default search action
Chuntao Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Qingwen Guo, Chuntao Wang, Deqin Xiao, Qiong Huang:
A lightweight open-world pest image classifier using ResNet8-based matching network and NT-Xent loss function. Expert Syst. Appl. 237(Part A): 121395 (2024) - [j31]Mouke Mo, Chuntao Wang, Qingwen Guo, Shan Bian, Qiong Huang, Xinpeng Zhang:
A novel robust black-box fingerprinting scheme for deep classification neural networks. Expert Syst. Appl. 252: 124201 (2024) - [j30]Yichao Tang, Kangshun Li, Chuntao Wang, Shan Bian, Qiong Huang:
A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity. Inf. Sci. 654: 119786 (2024) - [j29]Junxiang Wang, Ying Zhang, Lin Huang, Chuntao Wang, Jiangqun Ni:
Reversible data hiding in enhanced images with anti-detection capability. Multim. Tools Appl. 83(4): 9853-9872 (2024) - [j28]Mouke Mo, Chuntao Wang, Shan Bian:
A Unique Identification-Oriented Black-Box Watermarking Scheme for Deep Classification Neural Networks. Symmetry 16(3): 299 (2024) - [j27]Yichao Tang, Chuntao Wang, Shijun Xiang, Yiu-Ming Cheung:
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding. IEEE Trans. Inf. Forensics Secur. 19: 4114-4129 (2024) - 2023
- [j26]Qingwen Guo, Chuntao Wang, Deqin Xiao, Qiong Huang:
A novel multi-label pest image classifier using the modified Swin Transformer and soft binary cross entropy loss. Eng. Appl. Artif. Intell. 126: 107060 (2023) - [j25]Ying Li, Shan Bian, Chuntao Wang, Kemal Polat, Adi Alhudhaif, Fayadh Alenezi:
Exposing low-quality deepfake videos of Social Network Service using Spatial Restored Detection Framework. Expert Syst. Appl. 231: 120646 (2023) - [j24]Yichao Tang, Shuai Wang, Chuntao Wang, Shijun Xiang, Yiu-Ming Cheung:
A Highly Robust Reversible Watermarking Scheme Using Embedding Optimization and Rounded Error Compensation. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1593-1609 (2023) - [j23]Chuntao Wang, Juan Hu, Shan Bian, Jiangqun Ni, Xinpeng Zhang:
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4322-4336 (2023) - [j22]Chuntao Wang, Tianjian Zhang, Hao Chen, Qiong Huang, Jiangqun Ni, Xinpeng Zhang:
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network. IEEE Trans. Multim. 25: 4026-4040 (2023) - [c14]Pengcheng Dong, Chuntao Wang, Zhenyong Lu, Kai Zhang, Wenbo Wan, Jiande Sun:
S-Feature Pyramid Network and Attention Model for Drone Detection. ICASSP 2023: 1-2 - [c13]Chuntao Wang, Pengcheng Dong, Jiande Sun, Zhenyong Lu, Kai Zhang, Wenbo Wan:
S-Feature Pyramid Network and Attention Module For Small Object Detection. ICASSP Workshops 2023: 1-5 - 2022
- [j21]Xue Zhang, Xiushan Nie, Ziruo Sun, Xiaofeng Li, Chuntao Wang, Peng Tao, Sumaira Hussain:
Re-ranking vehicle re-identification with orientation-guide query expansion. Int. J. Distributed Sens. Networks 18(3): 155014772110663 (2022) - [j20]Yuanhang Huang, Shan Bian, Haodong Li, Chuntao Wang, Kangshun Li:
DS-UNet: A dual streams UNet for refined image forgery localization. Inf. Sci. 610: 73-89 (2022) - [j19]Qinghua Luo, Xiaozhen Yan, Chenxu Wang, Yang Shao, Zhiquan Zhou, Jianfeng Li, Cong Hu, Chuntao Wang, Jinfeng Ding:
A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter. J. Cloud Comput. 11: 18 (2022) - 2021
- [j18]Chuntao Wang, Renxin Liang, Shancheng Zhao, Shan Bian, Zhimao Lai:
Enhancing Performance of Lossy Compression on Encrypted Gray Images through Heuristic Optimization of Bitplane Allocation. Symmetry 13(12): 2338 (2021) - 2020
- [j17]Chuntao Wang, Tianzheng Li, Jiangqun Ni, Qiong Huang:
A New MRF-Based Lossy Compression for Encrypted Binary Images. IEEE Access 8: 11328-11341 (2020) - [j16]Weili Wang, Chuntao Wang, Junxiang Wang, Shan Bian, Qiong Huang:
Improving Multi-Histogram-Based Reversible Watermarking Using Optimized Features and Adaptive Clustering Number. IEEE Access 8: 134334-134350 (2020) - [j15]Xiaozhen Yan, Pengtai Zhou, Qinghua Luo, Chuntao Wang, Jinfeng Ding, Cong Hu:
UAM-RDE: an uncertainty analysis method for RSSI-based distance estimation in wireless sensor networks. Neural Comput. Appl. 32(17): 13701-13714 (2020) - [j14]Weili Wang, Chuntao Wang, Hongchang Zheng, Junxiang Wang, Deqin Xiao:
An improved reversible watermarking scheme using weighted prediction and watermarking simulation. Signal Process. Image Commun. 81 (2020) - [c12]Qinghua Luo, Chunyu, Xiaozhen Yan, Cong Hu, Chuntao Wang, Jinfeng Ding:
Accurate Underwater Localization Through Phase Difference. SmartIoT 2020: 38-42
2010 – 2019
- 2019
- [j13]Junxiang Wang, Ningxiong Mao, Xin Chen, Jiangqun Ni, Chuntao Wang, Yunqing Shi:
Multiple histograms based reversible data hiding by using FCM clustering. Signal Process. 159: 193-203 (2019) - [j12]Hongchang Zheng, Chuntao Wang, Junxiang Wang, Shijun Xiang:
A new reversible watermarking scheme using the content-adaptive block size for prediction. Signal Process. 164: 74-83 (2019) - 2018
- [j11]Chuntao Wang, Deqing Xiao, Hongxing Peng, Rongyue Zhang:
A lossy compression scheme for encrypted images exploiting Cauchy distribution and weighted rate distortion optimization. J. Vis. Commun. Image Represent. 51: 122-130 (2018) - [j10]Chuntao Wang, Jiangqun Ni, Xinpeng Zhang, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. IEEE Trans. Inf. Forensics Secur. 13(5): 1271-1285 (2018) - 2015
- [j9]Chuntao Wang, Jiangqun Ni, Qiong Huang:
A new encryption-then-compression algorithm using the rate-distortion optimization. Signal Process. Image Commun. 39: 141-150 (2015) - [j8]Chang Wang, Jiangqun Ni, Chuntao Wang:
New Distortion Metric for Efficient JPEG Steganography Using Linear Prediction. J. Signal Process. Syst. 81(3): 389-400 (2015) - [c11]Chuntao Wang, Jiangqun Ni:
Compressing Encrypted Images Using the Integer Lifting Wavelet. IIH-MSP 2015: 409-412 - 2013
- [j7]Chuntao Wang, Jiangqun Ni, Dong Zhang:
Counteracting geometrical attacks on robust image watermarking by constructing a deformable pyramid transform. EURASIP J. Adv. Signal Process. 2013: 119 (2013) - [j6]Yun Liang, Zhuo Su, Chuntao Wang, Dong Wang, Xiaonan Luo:
Optimised image retargeting using aesthetic-based cropping and scaling. IET Image Process. 7(1): 61-69 (2013) - 2012
- [j5]Chang Wang, Jiangqun Ni, Chuntao Wang, Ruiyu Zhang:
An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients. Int. J. Digit. Crime Forensics 4(2): 13-27 (2012) - [j4]Goo-Rak Kwon, Chuntao Wang, Shiguo Lian, Suk-Seung Hwang:
Advanced partial encryption using watermarking and scrambling in MP3. Multim. Tools Appl. 59(3): 885-895 (2012) - [j3]Chuntao Wang, Jiangqun Ni, Jiwu Huang:
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. Inf. Forensics Secur. 7(3): 853-867 (2012) - 2010
- [c10]Chuntao Wang, Jiangqun Ni, Huashuo Zhuo, Jiwu Huang:
A geometrically resilient robust image watermarking scheme using deformable multi-scale transform. ICIP 2010: 3677-3680
2000 – 2009
- 2009
- [j2]Chuntao Wang, Jin-Hyung Kim, Keun-Yung Byun, Jiangqun Ni, Sung-Jea Ko:
Robust digital image stabilization using the Kalman filter. IEEE Trans. Consumer Electron. 55(1): 6-14 (2009) - 2008
- [j1]Chuntao Wang, Jiangqun Ni, Rongyue Zhang, Goo-Rak Kwon, Sung-Jea Ko:
Content-Adaptive Robust Image Watermarking with Posterior HMM-Based Detector. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(8): 1953-1960 (2008) - [c9]Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim:
Watermarking Security Incorporating Natural Scene Statistics. Information Hiding 2008: 132-146 - 2007
- [c8]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang, Meiying Huang:
A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking. ICASSP (2) 2007: 181-184 - [c7]Chuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang:
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. Information Hiding 2007: 65-79 - [c6]Linna Tang, Jiangqun Ni, Chuntao Wang, Rongyue Zhang:
A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images. IWDW 2007: 382-394 - 2006
- [c5]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang:
Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach. ICIP 2006: 1377-1380 - [c4]Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang, Hongmei Liu:
Robust Audio Watermarking Based on Low-Order Zernike Moments. IWDW 2006: 226-240 - [c3]Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang, Quanbo Li:
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. IWDW 2006: 446-460 - 2005
- [c2]Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang:
A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. IWDW 2005: 110-123 - [c1]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang:
A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template. KES (1) 2005: 1233-1239
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint