×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [6]
Authors
ZHOU JIANTAO [4]
CHEN CHUN LUNG P... [1]
PUN CHI MAN [1]
Document Type
Journal article [6]
Date Issued
2022 [1]
2018 [1]
2016 [3]
2012 [1]
Language
英語English [5]
Source Publication
IEEE Transaction... [3]
IEEE Access [1]
IEEE Communicati... [1]
IEEE TRANSACTION... [1]
Indexed By
SCIE [5]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-6 of 6
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Title Ascending
Title Descending
Submit date Ascending
Submit date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Issue Date Ascending
Issue Date Descending
Author Ascending
Author Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Robust Image Forgery Detection Against Transmission over Online Social Networks
Journal article
IEEE Transactions on Information Forensics and Security, 2022,Volume: 17,Page: 443-456
Authors:
Wu, Haiwei
;
Zhou, Jiantao
;
Tian, Jinyu
;
Liu, Jun
;
Qiao, Yu
Adobe PDF
|
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2022/05/17
Deep Neural Networks
Image Forgery Detection
Robustness
Social Networks
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching
Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018,Volume: 14,Issue: 5,Page: 1307-1322
Authors:
Yuanman Li
;
Jiantao Zhou
Adobe PDF
|
Favorite
|
|
TC[WOS]:
57
TC[Scopus]:
85
|
Submit date:2019/04/16
Copy-move
Forgery Detection
Hierarchical Feature Matching
Iterative Localization
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection
Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 12,Issue: 2,Page: 377-391
Authors:
Chi-Man Pun
;
Caiping Yan
;
Xiao-Chen Yuan
Favorite
|
|
TC[WOS]:
16
TC[Scopus]:
18
|
Submit date:2019/02/14
Image Alignment
Image Hashing
Multi-region Matching
Object-level Tampering Detection
A Review of Compressive Sensing in Information Security Field
Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:
YUSHU ZHANG
;
LEO YU ZHANG
;
JIANTAO ZHOU
;
LICHENG LIU
;
FEI CHEN
;
XING HE
Adobe PDF
|
Favorite
|
|
TC[WOS]:
128
TC[Scopus]:
141
|
Submit date:2019/04/16
Compressive Sensing
Theoretical Security
Application Security
Image Cipher
Chaos
Optics
SIFT Keypoint Removal and Injection via Convex Relaxation
Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 8,Page: 1722-1735
Authors:
Yuanman Li
;
Jiantao Zhou
;
An Cheng
;
Xianming Liu
;
Yuan Yan Tang
Adobe PDF
|
Favorite
|
|
TC[WOS]:
17
TC[Scopus]:
21
|
Submit date:2018/12/22
Convex Optimization
Keypoint Injection
Keypoint Removal
Sift
Cyber security and privacy issues in smart grids
Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:
Liu J.
;
Xiao Y.
;
Li S.
;
Liang W.
;
Chen C.L.P.
View
|
Adobe PDF
|
Favorite
|
|
TC[WOS]:
309
TC[Scopus]:
376
|
Submit date:2018/10/30
Accountability
Ami
Privacy
Scada
Security
Smart Grid