UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Knowledge Distillation with Attention for Deep Transfer Learning of Convolutional Networks Journal article
ACM Transactions on Knowledge Discovery from Data, 2021,Volume: 16,Issue: 3,Page: 42:1-42:20
Authors:  Xingjian Li;  Haoyi Xiong;  Zeyu Chen;  Jun Huan;  Ji Liu;  Cheng-Zhong Xu;  Dejing Dou
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/22
Trasfer Learning  Framework  Algorithms  Knowledge Distillation  
A survey of orthogonal moments for image representation: Theory, implementation, and evaluation Journal article
ACM Computing Surveys, 2021,Volume: 55,Issue: 1,Page: 1-35
Authors:  Shuren Qi;  Yushu Zhang;  Chao Wang;  Jiantao Zhou;  Xiaochun Cao
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:8 | Submit date:2022/07/07
Deep Unsupervised Self-Evolutionary Hashing for Image Retrieval Journal article
IEEE Transactions on Multimedia, 2021,Volume: 23,Page: 3400-3413
Authors:  Zhang, Haofeng;  Gu, Yifan;  Yao, Yazhou;  Zhang, Zheng;  Liu, Li;  Zhang, Jian;  Shao, Ling
Favorite |  | TC[WOS]:4 TC[Scopus]:3 | Submit date:2022/05/13
Deep unsupervised hashing  image retrieval  self-evolutionary learning  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Conference paper
10th IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China, 2018-12
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite |  | TC[WOS]:17 TC[Scopus]:21 | Submit date:2019/07/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 9,Page: 2144-2158
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite |  | TC[WOS]:17 TC[Scopus]:21 | Submit date:2018/10/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Yifeng Zheng;  Helei Cui;  Cong Wang;  Jiantao Zhou
Adobe PDF | Favorite |  | TC[WOS]:26 TC[Scopus]:31 | Submit date:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security  
Adaptive local feature based multi-scale image hashing for robust tampering detection Conference paper
IEEE Region 10 Annual International Conference, Proceedings/TENCON, Macao, China, 1-4 Nov. 2015
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/14
Adaptive Local Feature Extraction  Location-context Information  Multi-scale Image Hashing  Tampering Detection  
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite |  | TC[WOS]:47 TC[Scopus]:52 | Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection