Robust image hash in Radon transform domain for authentication Y Lei, Y Wang, J Huang Signal Processing: Image Communication 26 (6), 280-288, 2011 | 148 | 2011 |
SDD-FIQA: Unsupervised face image quality assessment with similarity distribution distance FZ Ou, X Chen, R Zhang, Y Huang, S Li, J Li, Y Li, L Cao, YG Wang Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 133 | 2021 |
A novel blind image quality assessment method based on refined natural scene statistics FZ Ou, YG Wang, G Zhu 2019 IEEE International Conference on Image Processing (ICIP), 1004-1008, 2019 | 74 | 2019 |
Video sequence matching based on the invariance of color correlation Y Lei, W Luo, Y Wang, J Huang IEEE transactions on circuits and systems for video technology 22 (9), 1332-1343, 2012 | 54 | 2012 |
Security Analysis on Spatial 1 Steganography for JPEG Decompressed Images W Luo, Y Wang, J Huang IEEE Signal Processing Letters 18 (1), 39-42, 2010 | 49 | 2010 |
A novel rank learning based no-reference image quality assessment method FZ Ou, YG Wang, J Li, G Zhu, S Kwong IEEE Transactions on Multimedia 24, 4197-4211, 2021 | 41 | 2021 |
Transportation spherical watermarking YG Wang, G Zhu, YQ Shi IEEE Transactions on Image Processing 27 (4), 2063-2077, 2018 | 39 | 2018 |
A study on the security levels of spread-spectrum embedding schemes in the WOA framework YG Wang, G Zhu, S Kwong, YQ Shi IEEE Transactions on Cybernetics 48 (8), 2307-2320, 2017 | 33 | 2017 |
Detection of quantization artifacts and its applications to transform encoder identification W Luo, Y Wang, J Huang IEEE Transactions on Information Forensics and Security 5 (4), 810-815, 2010 | 29 | 2010 |
StarVQA: Space-time attention for video quality assessment F Xing, YG Wang, H Wang, L Li, G Zhu 2022 IEEE International Conference on Image Processing (ICIP), 2326-2330, 2022 | 26 | 2022 |
Robust dual watermarking algorithm for AVS video YG Wang, ZM Lu, L Fan, Y Zheng Signal Processing: Image Communication 24 (4), 333-344, 2009 | 21 | 2009 |
Query-efficient adversarial attack based on Latin hypercube sampling D Wang, J Lin, YG Wang 2022 IEEE International Conference on Image Processing (ICIP), 546-550, 2022 | 15 | 2022 |
A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition Z Liu, G Zhu, YG Wang, J Yang, S Kwong ACM Transactions on Multimedia Computing Communications and Applications 16 …, 2020 | 15 | 2020 |
Vulnerabilities in video quality assessment models: The challenge of adversarial attacks A Zhang, Y Ran, W Tang, YG Wang Advances in Neural Information Processing Systems 36, 2024 | 14 | 2024 |
Superiority combination learning distributed particle swarm optimization for large-scale optimization ZJ Wang, Q Yang, YH Zhang, SH Chen, YG Wang Applied Soft Computing 136, 110101, 2023 | 14 | 2023 |
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism W Tang, B Li, W Li, YG Wang, J Huang SCIENCE CHINA Information Sciences, 1-15, 2022 | 14 | 2022 |
Cross-shaped Adversarial Patch Attack Y Ran, W Wang, M Li, LC Li, YG Wang, J Li IEEE Transactions on Circuits and Systems for Video Technology, 2023 | 12 | 2023 |
A study on the collusion security of LUT-based client-side watermark embedding YG Wang, D Xie, BB Gupta IEEE Access 6, 15816-15822, 2018 | 12 | 2018 |
An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy YG Wang, G Zhu Information Sciences 316, 40-53, 2015 | 12 | 2015 |
关联规则在课程相关性模式中的研究与应用 王员根, 李爱凤 现代计算机, 79-82, 2007 | 12 | 2007 |