Jia Chen

ORCID: 0000-0002-8049-4893
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Mathematical Approximation and Integration
  • Visual Attention and Saliency Detection
  • Advanced Neural Network Applications
  • Multimodal Machine Learning Applications
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Advanced Image and Video Retrieval Techniques
  • Distributed and Parallel Computing Systems
  • Intelligent Tutoring Systems and Adaptive Learning
  • Gait Recognition and Analysis
  • Online Learning and Analytics
  • Human Motion and Animation
  • Time Series Analysis and Forecasting
  • Advanced Data Compression Techniques
  • Safety and Risk Management
  • Medical Image Segmentation Techniques
  • Biometric Identification and Security
  • Advanced Image Fusion Techniques
  • Domain Adaptation and Few-Shot Learning
  • Data Visualization and Analytics

Shanxi Datong University
2024

Changchun University of Technology
2023

Communication University of China
2023

National University of Defense Technology
2021-2023

University of Science and Technology Beijing
2022

Central China Normal University
2022

University of Electronic Science and Technology of China
2022

Anhui University
2022

The University of Texas at Austin
2018

Chinese Academy of Medical Sciences & Peking Union Medical College
2017

We describe a new blackbox complexity testing technique for determining the worst-case asymptotic of given application. The key idea is to look an input pattern —rather than concrete input— that maximizes resource usage target program. Because patterns can be described concisely as programs in restricted language, our method transforms problem optimal program synthesis. In particular, we express these using model computation called Recurrent Computation Graph (RCG) and solve synthesis by...

10.1145/3236024.3236039 article EN 2018-10-26

Functional regression models represent a crucial research area within functional data analysis. To enhance the flexibility of model, this paper proposes partial linear model based on ensemble learning and kernel techniques. On one hand, method effectively relationship between non-linear predictor variables scalar response by employing Reproducing Kernel Hilbert Space. other it utilizes Principal Component Analysis to approximate estimate variables, addresses selection truncation numbers...

10.54097/pt6gjr59 article EN Highlights in Science Engineering and Technology 2025-05-23

Medical image segmentation plays an important role in clinical diagnosis, quantitative analysis, and treatment process. Since 2015, U-Net-based approaches have been widely used for medical segmentation. The purpose of the U-Net expansive path is to map low-resolution encoder feature maps full input resolution maps. However, consecutive deconvolution convolutional operations lead loss some high-level information. More information can make more accurate. In this paper, we propose MU-Net, a...

10.32604/cmes.2022.018565 article EN Computer Modeling in Engineering & Sciences 2022-01-01

We investigate \texorpdfstring{$L_2$}{}-approximation problems in the worst case setting weighted Hilbert spaces \texorpdfstring{$H(K_{R_{d,\a,\g}})$}{} with weights \texorpdfstring{$R_{d,\a,{\bm \ga}}$}{} under parameters \texorpdfstring{$1\ge \ga_1\ge \ga_2\ge \cdots\ge 0$ and $1<\az_1\le \az_2\le \cdots$}{}. Several interesting appear this paper. consider error of algorithms that use finitely many arbitrary continuous linear functionals. Multivariate approximation; information...

10.20944/preprints202312.2272.v1 preprint EN 2024-01-02

Massive open online courses (MOOCs) provide learners with high-quality learning resources, but drop out frequently. Learners' concerns (e.g. the topics in course content or logistics) and cognitive engagement patterns tentative certain) are considered essential factors affecting learners' completions. However, it is still unclear what different achievement groups focus on each pattern. In this study, we adopted an unsupervised computational model, temporal topic model (TCTM), to...

10.1080/10494820.2022.2063904 article EN Interactive Learning Environments 2022-04-21

Accurately assessing image quality is a challenging task, especially without reference image. Currently, most of the no-reference assessment methods still require images in training stage, but are usually not available real scenes. In this paper, we proposed model named MSIQA inspired by biological vision and convolution neural network (CNN), which does testing phases. The contains two modules, multi-scale contour prediction that simulates response human optic nerve to at different...

10.3390/app12062833 article EN cc-by Applied Sciences 2022-03-10

With the widespread use of WeChat Mini Programs, their security has attracted more and attention. The Program can be accessed by scanning a code. We should protect code thus to Program. In this paper, based on studying function in each pattern codes, visual secret sharing (VSS) scheme for codes (MPCVSS) with (n,n)(n≥4) threshold is proposed control identify users MPCVSS combines error-correcting characteristic theory VSS. A shared into n slightly modified from cover codes. Each valid that...

10.1016/j.jvcir.2021.103409 article EN cc-by-nc-nd Journal of Visual Communication and Image Representation 2022-01-01

In some particular scenes, the shadows need to be given different weights represent participants’ status or importance. And during reconstruction, participants with obtain various quality reconstructed images. However, existing schemes based on visual secret sharing (VSS) and Chinese remainder theorem (CRT) have disadvantages. this paper, we propose a weighted polynomial-based SIS scheme in field of GF (257). We use <a:math xmlns:a="http://www.w3.org/1998/Math/MathML" id="M1"> <a:mfenced...

10.1155/2021/5597592 article EN cc-by Security and Communication Networks 2021-05-25

The proliferation of fake video poses a significant threat to the authority and authenticity news across multiple domains. most existing methods deepfake detection primarily focus on identifying face as whole in video, ignoring correlation between facial components. However, our investigation indicates that constituent potions have different effects detection. To address this issue, we divided frame into several regions explored relationship these regions. Our approach involves constructing...

10.1109/swc57546.2023.10449093 article EN 2023-08-28

Text-to-image generation systems have emerged as revolutionary tools in the realm of artistic creation, offering unprecedented ease transforming textual prompts into visual art. However, efficacy these is intricately linked to quality user-provided prompts, which often poses a challenge users unfamiliar with prompt crafting. This paper addresses this by leveraging user reformulation data from interaction logs develop an automatic model. Our in-depth analysis reveals that heavily dependent on...

10.48550/arxiv.2403.19716 preprint EN arXiv (Cornell University) 2024-03-27

In this letter, a physical unclonable function (PUF)-advanced encryption standard (AES)-PUF is proposed as new PUF architecture by embedding an AES cryptographic circuit between two conventional circuits to conceal their challenge-to-response pairs (CRPs) against machine learning attacks. Moreover, internal confidential data added the secret key of in update real-time side-channel As shown results, even if 1 million number are enabled adversary implement or attacks, can not be cracked. By...

10.48550/arxiv.1810.07250 preprint EN other-oa arXiv (Cornell University) 2018-01-01

&lt;abstract&gt;&lt;p&gt;JPEG is the most common format for storing and transmitting photographic images on social network platforms. JPEG image widely used in people's life because of their low storage space high visual quality. Secret sharing (SIS) technology important to protect data. Traditional SIS schemes generally focus spatial images, however there little research frequency domain images. In addition, current tiny only focuses with a compression quality factor ($ QF $) $ 100 $. To...

10.3934/mbe.2022538 article EN cc-by Mathematical Biosciences & Engineering 2022-01-01

Secret image sharing (SIS) has received increased attention from the research community because of its usefulness in multiparty secure computing, access control, blockchain distributive storage and other security-oriented applications. Prevention fake dishonest participants is a key issue that spurred interest practical applications SIS. Unfortunately, most previous SIS schemes failed to detect locate or participants. In this article, an for ( k,n )-threshold without pixel expansion...

10.1145/3572842 article EN ACM Transactions on Multimedia Computing Communications and Applications 2022-11-24

A mini program code (also known as sunflower code) comes with WeChat APPs. With the popularization of APPs, codes have become more and widely used. As a new carrier, study information hiding technology based on is great significance for expansion covert communication carriers can also deal security problems in advance. At present, to best our knowledge, there no steganographic research codes. In this paper, we propose scheme embed secret into first time. After studying construction codes,...

10.1155/2021/5546344 article EN cc-by Security and Communication Networks 2021-05-24

In some particular situations, participants need to recover different secrets both within a group (i.e., intragroup) and between two groups intergroup). However, most of the existing multilevel secret sharing (MLSS) multigroup (MGSS) schemes mainly focus on how protect one or more groups. this paper, we propose polynomial-based scheme share multiple images The random elements’ utilization model integer linear programming is used find polynomial coefficients that meet certain conditions so...

10.1155/2021/9960998 article EN Security and Communication Networks 2021-07-02

In order to develop the self-service query system for large city in China, key part is suitable mathematical models and good algorithms system. At first, we give out background of problem analyze vital factors process solving problem. Based on data about shortest path adjacent matrix graph theory, set up multi-objective programming where three important are crucial which cost, time transfer number. Then two different cases, put forward corresponding fine algorithms. Numerical results show...

10.1109/bcgin.2013.231 article EN International Conference on Business Computing and Global Informatization 2013-09-13
Coming Soon ...