing and Debugging Techniques
  • Software Engineering Research
  • Service-Oriented Architecture and Web Services
  • Software System Performance and Reliability
  • Advanced Malware Detection Techniques
  • Peer-to-Peer Network Technologies
  • Web Data Mining and Analysis
  • Generative Adversarial Networks and Image Synthesis
  • Recommender Systems and Techniques
  • Cosmology and Gravitation Theories
  • Software Reliability and Analysis Research
  • Cognitive Computing and Networks
  • Face recognition and analysis
  • Video Coding and Compression Technologies
  • Advanced Image and Video Retrieval Techniques
  • Software-Defined Networks and 5G
  • Music and Audio Processing
  • Time Series Analysis and Forecasting
  • Parallel Computing and Optimization Techniques
  • Dark Matter and Cosmic Phenomena
  • Multimodal Machine Learning Applications

Chinese Academy of Sciences
2015-2025

University of Science and Technology of China
2025

Hefei Institutes of Physical Science
2025

Shanghai University
2022

Beijing Jiaotong University
2021-2022

Institute of Information Engineering
2014-2021

University of Chinese Academy of Sciences
2020

Shanghai Jiao Tong University
2012-2018

Singapore Management University
2017

Kyushu University
2004-2009

Most current audio steganographic methods are content non-adaptive which have poor security and low embedding capacity. This paper proposes a generalized adaptive Huffman code mapping (AHCM) framework for obtaining higher secure payload. To avoid the frame-offset effect of codec, we first establish distortion-limited suppressible space, realizes data by using equal-length entropy codes. Furthermore, stego key is used to dynamically build each frame improving acoustic imperceptibility...

10.1109/tifs.2019.2895200 article EN IEEE Transactions on Information Forensics and Security 2019-01-25

Background: Sparse angular projection is an important way to reduce CT dose. It consists of two processes, sparse sampling, and image reconstruction based on projection. Under the traditional framework, sparseness angle may cause a degradation effect in reconstructed image. A series machine learning methods for developed recent years, especially deep methods, can effectively improve quality, however, these only reconstruct images certain sampling scheme. Objective: On other words, they...

10.2174/0115734056354972250221012822 article EN Current Medical Imaging Formerly Current Medical Imaging Reviews 2025-03-25

This letter deals with information hiding in compressed video; its goal is to improve the security of motion vector-based steganography respect current best steganalytic method. Our research suggests that perfect (undetectability) can be approached if uncertain information, which exists process estimation, fully exploited and establishes a connection between single vector's embedding distortion associated uncertainty. Based on this, novel video proposed. Under given payload, syndrome-trellis...

10.1109/lcomm.2014.2387160 article EN IEEE Communications Letters 2014-12-31

In this paper, a novel motion vector-based video steganographic scheme is proposed, which capable of withstanding the current best statistical detection method. With scheme, secret message bits are embedded into vector (MV) values by slightly perturbing their estimation (ME) processes. general, two measures taken for security (statistical undetectability) enhancement. First, ME perturbations optimized ensuring modified MVs still local optimal, essentially makes targeted detectors...

10.1145/2756601.2756609 article EN 2015-06-02

The proliferation of diverse kinds programming languages and platforms makes it a common need to have the same functionality implemented in different for platforms, such as Java Android applications C# Windows phone applications.Although versions code written appear syntactically quite from each other, they are intended implement software typically contain many snippets that similar functionalities, which we call cross-language clones.When version one language evolves according changing...

10.1587/transinf.2016edp7334 article EN IEICE Transactions on Information and Systems 2017-01-01

To attract more users on different platforms, many projects release their versions in multiple programming languages (e.g., Java and C#). They typically have code snippets that implement similar functionalities, i.e., cross-language clones. Programmers often need to track modify clones consistently maintain functionalities across language implementations. In literature, researchers proposed approaches detect cross- clones, mostly for share a common intermediate (such as the .NET family) so...

10.1145/2970276.2970363 article EN 2016-08-25

Theoretical investigations into the evolution of early universe are an essential part particle physics that allow us to identify viable extensions Standard Model as well motivated parameter space can be probed by various experiments and observations. In this white paper, we review models universe. First, outline explain two ingredients (dark matter baryon asymmetry) those seek address current observational anomalies. We then discuss dynamics in neutrino masses, axions, several solutions...

10.48550/arxiv.2203.06680 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Software libraries have become more and complex in recent years. Developers usually to rely on search engines find API documents then select suitable APIs do relevant development when working unfamiliar functions. However, the traditional not focus searching that make this process inconvenient time consuming. Although a lot of efforts been made understanding code industry academia, work tools can recommend methods users based their description API's functionality are still very limited.

10.1145/2993717.2993727 article EN 2016-09-18

Multivariate Time series data play important roles in our daily life. How to use these the process of prediction is a highly attractive study for many researchers. To achieve this goal, paper, we present novel multivariate time method based on multi-attention generative adversarial network. This includes three phases explore prediction. Firstly, encoder stage consists two modules, from which input-attention and self-attention can encode exogenous sequence into latent space. Secondly, decoder...

10.1109/access.2021.3065969 article EN cc-by-nc-nd IEEE Access 2021-01-01

In the past decades, various approaches have been proposed to address time series prediction problem, among which nonlinear autoregressive exogenous (NARX) models achieve great progresses in one-step prediction. Although NARX are capable of capturing long-term dependence data, impact associated attributes lacks enough attention. To cope with this issue, paper we propose a Multi-Attention algorithm based Recurrent Neural Network (RNN) perform multivariate forecasting. first stage, given raw...

10.1109/iscc50000.2020.9219721 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2020-07-01

In this letter, we devise an adaptive double-layered embedding scheme that is suitable for MP3 steganography. According to the encoding characteristics of MP3, linbits are used as domain. The proposed divided into two layers and messages embedded each layer with binary STCs. cost function in first designed by employing masking effect achieve optimal imperceptibility. order reduce modification coefficients, second revised according results layer. Experiments demonstrate our able better...

10.1109/lsp.2020.3032875 article EN IEEE Signal Processing Letters 2020-01-01

The semantic Web and services technologies have provided both new possibilities challenges to automatic information processing. There are a lot of researches on applying these current personal retrieval systems, but no research addresses the issues from whole life cycle architecture point view. provide way for accessing resources, until now, they been managed separately conventional contents resources. In this paper, we out system requirements propose conceptual system. It incorporates Web,...

10.1109/icws.2005.23 article EN 2005-01-01

10.1016/j.jvcir.2022.103452 article EN Journal of Visual Communication and Image Representation 2022-02-01

10.1016/j.image.2020.116127 article EN Signal Processing Image Communication 2021-01-08

The semantic Web and service technologies have provided both new possibilities challenges to automatic information processing. There are a lot of researches on applying these into current personal retrieval systems, but no research addresses the issues from whole life cycle architecture point view. services provide way for accessing resources, until now, they been managed separately traditional contents resources. In this poster, we propose conceptual system. It incorporates Web, multi-agent...

10.1145/1062745.1062825 article EN 2005-01-01

The goal of this paper is to improve the performance current video steganalysis in detecting motion vector (MV)-based steganography. It noticed that many MV-based approaches embed secret bits content adaptive manners. Typically, modifications are applied only qualified MVs, which implies number modified MVs varies among frames after embedding. On other hand, nearly all steganalytic methods ignore such uneven distribution. They divide into frame groups equally and calculate every single...

10.1109/icme.2015.7177410 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2015-06-01

More and more mobile applications run on multiple operating systems to attract users of different platforms. Although versions platforms are implemented in programming languages (e.g., Java Objective-C), there must be many code snippets that implement the similar business logic Such called cross-platform clones. It is challenging but essential detect such clones for software maintenance. Due practice developers usually use some common identifiers when implementing same platforms, this paper,...

10.1145/2975961.2975967 article EN 2016-08-26

Up to now, most researches on steganalysis concentrate one extreme case. Typically, the a priori knowledge of embedding way and cover-media is assumed known in classifier training even feature design stage. However, real world done with different levels such so that there can be various paradigms for doing it. Although some researchers have addressed situations, still lack systematic approach defining paradigms. In this paper, authors give an by first four paradigms, then rest among them....

10.4018/ijdcf.2016040101 article EN International Journal of Digital Crime and Forensics 2016-04-01
Coming Soon ...