UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-10 of 25 Help

Filters                            
Selected(0)Clear Items/Page:    Sort:
Feature mapping of multiple beamformed sources for robust overlapping speech recognition using a microphone array Journal article
IEEE/ACM Transactions on Audio Speech and Language Processing, 2014,Volume: 22,Issue: 12,Page: 2244-2255
Authors:  Li W.;  Wang L.;  Zhou Y.;  Dines J.;  Magimai-Doss M.;  Bourlard H.;  Liao Q.
Favorite |  | TC[WOS]:7 TC[Scopus]:8 | Submit date:2018/12/21
Beamforming  Microphone Array  Neural Network  Speech Recognition  Speech Separation  
2D Sine Logistic modulation map for image encryption Journal article
Information Sciences, 2014,Volume: 297,Page: 80
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:310 TC[Scopus]:331 | Submit date:2018/10/30
2d Sine Logistic Modulation Map  Chaotic Magic Transform  Image Encryption  
Cascade Chaotic System with Applications Journal article
IEEE Transactions on Cybernetics, 2014,Volume: 45,Issue: 9,Page: 2001
Authors:  Zhou Y.;  Hua Z.;  Pun C.-M.;  Philip Chen C.L.
Favorite |  | TC[WOS]:110 TC[Scopus]:134 | Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
Spatial adjacent bag of features with multiple superpixels for object segmentation and classification Journal article
Information Sciences, 2014,Volume: 281,Page: 373-385
Authors:  Tao W.;  Zhou Y.;  Liu L.;  Li K.;  Sun K.;  Zhang Z.
Favorite |  | TC[WOS]:8 TC[Scopus]:13 | Submit date:2018/12/21
Multiple Segmentations  Object Recognition  Spatial Adjacent Bag Of Features  Superpixel Adjacent Histogram  
Person reidentification using quaternionic local binary pattern Conference paper
Proceedings - IEEE International Conference on Multimedia and Expo, Chengdu, PEOPLES R CHINA, JUL 14-18, 2014
Authors:  Lan R.;  Zhou Y.;  Tang Y.Y.;  Chen C.L.P.
Favorite |  | TC[WOS]:1 TC[Scopus]:16 | Submit date:2018/12/21
Feature Extraction  Local Binary Pattern  Person Reidentification  Quaternion  
A symmetric image cipher using wave perturbations Journal article
Signal Processing, 2014,Volume: 102,Page: 122-131
Authors:  Wu Y.;  Zhou Y.;  Agaian S.;  Noonan J.P.
Favorite |  | TC[WOS]:24 TC[Scopus]:24 | Submit date:2018/12/21
Data Protection  Image Shuffling  Symmetric Image Cipher  Wave Perturbation  
A new 1D parameter-control chaotic framework Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Francisco, CA, FEB 03-05, 2014
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:2 TC[Scopus]:4 | Submit date:2018/12/21
Chaotic Map  Framework  Parameter-control  
A new collage steganographic algorithm using cartoon design Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Francisco, CA, FEB 03-05, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Cartoon Design  Collage Steganography  Matrix Encoding  
Impulse noise removal using sparse representation with fuzzy weights Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Liu L.;  Philip Chen C.L.;  Zhou Y.;  Tang Y.Y.
Favorite |  | TC[WOS]:6 TC[Scopus]:6 | Submit date:2018/12/21
Image Denoising  Impulse Noise  Sparse Representation  Weighted Sparse-land Model  
A new reversible data hiding algorithm in the encryption domain Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Differential Attack  Encryption Domain  Reversible Data Hiding