default search action
Charles Boncelet
Person information
- affiliation: University of Delaware, Newark, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c32]Xinjie Lan, Bin Zhu, Charles Boncelet, Kenneth E. Barner:
Beyond the Bias Variance Trade-Off: A Mutual Information Trade-Off in Deep Learning. MLSP 2021: 1-6 - 2020
- [c31]Bin Zhu, Xinjie Lan, Xin Guo, Kenneth E. Barner, Charles Boncelet:
Multi-rate Attention Based GRU Model for Engagement Prediction. ICMI 2020: 841-848 - [c30]Xin Guo, Luisa F. Polanía, Bin Zhu, Charles Boncelet, Kenneth E. Barner:
Graph Neural Networks for Image Understanding Based on Multiple Cues: Group Emotion Recognition and Event Recognition as Use Cases. WACV 2020: 2910-2919
2010 – 2019
- 2019
- [c29]Bin Zhu, Xin Guo, Kenneth E. Barner, Charles Boncelet:
Automatic Group Cohesiveness Detection With Multi-modal Features. ICMI 2019: 577-581 - [i2]Xin Guo, Luisa F. Polanía, Bin Zhu, Charles Boncelet, Kenneth E. Barner:
Graph Neural Networks for Image Understanding Based on Multiple Cues: Group Emotion Recognition and Event Recognition as Use Cases. CoRR abs/1909.12911 (2019) - [i1]Bin Zhu, Xin Guo, Kenneth E. Barner, Charles Boncelet:
Automatic Group Cohesiveness Detection With Multi-modal Features. CoRR abs/1910.01197 (2019) - 2018
- [c28]Xin Guo, Bin Zhu, Luisa F. Polanía, Charles Boncelet, Kenneth E. Barner:
Group-Level Emotion Recognition Using Hybrid Deep Models Based on Faces, Scenes, Skeletons and Visual Attentions. ICMI 2018: 635-639 - 2012
- [c27]Michael E. Picollelli, Charles G. Boncelet Jr., Lisa M. Marvel:
Detecting clustering in streams. CISS 2012: 1-5 - 2011
- [c26]Michael E. Picollelli, Charles G. Boncelet Jr., Lisa M. Marvel:
Detecting clustering in binary sequences. CISS 2011: 1-4
2000 – 2009
- 2008
- [c25]Lisa M. Marvel, Brian Henz, Charles G. Boncelet Jr.:
Fusing rate-specific SVM Classifiers for +/-1 embedding steganalysis. CISS 2008: 361-364 - [c24]Charles G. Boncelet Jr., Lisa M. Marvel, Brian Henz:
Rate insensitive steganalysis of +/-1 embedding in images. ICIP 2008: 1272-1275 - 2007
- [c23]Charles G. Boncelet Jr., Lisa M. Marvel:
Lossless Compression-Based Steganalysis of LSB Embedded Images. CISS 2007: 923 - [c22]Charles G. Boncelet Jr., Lisa M. Marvel:
Steganalysis of ±1 Embedding using Lossless Image Compression. ICIP (2) 2007: 149-152 - 2006
- [j15]Charles G. Boncelet Jr.:
The NTMAC for authentication of noisy messages. IEEE Trans. Inf. Forensics Secur. 1(1): 35-42 (2006) - [j14]Yu Liu, Charles G. Boncelet Jr.:
The CRC-NTMAC for Noisy Message Authentication. IEEE Trans. Inf. Forensics Secur. 1(4): 517-523 (2006) - [j13]Shengkuan Xiao, Charles G. Boncelet Jr.:
On the Use of Context-Weighting in Lossless Bilevel Image Compression. IEEE Trans. Image Process. 15(11): 3253-3260 (2006) - [c21]Yu Liu, Charles Boncelet:
The BCH-NTMAC for Noisy Message Authentication. CISS 2006: 246-251 - [c20]Shengkuan Xiao, Charles G. Boncelet Jr.:
Efficient Noise-Tolerant Message Authentication Codes Using Direct Sequence Spread Spectrum Technique. CISS 2006: 1640-1644 - [c19]Yu Liu, Charles G. Boncelet Jr.:
The Crc-Ntmac for Image Tamper Proofing and Authentication. ICIP 2006: 1985-1988 - [c18]Charles G. Boncelet Jr.:
Lossless Image Compression with BCTW. ICIP 2006: 2281-2284 - [c17]Charles G. Boncelet Jr., Lisa M. Marvel, Adrienne Jeanisha Raglin:
Compression-based steganalysis of LSB embedded images. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607207 - 2005
- [c16]Charles G. Boncelet Jr.:
Image authentication and tamperproofing for noisy channels. ICIP (1) 2005: 677-680 - 2003
- [c15]Shengkuan Xiao, Charles G. Boncelet Jr.:
A context-weighting algorithm achieving model-adaptability in lossless bi-level image compression. ICIP (2) 2003: 231-234 - 2001
- [j12]Maire D. Reavy, Charles G. Boncelet Jr.:
An algorithm for compression of bilevel images. IEEE Trans. Image Process. 10(5): 669-676 (2001) - [c14]Charles G. Boncelet Jr.:
Simple, high performance lossless image compression. ICIP (3) 2001: 498-501 - 2000
- [j11]Maire D. Reavy, Charles G. Boncelet Jr.:
Extending the BACIC algorithm for robust transmission over a noisy channel. IEEE Trans. Image Process. 9(12): 2123-2126 (2000) - [c13]Charles Boncelet:
Variable to fixed entropy coders: Why and how? (And their application to H.263). EUSIPCO 2000: 1-4 - [c12]Heikki Huttunen, Charles Boncelet, Pauli Kuosmanen:
Using permutations to hide information. EUSIPCO 2000: 1-4 - [c11]Lisa M. Marvel, George W. Hartwig Jr., Charles G. Boncelet Jr.:
Compression-compatible fragile and semifragile tamper detection. Security and Watermarking of Multimedia Contents 2000: 131-139
1990 – 1999
- 1999
- [j10]Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter:
Spread spectrum image steganography. IEEE Trans. Image Process. 8(8): 1075-1083 (1999) - [j9]Lisa M. Marvel, Ali S. Khayrallah, Charles G. Boncelet Jr.:
Robust source coding of images for very noisy channels. IEEE Trans. Signal Process. 47(4): 1198-1202 (1999) - 1998
- [c10]Lisa M. Marvel, Charles T. Retter, Charles G. Boncelet Jr.:
Hiding Information in Images. ICIP (2) 1998: 396-398 - [c9]Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter:
Reliable Blind Information Hiding for Images. Information Hiding 1998: 48-61 - 1997
- [c8]Jeong-Gyun Shin, Charles G. Boncelet Jr.:
Multicasting in an ATM expansion-switch fabric. Broadband Networking Technologies 1997: 101-110 - [c7]Maire D. Reavy, Charles G. Boncelet Jr.:
BACIC: A New Method for Lossless Bi-Level and Grayscale Image Compression. ICIP (2) 1997: 282-285 - [c6]Xiang-Gen Xia, Charles G. Boncelet Jr., Gonzalo R. Arce:
A Multiresolution Watermark for Digital Images. ICIP (1) 1997: 548-551 - 1996
- [c5]Lisa M. Marvel, Ali S. Khayrallah, Charles G. Boncelet Jr.:
Robust source coding for images over very noisy channels. ICIP (3) 1996: 759-762 - [c4]Joseph T. Wunderlich, Charles Boncelet:
Local optimization of redundant manipulator kinematics within constrained workspaces. ICRA 1996: 127-132 - 1995
- [j8]Russell C. Hardie, Charles G. Boncelet Jr.:
Gradient-based edge detection using nonlinear edge enhancing prefilters. IEEE Trans. Image Process. 4(11): 1572-1577 (1995) - 1994
- [j7]M. Reza Hakami, Peter J. Warter, Charles G. Boncelet Jr.:
A new VLSI architecture suitable for multidimensional order statistic filtering. IEEE Trans. Signal Process. 42(4): 991-993 (1994) - 1993
- [j6]Charles G. Boncelet Jr.:
Block arithmetic coding for source compression. IEEE Trans. Inf. Theory 39(5): 1546-1554 (1993) - [j5]Russell C. Hardie, Charles G. Boncelet Jr.:
LUM filters: a class of rank-order-based filters for smoothing and sharpening. IEEE Trans. Signal Process. 41(3): 1061-1076 (1993) - 1992
- [c3]M. Reza Hakami, Peter J. Warter, Charles G. Boncelet Jr., David Nassimi:
VLSI Architectures for Recursive and Multiple-Window Order Statistic Filtering. IPPS 1992: 294-297 - [c2]Charles G. Boncelet Jr., David L. Mills:
A Labeling Algorithm for Just-in-Time Scheduling in TDMA Networks. SIGCOMM 1992: 170-175 - 1991
- [j4]Charles G. Boncelet Jr.:
Order statistic distributions with multiple windows. IEEE Trans. Inf. Theory 37(2): 436-442 (1991) - 1990
- [j3]Francesco Palmieri, Charles G. Boncelet Jr.:
Frequency analysis and synthesis of a class of nonlinear filters. IEEE Trans. Acoust. Speech Signal Process. 38(8): 1363-1372 (1990)
1980 – 1989
- 1989
- [j2]Francesco Palmieri, Charles G. Boncelet Jr.:
Ll-filters-a new class of order statistic filters. IEEE Trans. Acoust. Speech Signal Process. 37(5): 691-701 (1989) - 1988
- [c1]Francesco Palmieri, Charles G. Boncelet Jr.:
A class of nonlinear adaptive filters. ICASSP 1988: 1483-1486 - 1986
- [j1]Charles G. Boncelet Jr.:
A rearranged DFT algorithm requiring N2/6 multiplications. IEEE Trans. Acoust. Speech Signal Process. 34(6): 1658-1659 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint