UM

Browse/Search Results:  1-10 of 14 Help

Selected(0)Clear Items/Page:    Sort:
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Favorite |  | TC[WOS]:4 TC[Scopus]:4 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
Image reconstruction from local descriptors using conditional adversarial networks Conference paper
2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2019, Lanzhou, China, 18-21 Nov. 2019
Authors:  Haiwei Wu;  Jiantao Zhou;  Yuanman Li
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2021/03/11
Robust subspace clustering with independent and piecewise identically distributed noise modeling Conference paper
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15-20 June 2019
Authors:  Yuanman Li;  Jiantao Zhou;  Xianwei Zheng;  Jinyu Tian;  Yuan Yan Tang
Favorite |  | TC[WOS]:6 TC[Scopus]:7 | Submit date:2021/03/11
Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018,Volume: 14,Issue: 5,Page: 1307-1322
Authors:  Yuanman Li;  Jiantao Zhou
Favorite |  | TC[WOS]:26 TC[Scopus]:44 | Submit date:2019/04/16
Copy-move  Forgery Detection  Hierarchical Feature Matching  Iterative Localization  
SIFT Keypoint Removal via Directed Graph Construction for Color Images Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 12,Page: 2971-2985
Authors:  Yuanman Li;  Jiantao Zhou;  An Cheng
Favorite |  | TC[WOS]:10 TC[Scopus]:9 | Submit date:2018/10/30
Sift  Keypoint Removal  Directed Graph  Convex Optimization  
Image copy-move forgery detection using hierarchical feature point matching Conference paper
2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2016, Jeju, Korea (South), 13-16 Dec. 2016
Authors:  Yuanman Li;  Jiantao Zhou
Favorite |  | TC[WOS]:0 TC[Scopus]:7 | Submit date:2018/12/22
SIFT Keypoint Removal and Injection via Convex Relaxation Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 8,Page: 1722-1735
Authors:  Yuanman Li;  Jiantao Zhou;  An Cheng;  Xianming Liu;  Yuan Yan Tang
Favorite |  | TC[WOS]:12 TC[Scopus]:19 | Submit date:2018/12/22
Convex Optimization  Keypoint Injection  Keypoint Removal  Sift  
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, USA, 14-16 Dec. 2015
Authors:  Yunyu Li;  Jiantao Zhou;  Yuanman Li;  Oscar C. Au
Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2018/12/22
Ciphertext Expansion  Homomorphic Encryption  Linear Interpolation  
Secure and verifiable outsourcing of nonnegative matrix factorization (NMF) Conference paper
IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop, Vigo, Galicia, Spain, 6 20, 2016 - 6 22, 2016
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman
Favorite |  | TC[WOS]:0 TC[Scopus]:9 | Submit date:2018/11/06
Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion Conference paper
MM 2015 - Proceedings of the 2015 ACM Multimedia Conference, Brisbane, AUSTRALIA, OCT 26-30, 2015
Authors:  Yunyu Li;  Jiantao Zhou;  Yuanman Li
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2018/12/22
Image Homomorphic Encryption  Ciphertext Expansion  Ciphertextonly Attack