Yi Shi

ORCID: 0000-0003-1712-9495
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Fuzzy and Soft Set Theory
  • Fixed Point Theorems Analysis
  • Advanced Steganography and Watermarking Techniques
  • Advanced Algebra and Logic
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Mathematical Dynamics and Fractals
  • Multi-Criteria Decision Making
  • Advanced Topology and Set Theory
  • Advanced Differential Equations and Dynamical Systems
  • Quantum chaos and dynamical systems
  • Advanced Data Compression Techniques
  • Caveolin-1 and cellular processes
  • Geometric and Algebraic Topology
  • Surgical Simulation and Training
  • Target Tracking and Data Fusion in Sensor Networks
  • Cellular Automata and Applications
  • Advanced Vision and Imaging
  • Error Correcting Code Techniques
  • Rough Sets and Fuzzy Logic
  • Robotics and Sensor-Based Localization
  • Graph theory and applications
  • Anatomy and Medical Technology
  • Markov Chains and Monte Carlo Methods
  • Advanced Banach Space Theory

Nanjing Institute of Technology
2024

Nanjing University of Information Science and Technology
2021-2023

Sichuan University
2023

Shantou University
2020-2021

Beijing Institute of Technology
2016-2020

Intelligent Automation (United States)
2014

New Jersey Institute of Technology
1994-2005

Yuncheng University
2003

Both watermark structure and embedding strategy affect robustness of image watermarks. Where should watermarks be embedded in the discrete cosine transform (DCT) domain order for invisible to robust? Though many papers literature agree that perceptually significant components, dc components are explicitly excluded from embedding. In this letter, a new watermarking is proposed based on quantitative analysis magnitudes DCT host images. We argue more can achieved if since have much larger...

10.1109/76.867936 article EN IEEE Transactions on Circuits and Systems for Video Technology 2000-01-01

In this paper, we propose a self-synchronization algorithm for audio watermarking to facilitate assured data transmission. The synchronization codes are embedded into with the informative data, thus have ability. To achieve robustness, embed and hidden low frequency coefficients in DWT (discrete wavelet transform) domain. By exploiting time-frequency localization characteristics of DWT, computational load searching has been dramatically reduced, resolving contending requirements between...

10.1109/tbc.2004.838265 article EN IEEE Transactions on Broadcasting 2005-03-01

A blind audio information bit hiding algorithm with effective synchronization is proposed in this paper. The embeds signals the time domain to resist attacks such as cropping while keeping computation for resynchronization lower. watermark placed blockwise DCT coefficients of original exploiting HAS (Human Audio System) features. To lower error rate extraction, error-correcting coding applied. experimental results show that hidden imperceptible robust caused by additive noise, MP3 coding,...

10.1109/iscas.2002.1010302 article EN 2003-06-25

10.1109/wacv61041.2025.00562 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2025-02-26

This paper investigates the feasibility of watermark embedding in discrete cosine transform (DCT) domain for binary images. Watermark is known to be difficult images due their nature. For frequency approach image watermarking, a post-embedding binarization necessary step ensure that watermarked still image. disturbs embedded and likely remove watermark. We have succeeded combating this interference by watermarks DC components DCT employing biased threshold. algorithm can applied general...

10.1109/mmsp.2002.1203305 article EN 2004-01-24

Robust audio watermarks present some challenges. In this paper, we propose a DWT-based watermarking algorithm to resist shifting and cropping. Synchronization codes are embedded into with informative watermark, thus the watermark generated has ability of self-synchronization. To achieve good robustness performance, embed synchronization low-frequency coefficients in DWT domain. By exploring time-frequency localization capability decrease computation load for searching effectively, resolve...

10.1109/iscas.2004.1329907 article EN 2004-11-30

In this paper, we propose a DWT-based image-watermarking algorithm applying DS-CDMA. The improved orthogonal Gold sequences sets generated via m-sequences are used to spread spectrum of the watermark. CDMA encoded watermark is embedded into DWT domain by modulating selected coefficients image in fashion similar CDMA. Blind recovery data achieved analyzing watermarked and auto-correlation codes. proposed compared with existing watermarking schemes based on experimental results demonstrate...

10.1109/iscas.2003.1206132 article EN 2003-10-15

The aim of the paper is to present three-variable generalizations fuzzy metric spaces in sense George and Veeramani from functional topological points view, respectively.From viewpoint generalization, we introduce a notion generalized 2-metric spaces, study their properties, point out that it also common generalization both tripled proposed by Tian et al. M-fuzzy Sedghi Shobe.Since ordinary norm same as up induced topology, keep our spirit on normed structures concept 2-normed...

10.14736/kyb-2023-6-0880 article EN Kybernetika 2024-02-14

10.1016/j.fss.2024.109053 article EN Fuzzy Sets and Systems 2024-09-01

Data hiding techniques have extensive applications and attracted much attention. However, one common drawback of virtually all current data methods is the fact that host image inevitably permanently distorted by some small amount noise due to itself Although distortion often quite small, it may not be acceptable for medical or military images. For these applications, stego-image cannot any distortion, a high capacity distortion-free algorithm palette proposed in this paper. By utilizing...

10.1109/iscas.2003.1206124 article EN 2003-10-31

10.1016/j.fss.2021.03.010 article EN Fuzzy Sets and Systems 2021-03-24

10.1016/j.fss.2023.108766 article EN Fuzzy Sets and Systems 2023-10-28

In this paper, the notions of L-internal relations and L-enclosed are introduced. They respectively defined to be crisp on LX satisfying a set axioms, which can used characterize L-topologies. It is shown that category relation spaces, spaces L-topological isomorphic. Moreover, relationships among relations, axioms separation investigated.

10.3233/jifs-17845 article EN Journal of Intelligent & Fuzzy Systems 2018-01-12

Abstract Let be an Anosov diffeomorphism whose linearization is irreducible. Assume that also absolutely partially hyperbolic where a weak stable subbundle considered as the center subbundle. We show if strong and unstable are jointly integrable, then dynamically coherent all foliations match corresponding linear foliation under conjugacy to . Moreover, admits finest dominated splitting in with dimensions matching those for , it has spectral rigidity along these subbundles. In dimension 4,...

10.1112/plms.12568 article EN Proceedings of the London Mathematical Society 2023-10-25

You have accessJournal of UrologyTechnology & Instruments: Surgical Education Skills Assessment/Ureteroscopy II1 Apr 20121512 DEVELOPMENT, IMPLEMENTATION AND VALIDATION OF A SIMULATION-BASED CURRICULUM FOR ROBOT-ASSISTED SURGERY Andrew P. Stegemann, Thenkurussi Kesavadas, Shabnam Rehman, Mohamed Sharif, Amrith Rao, Nefertiti C. duPont, Yi Shi, Gregory E. Wilding, James M. Hassett, and Khurshid A. Guru StegemannAndrew Stegemann Buffalo, NY More articles by this author , KesavadasThenkurussi...

10.1016/j.juro.2012.02.1279 article EN The Journal of Urology 2012-04-01

In this paper, the concepts of (L, M)-fuzzy internal relations and enclosed between two L-fuzzy sets are introduced. They defined respectively to be M-fuzzy subsets LX × satisfying a set axioms. A categorical approach is provided present these relations. It proved that category relation spaces, spaces topological isomorphic. addition, some naturally constructed from quasi-uniformities S-quasi-proximities.

10.3233/jifs-172129 article EN Journal of Intelligent & Fuzzy Systems 2019-05-10

In this paper, we mainly introduce the concept of lattice-valued betweenness relations and study its relationships with L-fuzzifying convex structures in depth. Such an extended relation is defined to be a map from X × complete lattice provided that fulfills set axioms. We also discuss among them other algebraic geometric structures. Moreover, category approach present relations. It shown spaces interval are isomorphic.

10.3233/jifs-181395 article EN Journal of Intelligent & Fuzzy Systems 2019-07-26

Pointwise pseudoquasi-metrics play an important role in the theory of lattice-valued topology ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$L$</tex-math></inline-formula> -topology). Bearing mind that closed balls and their relations with have historically attracted attention mathematicians, it is very surprising no has been paid to between pointwise balls. In this article, we first introduce concept...

10.1109/tfuzz.2021.3054466 article EN IEEE Transactions on Fuzzy Systems 2021-01-26

You have accessJournal of UrologyTechnology & Instruments: Surgical Education Skills Assessment (1)1 Apr 2013886 DEVELOPMENT VALIDATION OF A COMPOSITE GRADING SCORING SYSTEM FOR ROBOT-ASSISTED SURGICAL TRAINING — THE ROBOTIC SKILLS ASSESSMENT SCALE Ashirwad Chowriappa, Syed Raza, Andrew Stegemann, Kamran Ahmed, Yi Shi, Gregory Wilding, Jihad H. Kaouk, James Peabody, Mani Menon, Thenkurussi Kesavadas, and Khurshid Guru ChowriappaAshirwad Chowriappa East Amherst, NY More articles by this...

10.1016/j.juro.2013.02.457 article EN The Journal of Urology 2013-03-27

In this article, we propose an efficient compression algorithm for very low-bit-rate video applications. The is based on (a) optical-flow motion estimation to achieve more accurate prediction fields; (b) discrete cosine transformation (DCT) coding of the vectors from reduce overheads; and (c) adaptive threshold technique match optical flow minimize residual errors. Unlike classic block-matching DCT schemes in MPEG-1/2 H.261/3, proposed uses compensation applied field instead predictive...

10.1002/(sici)1098-1098(1998)9:4<230::aid-ima5>3.0.co;2-b article EN International Journal of Imaging Systems and Technology 1998-01-01

Arithmetic coding with embedded channel (ACECC) is an arithmetic approach in which the code points selected over [0-1) interval are kept within a certain minimum Hamming distance of each other. The decoding process utilizes this distance, knowledge source statistics, and self-synchronization property coding, to overcome errors. This paper explains how maximum posteriori probability symbol (MAPSD) implemented. We show joint source/channel can avoid catastrophic effect unrecoverable errors...

10.1109/wcnc.1999.796819 article EN 2003-01-20

10.1016/j.ijar.2020.03.006 article EN publisher-specific-oa International Journal of Approximate Reasoning 2020-03-20

In this paper, we propose SpotNet: a fast, single stage, image-centric but LiDAR anchored approach for long range 3D object detection. We demonstrate that our to LiDAR/image sensor fusion, combined with the joint learning of 2D and detection tasks, can lead accurate very sparse support. Unlike more recent bird's-eye-view (BEV) sensor-fusion methods which scale $r$ as $O(r^2)$, SpotNet scales $O(1)$ range. argue such an architecture is ideally suited leverage each sensor's strength, i.e....

10.48550/arxiv.2405.15843 preprint EN arXiv (Cornell University) 2024-05-24

Advances in machine learning algorithms for sensor fusion have significantly improved the detection and prediction of other road users, thereby enhancing safety. However, even a small angular displacement sensor's placement can cause significant degradation output, especially at long range. In this paper, we demonstrate simple yet generic efficient multi-task approach that not only detects misalignment between different modalities but is also robust against them long-range perception. Along...

10.48550/arxiv.2408.11196 preprint EN arXiv (Cornell University) 2024-08-20
Coming Soon ...