- Image and Signal Denoising Methods
- Digital Media Forensic Detection
- Mathematical Analysis and Transform Methods
- Advanced Steganography and Watermarking Techniques
- Nonlinear Waves and Solitons
- Digital Filter Design and Implementation
- Game Theory and Applications
- Generative Adversarial Networks and Image Synthesis
- Advanced Image Processing Techniques
- Game Theory and Voting Systems
- Nonlinear Photonic Systems
- E-commerce and Technology Innovations
- Medical Image Segmentation Techniques
- Spam and Phishing Detection
- Sparse and Compressive Sensing Techniques
- Blind Source Separation Techniques
- Advanced Differential Geometry Research
- Image Processing Techniques and Applications
- Topic Modeling
- Misinformation and Its Impacts
- Advanced Fiber Laser Technologies
- Multimedia Communication and Technology
- Adversarial Robustness in Machine Learning
- Power Transformer Diagnostics and Insulation
- Thermodynamic and Exergetic Analyses of Power and Cooling Systems
Fudan University
2022-2023
Nanchang Institute of Science & Technology
2022-2023
Nanchang University
2023
Wenzhou Medical University
2013-2022
First Affiliated Hospital of Wenzhou Medical University
2020-2022
Shanghai Electric (China)
2021-2022
Sichuan University
2020
West China Hospital of Sichuan University
2020
Shanghai University
2019
Tianjin Chengjian University
2018
Previous researches on multimedia fake news detection include a series of complex feature extraction and fusion networks to gather useful information from the news. However, how cross-modal consistency relates fidelity features different modalities affect decision-making are still open questions. This paper presents novel scheme Bootstrapping Multi-view Representations (BMR) for detection. Given multi-modal news, we extract representations respectively views text, image pattern semantics....
Digital watermarking has shown its effectiveness in protecting multimedia content. However, existing is predominantly tailored for specific media types, rendering them less effective the protection of content displayed on computer screens, which often multi-modal and dynamic. Visual Screen Content (VSC), particularly susceptible to theft leakage through screenshots, a vulnerability that current methods fail adequately address. To address these challenges, we propose ScreenMark, robust...
The quaternion Fourier transform (QFT) is one of the key tools in studying color image processing. Indeed, a deep understanding QFT has created images to be transformed as whole, rather than separated component. In addition, paves way for other integral transform, such fractional linear canonical and Wigner–Ville distribution. aim this paper twofold: first provide some theoretical background regarding bound variation function. We then apply it derive inversion formulas. Secondly, tuition how...
Quaternion analytic signal is regarded as a generalization of from 1D to 4D space. It defined by an original with its quaternion partial and total Hilbert transforms. The provides the features representation, such local amplitude phase angle, latter includes structural information signal. aim present study twofold. Firstly, it attempts analyze Plemelj‐Sokhotzkis formula associated Fourier transform linear canonical transform. With these formulae, we show that signals are boundary values...
The specific role of the corticospinal tract with respect to inattention and impulsive symptoms in children attention-deficit/hyperactivity disorder (ADHD) has been explored past. However, our knowledge, no study identified exact regions that are affected ADHD. We aimed determine comprehensive alterations white matter microstructure underlying neuropsychological substrates ADHD.We recruited 38 drug-naïve ADHD 34 typically developing controls. employed a tract-based quantitative approach...
RAW files are the initial measurement of scene radiance widely used in most cameras, and ubiquitously-used RGB images converted from data through Image Signal Processing (ISP) pipelines. Nowadays, digital risky being nefariously manipulated. Inspired by fact that innate immunity is first line body defense, we propose DRAW, a novel scheme defending against manipulation protecting their sources, i.e., camera-shooted RAWs. Specifically, design lightweight Multi-frequency Partial Fusion Network...
Image cropping can be maliciously used to manipulate the layout of an image and alter underlying meaning. Previous detection schemes only predict whether has been cropped, ignoring which part is cropped. This paper presents a novel robust watermarking network for localization. We train anti-cropping processor (ACP) that embeds watermark into target image. The visually indistinguishable protected then posted on social instead original At recipient's side, ACP extracts from attacked image, we...
Service-oriented communication (SOC) is a new trend in the industry to enable through service-oriented architecture (SOA) and thereby package communications as services. In this paper, we propose Web service based open multimedia conferencing services on Internet, also introduce how implement Session Initiation Protocol (SIP). Especially, mainly focus Service model, design of call control state machine, signal flows for Business Process Execution Language (BPEL) orchestration, conference...
Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature during editing process. Although existing traditional display a certain level of security and embedding capacity, they lack adequate robustness against common distortions in online social networks (OSNs). In this paper, introduce end-to-end robust generative network (RoGVS), which achieves visual by videos...
This paper introduces an innovative approach for signal reconstruction using data acquired through multi-input-multi-output (MIMO) sampling. First, we show that it is possible to perfectly reconstruct a set of periodic band-limited signals $\{x_r(t)\}_{r=1}^R$ from the samples $\{y_m(t)\}_{m=1}^M$, which are output MIMO system with inputs $\{x_r(t)\}_{r=1}^R$. Moreover, FFT-based algorithm designed perform efficiently. It demonstrated this encompasses FFT interpolation and multi-channel as...
Digital watermarking has demonstrated its effectiveness in protecting multimedia content. However, existing are predominantly tailored for specific media types, rendering them less effective the protection of content displayed on computer screens, which is often multimodal and dynamic. Visual Screen Content (VSC), particularly susceptible to theft leakage via screenshots, a vulnerability that current methods fail adequately address. To tackle these challenges, we propose ScreenMark, robust...
This paper illustrates the robust control laws for attitude of a class communication satellites that are equipped with large deployable antenna reflectors and solar arrays. A two-degree-of-freedom controller which consists static output feedback feedforward is designed this linear parameter varying system based on H <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">∞</sub> theory. In order to reduce complexity controller, only one proposed...
We study a general credence goods model with N problem types and treatments. Communication between the expert seller client is modeled as cheap talk. find that expert's equilibrium payoffs admit geometric characterization, described by quasiconcave envelope of his belief-based profits function under discriminatory pricing. establish existence client-worst equilibria, apply characterization to previous research on goods, provide necessary sufficient condition for when communication benefits...