×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [8]
Authors
PUN CHI MAN [4]
ZHOU JIANTAO [3]
YIBO BOB ZHANG [1]
Document Type
Journal article [6]
Conference paper [3]
Date Issued
2022 [3]
2020 [1]
2017 [4]
2016 [1]
Language
英語English [8]
Source Publication
IEEE Access [1]
IEEE TRANSACTION... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
International Jo... [1]
More...
Indexed By
SCIE [6]
SSCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-9 of 9
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Author Ascending
Author Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Issue Date Ascending
Issue Date Descending
Robust Image Forgery Detection over Online Social Network Shared Images
Conference paper
New Orleans, Louisiana, 2022-07-19
Authors:
Haiwei Wu
;
Jiantao Zhou
;
Jinyu Tian
;
Jun Liu
Adobe PDF
|
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2022/07/07
IID-Net: Image Inpainting Detection Network via Neural Architecture Search and Attention
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 3,Page: 1172-1185
Authors:
Wu, Haiwei
;
Zhou, Jiantao
Adobe PDF
|
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2022/03/28
Deep Neural Networks
Generalizability
Inpainting Forensics
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
Journal article
IEEE Transactions on Cloud Computing, 2022,Volume: 10,Issue: 2,Page: 1215-1232
Authors:
Gu, Ke
;
Dong, Xin Ying
;
Jia, Wei Jia
Favorite
|
|
TC[WOS]:
14
TC[Scopus]:
8
|
Submit date:2022/08/05
data security
fog computing
Malicious node
reputation
VANETs
A novel visual analysis method of food safety risk traceability based on blockchain
Journal article
International Journal of Environmental Research and Public Health, 2020,Volume: 17,Issue: 7
Authors:
Hao,Zhihao
;
Mao,Dianhui
;
Zhang,Bob
;
Zuo,Min
;
Zhao,Zhihua
Favorite
|
|
TC[WOS]:
16
TC[Scopus]:
24
|
Submit date:2021/03/11
Blockchain
Food Safety
Risk
Traceability
Visualization
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing
Conference paper
IEEE Transactions on Information Forensics and Security, Hong Kong, China, 2018-12
Authors:
Yan, Cai-Ping
;
Pun, Chi-Man
Favorite
|
|
TC[WOS]:
17
TC[Scopus]:
20
|
Submit date:2019/07/30
Image Hashing
Tamper Detection
Multi-scale Fusion
Manifold Ranking
Quaternion Fourier-mellin Moments
Quaternion Fourier Transform
Robust image hashing using progressive feature selection for tampering detection
Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:
Pun, Chi-Man
;
Yan, Cai-Ping
;
Yuan, Xiao-Chen
Favorite
|
|
TC[WOS]:
14
TC[Scopus]:
15
|
Submit date:2018/10/30
Robust Image Hashing
Progressive Feature Point Selection
Tampering Detection
Image Authentication
Horizontal Location-context Hashing (Hlch)
Vertical Location-context Hashing (Vlch)
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing
Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 9,Page: 2144-2158
Authors:
Yan, Cai-Ping
;
Pun, Chi-Man
Favorite
|
|
TC[WOS]:
17
TC[Scopus]:
20
|
Submit date:2018/10/30
Image Hashing
Tamper Detection
Multi-scale Fusion
Manifold Ranking
Quaternion Fourier-mellin Moments
Quaternion Fourier Transform
Segmentation-based Image Hash for Precise Tamper Localization
Conference paper
Proceedings of the World Congress on Internet Security, 2017, University of Cambridge, UK, 2017-12-11
Authors:
Yan, Cai-Ping
;
Pun, Chi-Man
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/05/24
A Review of Compressive Sensing in Information Security Field
Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:
YUSHU ZHANG
;
LEO YU ZHANG
;
JIANTAO ZHOU
;
LICHENG LIU
;
FEI CHEN
;
XING HE
Adobe PDF
|
Favorite
|
|
TC[WOS]:
128
TC[Scopus]:
141
|
Submit date:2019/04/16
Compressive Sensing
Theoretical Security
Application Security
Image Cipher
Chaos
Optics