- Digital Media Forensic Detection
- Adversarial Robustness in Machine Learning
- Advanced Steganography and Watermarking Techniques
- Image and Signal Denoising Methods
- Anomaly Detection Techniques and Applications
- Integrated Circuits and Semiconductor Failure Analysis
- Educational Technology and Assessment
- Software Testing and Debugging Techniques
- Metaheuristic Optimization Algorithms Research
- Health Systems, Economic Evaluations, Quality of Life
- Chaos-based Image/Signal Encryption
- Supply Chain and Inventory Management
- Medical Image Segmentation Techniques
- Algorithms and Data Compression
- Sustainable Supply Chain Management
- Video Analysis and Summarization
- Face recognition and analysis
- Scheduling and Optimization Algorithms
- Generative Adversarial Networks and Image Synthesis
- Advanced Decision-Making Techniques
- Face and Expression Recognition
- Image Processing Techniques and Applications
- Image Retrieval and Classification Techniques
- Vehicle License Plate Recognition
- Computational Drug Discovery Methods
Hainan Normal University
2021-2024
Xiamen University
2024
Boehringer Ingelheim (China)
2022
PLA Information Engineering University
2010-2021
Shanghai University
2021
Tianjin University
2021
Henan University of Economic and Law
2016
Henan University
2011
Zhengzhou University
2010
With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea RDHEI is that owner encrypts a cover image, and then hider embeds secret information image. key, receiver can extract embedded from hidden image; with encryption reconstructs original In this paper, we embed form random bits or scanned documents. proposed method takes full advantage spatial correlation images to vacate room for...
Test data is generated by making use of minimization branch function for a given path. This method classical but it needs to iteratively calculate the current value variable in predicate For this reason, paper devised model test generation based on slice means combining existed slicing technology with hybrid encoding genetic algorithm proposed us. The results analyzing theory show that correct and efficient.
The transferability of adversarial examples has been proven to be a potent tool for successful attacks on target models, even in challenging black-box environments. However, the majority current research focuses non-targeted attacks, making it arduous enhance targeted using traditional methods. This paper identifies crucial issue existing gradient iteration algorithms that generate perturbations fixed manner. These have detrimental impact subsequent computations, resulting instability update...
Adversarial attack methods have achieved satisfactory results in white-box scenarios, but their performance declines when transferred to other deep neural network (DNN) models. Currently, there are many improve the transferability of adversarial samples, and enhancing through input transformations is an effective approach. However, most existing performed spatial domain, neglecting frequency domain. Therefore, this paper proposes a novel transformation-based attack: domain enhancement (FDE)...
This paper analyzes random bits and scanned documents, two forms of secret data. The data were pre-processed by halftone, quadtree, S-Box transformations, the size document was reduced 8.11 times. A novel LSB matching algorithm with low distortion proposed for embedding step. golden ratio firstly applied to find optimal position used design function. Both theory experiment have demonstrated that our study presented a good trade-off between high capacity is superior other related schemes.
In recent years, Generative Adversarial Nets (GAN), Conditional (CGAN), and Deep convolutional generative adversarial networks (DCGAN) have generally been well-received in Artificial Intelligence (AI) industry. This paper first briefly introduces the fundamentals of GAN, CGAN, DCGAN. Next, we focus on comparing two improved GAN variants– CGAN To be specific, train them with certain architectural constraints datasets – MNIST Animation images. We show convincing evidence that DCGAN outperforms...
Loop selection for multilevel nested loops is a very difficult problem, which solutions through the underlying hardware-based loop techniques and traditional software-based static compilation are ineffective. A genetic algorithm- (GA-) based method proposed in this study to solve problem. First, formal specification mathematical model of problem presented; then, overall framework GA designed on model; finally, we provide chromosome representation fitness function calculation method, initial...
Face recognition refers to the process of detecting faces from images. In recent years, face has attracted wide attention due its non-contact method, fast process, and stability. However, noise in image deficient performance algorithm, existing algorithm low robustness accuracy. This paper proposed a simulation model tackle this issue, which can be utilized analyze correlation between denoising. We use control variable method select best combination denoising edge methods. note that...
Bayesian statistics is an approach for learning from evidences as it accumulates, combining prior distribution with current information on a quantity of interest, in which posterior and inferences are being updated each time new data become available using Bayes' Theorem. Though frequentist has dominated medical studies, been more widely recognized by its flexibility efficiency. Research development (R&D) anti-cancer drugs have so hot globally recent years spite relatively high failure rate....
Abstract With the development of internet, digital media can be manipulated, reproduced, and distributed conveniently over networks. However, illegal copy, transmission distribution become an important security issue. In this paper, we propose a high-capacity robustness method based on discrete wavelet transforms(DWT) optimal cosine transforms(DCT). We present two approaches, they are: DWT-ODCT(high-capacity robust image watermarking algorithm DWT DCT), and(P-DWT-ODCT) DCT by watermark...