Xiaoxiao Hu

ORCID: 0000-0003-1866-0413
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image and Signal Denoising Methods
  • Digital Media Forensic Detection
  • Mathematical Analysis and Transform Methods
  • Advanced Steganography and Watermarking Techniques
  • Nonlinear Waves and Solitons
  • Digital Filter Design and Implementation
  • Game Theory and Applications
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Image Processing Techniques
  • Game Theory and Voting Systems
  • Nonlinear Photonic Systems
  • E-commerce and Technology Innovations
  • Medical Image Segmentation Techniques
  • Spam and Phishing Detection
  • Sparse and Compressive Sensing Techniques
  • Blind Source Separation Techniques
  • Advanced Differential Geometry Research
  • Image Processing Techniques and Applications
  • Topic Modeling
  • Misinformation and Its Impacts
  • Advanced Fiber Laser Technologies
  • Multimedia Communication and Technology
  • Adversarial Robustness in Machine Learning
  • Power Transformer Diagnostics and Insulation
  • Thermodynamic and Exergetic Analyses of Power and Cooling Systems

Fudan University
2022-2023

Nanchang Institute of Science & Technology
2022-2023

Nanchang University
2023

Wenzhou Medical University
2013-2022

First Affiliated Hospital of Wenzhou Medical University
2020-2022

Shanghai Electric (China)
2021-2022

Sichuan University
2020

West China Hospital of Sichuan University
2020

Shanghai University
2019

Tianjin Chengjian University
2018

Previous researches on multimedia fake news detection include a series of complex feature extraction and fusion networks to gather useful information from the news. However, how cross-modal consistency relates fidelity features different modalities affect decision-making are still open questions. This paper presents novel scheme Bootstrapping Multi-view Representations (BMR) for detection. Given multi-modal news, we extract representations respectively views text, image pattern semantics....

10.1609/aaai.v37i4.25670 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2023-06-26

Digital watermarking has shown its effectiveness in protecting multimedia content. However, existing is predominantly tailored for specific media types, rendering them less effective the protection of content displayed on computer screens, which often multi-modal and dynamic. Visual Screen Content (VSC), particularly susceptible to theft leakage through screenshots, a vulnerability that current methods fail adequately address. To address these challenges, we propose ScreenMark, robust...

10.1609/aaai.v39i25.34825 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

The quaternion Fourier transform (QFT) is one of the key tools in studying color image processing. Indeed, a deep understanding QFT has created images to be transformed as whole, rather than separated component. In addition, paves way for other integral transform, such fractional linear canonical and Wigner–Ville distribution. aim this paper twofold: first provide some theoretical background regarding bound variation function. We then apply it derive inversion formulas. Secondly, tuition how...

10.1002/mma.4148 article EN Mathematical Methods in the Applied Sciences 2016-09-19

Quaternion analytic signal is regarded as a generalization of from 1D to 4D space. It defined by an original with its quaternion partial and total Hilbert transforms. The provides the features representation, such local amplitude phase angle, latter includes structural information signal. aim present study twofold. Firstly, it attempts analyze Plemelj‐Sokhotzkis formula associated Fourier transform linear canonical transform. With these formulae, we show that signals are boundary values...

10.1002/mma.4567 article EN Mathematical Methods in the Applied Sciences 2017-09-11

The specific role of the corticospinal tract with respect to inattention and impulsive symptoms in children attention-deficit/hyperactivity disorder (ADHD) has been explored past. However, our knowledge, no study identified exact regions that are affected ADHD. We aimed determine comprehensive alterations white matter microstructure underlying neuropsychological substrates ADHD.We recruited 38 drug-naïve ADHD 34 typically developing controls. employed a tract-based quantitative approach...

10.1503/jpn.190024 article EN Journal of Psychiatry and Neuroscience 2020-02-26

10.1007/s11760-021-02110-1 article EN Signal Image and Video Processing 2022-01-28

RAW files are the initial measurement of scene radiance widely used in most cameras, and ubiquitously-used RGB images converted from data through Image Signal Processing (ISP) pipelines. Nowadays, digital risky being nefariously manipulated. Inspired by fact that innate immunity is first line body defense, we propose DRAW, a novel scheme defending against manipulation protecting their sources, i.e., camera-shooted RAWs. Specifically, design lightweight Multi-frequency Partial Fusion Network...

10.1109/iccv51070.2023.02050 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2023-10-01

Image cropping can be maliciously used to manipulate the layout of an image and alter underlying meaning. Previous detection schemes only predict whether has been cropped, ignoring which part is cropped. This paper presents a novel robust watermarking network for localization. We train anti-cropping processor (ACP) that embeds watermark into target image. The visually indistinguishable protected then posted on social instead original At recipient's side, ACP extracts from attacked image, we...

10.1109/icip46576.2022.9897870 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2022-10-16

Service-oriented communication (SOC) is a new trend in the industry to enable through service-oriented architecture (SOA) and thereby package communications as services. In this paper, we propose Web service based open multimedia conferencing services on Internet, also introduce how implement Session Initiation Protocol (SIP). Especially, mainly focus Service model, design of call control state machine, signal flows for Business Process Execution Language (BPEL) orchestration, conference...

10.6138/jit.2011.12.6.02 article EN 網際網路技術學刊 2011-11-01

Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature during editing process. Although existing traditional display a certain level of security and embedding capacity, they lack adequate robustness against common distortions in online social networks (OSNs). In this paper, introduce end-to-end robust generative network (RoGVS), which achieves visual by videos...

10.48550/arxiv.2401.00652 preprint EN cc-by arXiv (Cornell University) 2024-01-01

This paper introduces an innovative approach for signal reconstruction using data acquired through multi-input-multi-output (MIMO) sampling. First, we show that it is possible to perfectly reconstruct a set of periodic band-limited signals $\{x_r(t)\}_{r=1}^R$ from the samples $\{y_m(t)\}_{m=1}^M$, which are output MIMO system with inputs $\{x_r(t)\}_{r=1}^R$. Moreover, FFT-based algorithm designed perform efficiently. It demonstrated this encompasses FFT interpolation and multi-channel as...

10.48550/arxiv.2409.03768 preprint EN arXiv (Cornell University) 2024-08-21

Digital watermarking has demonstrated its effectiveness in protecting multimedia content. However, existing are predominantly tailored for specific media types, rendering them less effective the protection of content displayed on computer screens, which is often multimodal and dynamic. Visual Screen Content (VSC), particularly susceptible to theft leakage via screenshots, a vulnerability that current methods fail adequately address. To tackle these challenges, we propose ScreenMark, robust...

10.48550/arxiv.2409.03487 preprint EN arXiv (Cornell University) 2024-09-05

10.1016/j.geb.2024.12.003 article EN Games and Economic Behavior 2024-12-01

This paper illustrates the robust control laws for attitude of a class communication satellites that are equipped with large deployable antenna reflectors and solar arrays. A two-degree-of-freedom controller which consists static output feedback feedforward is designed this linear parameter varying system based on H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> theory. In order to reduce complexity controller, only one proposed...

10.1109/chicc.2016.7554292 article EN 2016-07-01

We study a general credence goods model with N problem types and treatments. Communication between the expert seller client is modeled as cheap talk. find that expert's equilibrium payoffs admit geometric characterization, described by quasiconcave envelope of his belief-based profits function under discriminatory pricing. establish existence client-worst equilibria, apply characterization to previous research on goods, provide necessary sufficient condition for when communication benefits...

10.48550/arxiv.2303.13295 preprint EN cc-by arXiv (Cornell University) 2023-01-01
Coming Soon ...