UM

Browse/Search Results:  1-10 of 78 Help

Selected(0)Clear Items/Page:    Sort:
Trails of Data: Three Cases for Collecting Web Information for Social Science Research Journal article
Social Science Computer Review, 2019
Authors:  Li,Fumin;  Zhou,Yisu;  Cai,Tianji
Favorite | View/Download:3/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2020/11/06
Apis  Data Collection  Headless Browser  Python  Reproducible Research  Web Scraping  
Chronological Age Estimation under the Guidance of Age-related Facial Attributes Journal article
IEEE Transactions on Information Forensics and Security, 2019,Page: 1-12
Authors:  Jiu-Cheng Xie;  Chi-Man Pun
Favorite | View/Download:26/0 | TC[WOS]:2 TC[Scopus]:5 | Submit date:2019/05/06
Chronological Age Estimation  Facial Attributes Estimation  Convolutional Neural Network  Controlled And Wild Environments  
Adaptive LSB quantum watermarking method using tri-way pixel value differencing Journal article
QUANTUM INFORMATION PROCESSING, 2019,Volume: 18,Issue: 2
Authors:  Luo, Gaofeng;  Zhou, Ri-Gui;  Luo, Jia;  Hu, WenWen;  Zhou, Yang;  Ian, Hou
Favorite | View/Download:8/0 | TC[WOS]:4 TC[Scopus]:5 | Submit date:2019/01/17
Quantum image watermarking  Pixel value difference  Least significant bit  Visual quality  
Standing out from the crowd – An investigation of the signal attributes of Airbnb listings Journal article
International Journal of Contemporary Hospitality Management, 2019,Volume: 32
Authors:  Bin Yao;  Richard T.R. Qiu;  Daisy X.F. Fan;  Anyu Liu;  Dimitrios Buhalis
View | Adobe PDF | Favorite | View/Download:284/30 | TC[WOS]:0 TC[Scopus]:10 | Submit date:2019/09/10
Signaling Theory  Big Data  Airbnb  Binomial Logistic Model  Booking Probability  Sequential Bayesian Updating  Sharing Economy  
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite | View/Download:14/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Reversible image watermarking using prediction value computation with gradient analysis Conference paper
Proceedings of the ACM Conference on Computer and Communications Security, Toronto, Canada, October 15 - 19, 2018
Authors:  Jiang Z.;  Pun C.-M.
Favorite | View/Download:15/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/14
Gradient Analysis  Prediction Value  Reversible Watermarking  Two-step Embedding  
Optimal LSBs-based quantum watermarking with lower distortion Journal article
International Journal of Quantum Information, 2018,Volume: 16,Issue: 7
Authors:  Zhou R.-G.;  Hu W.W.;  Luo G.F.;  Fan P.;  Ian H.
Favorite | View/Download:5/0 | TC[WOS]:3 TC[Scopus]:4 | Submit date:2019/04/08
computational complexity  LSBs steganography  optimal LSBs based  Quantum watermarking  visual effect  
Abusive Supervision and Well-Being of Filipino Migrant Workers in Macau: Consequences for Self-Esteem and Heritage Culture Detachment Journal article
Social Indicators Research, 2018,Volume: 139,Issue: 1,Page: 277-292
Authors:  Bernardo,Allan B.I.;  Daganzo,Mary Angeline A.;  Ocampo,Anna Carmella G.
Favorite | View/Download:12/0 | TC[WOS]:4 TC[Scopus]:5 | Submit date:2019/07/07
Abusive Supervision  Acculturation  Heritage Culture Rejection  Migrant Workers  Well-being  
Optimized and frequent subgraphs: How are they related? Journal article
IEEE Access, 2018,Volume: 6,Page: 37237-37249
Authors:  Rehman S.U.;  Asghar S.;  Fong S.J.
Favorite | View/Download:8/0 | TC[WOS]:0 TC[Scopus]:3 | Submit date:2019/02/13
Data mining  frequent subgraph patterns  graph pattern mining  optimized graph patterns  social network analysis  
Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 64,Page: 78-88
Authors:  Yi, Shuang;  Zhou, Yicong;  Hua, Zhongyun
Favorite | View/Download:27/0 | TC[WOS]:23 TC[Scopus]:32 | Submit date:2018/10/30
Reversible Data Hiding  Encrypted Images  Adaptive Embedding  Block-level Prediction-error Expansion