default search action
Chun-Shien Lu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c110]Cheng-Chang Tsai, Yuan-Chih Chen, Chun-Shien Lu:
Test-Time Stain Adaptation with Diffusion Models for Histopathology Image Classification. ECCV (35) 2024: 257-275 - [c109]Cheng-Yi Lee, Cheng-Chang Tsai, Ching-Chia Kao, Chun-Shien Lu, Chia-Mu Yu:
Defending against Clean-Image Backdoor Attack in Multi-Label Classification. ICASSP 2024: 5500-5504 - [c108]Yuran Qiu, Huy H. Nguyen, Qingyao Liao, Chun-Shien Lu, Isao Echizen:
Analysis of Backdoor Attacks on Deepfake Detection. IJCB 2024: 1-9 - [c107]Yuyang Sun, Huy H. Nguyen, Chun-Shien Lu, Zhiyong Zhang, Lu Sun, Isao Echizen:
Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network. IJCB 2024: 1-11 - [c106]Chun-Shien Lu, Chao-Hsuan Lin:
Robust Image Deepfake Detection with Perceptual Hashing. ICISSP 2024: 374-378 - [c105]Ching-Chia Kao, Cheng-Yi Lee, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen:
On the Higher Moment Disparity of Backdoor Attacks. ICME 2024: 1-6 - [c104]Farchan Hakim Raswa, Chun-Shien Lu, Jia-Ching Wang:
Attention-Guided Prototype Mixing: Diversifying Minority Context on Imbalanced Whole Slide Images Classification Learning. WACV 2024: 7609-7618 - [i23]Cheng-Yi Lee, Ching-Chia Kao, Cheng-Han Yeh, Chun-Shien Lu, Chia-Mu Yu, Chu-Song Chen:
Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off. CoRR abs/2407.10180 (2024) - [i22]Hanrui Wang, Ching-Chun Chang, Chun-Shien Lu, Isao Echizen:
Towards Efficient Transferable Preemptive Adversarial Defense. CoRR abs/2407.15524 (2024) - [i21]Shuhan Cui, Huy H. Nguyen, Trung-Nghia Le, Chun-Shien Lu, Isao Echizen:
LookupForensics: A Large-Scale Multi-Task Dataset for Multi-Phase Image-Based Fact Verification. CoRR abs/2407.18614 (2024) - [i20]Cheng-Yi Lee, Cheng-Chang Tsai, Chia-Mu Yu, Chun-Shien Lu:
Exploring Robustness of Visual State Space model against Backdoor Attacks. CoRR abs/2408.11679 (2024) - [i19]Ching-Chia Kao, Chia-Mu Yu, Chun-Shien Lu, Chu-Song Chen:
Information-Theoretical Principled Trade-off between Jailbreakability and Stealthiness on Vision Language Models. CoRR abs/2410.01438 (2024) - [i18]Jonathan Weiping Li, Ren-Wei Liang, Cheng-Han Yeh, Cheng-Chang Tsai, Kuanchun Yu, Chun-Shien Lu, Shang-Tse Chen:
Adversarial Robustness Overestimation and Instability in TRADES. CoRR abs/2410.07675 (2024) - [i17]Cheng-Han Yeh, Kuanchun Yu, Chun-Shien Lu:
Test-time Adversarial Defense with Opposite Adversarial Path and High Attack Time Cost. CoRR abs/2410.16805 (2024) - 2023
- [c103]Yuan-Chih Chen, Chun-Shien Lu:
RankMix: Data Augmentation for Weakly Supervised Learning of Classifying Whole Slide Images with Diverse Sizes and Imbalanced Categories. CVPR 2023: 23936-23945 - [c102]Gang-Xuan Lin, Shih-Wei Hu, Chun-Shien Lu:
Extremely Lightweight Neural Network for Large-Scale Image Compressive Sensing. EUSIPCO 2023: 1913-1917 - [i16]Yuyang Sun, Huy H. Nguyen, Chun-Shien Lu, Zhiyong Zhang, Lu Sun, Isao Echizen:
Generalized Deepfakes Detection with Reconstructed-Blended Images and Multi-scale Feature Reconstruction Network. CoRR abs/2312.08020 (2023) - 2022
- [c101]Jia-Wei Chen, Chia-Mu Yu, Ching-Chia Kao, Tzai-Wei Pang, Chun-Shien Lu:
DPGEN: Differentially Private Generative Energy-Guided Network for Natural Image Synthesis. CVPR 2022: 8377-8386 - [c100]Gang-Xuan Lin, Shih-Wei Hu, Chun-Shien Lu:
QISTA-ImageNet: A Deep Compressive Image Sensing Framework Solving ℓ q-Norm Optimization Problem. ECCV (23) 2022: 406-422 - [c99]Chun-Shien Lu:
Sparse Trigger Pattern Guided Deep Learning Model Watermarking. IH&MMSec 2022: 33-38 - [c98]Hao-Ting Wei, Chung-Shou Liao, Sung-Hsien Hsieh, Chun-Shien Lu:
Dynamic Network Tomography with Sparse Recovery-based Link Delay Estimation. WF-IoT 2022: 1-6 - 2021
- [j45]Shih-Wei Hu, Gang-Xuan Lin, Chun-Shien Lu:
GPX-ADMM-Net: Interpretable Deep Neural Network for Image Compressive Sensing. IEEE Access 9: 158695-158709 (2021) - [c97]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation With Manipulable Semantics. CVPR 2021: 6478-6487 - [c96]Fei Jia, Chun-Shien Lu, Tzren-Ru Chou, Hsi-Chun Wang:
Graphic QR code Combined with Stamp. ICKII 2021: 123-127 - [c95]Gang-Xuan Lin, Shih-Wei Hu, Yen-Ju Lu, Yu Tsao, Chun-Shien Lu:
QISTA-Net-Audio: Audio Super-Resolution via Non-Convex ℓ_q-Norm Minimization. Interspeech 2021: 1639-1643 - [i15]Jia-Wei Chen, Li-Ju Chen, Chia-Mu Yu, Chun-Shien Lu:
Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics. CoRR abs/2104.01753 (2021) - 2020
- [j44]Ching-Lun Tai, Sung-Hsien Hsieh, Chun-Shien Lu:
Greedy Algorithms for Hybrid Compressed Sensing. IEEE Signal Process. Lett. 27: 2059-2063 (2020) - [j43]Chia-Mu Yu, Sarada Prasad Gochhayat, Mauro Conti, Chun-Shien Lu:
Privacy Aware Data Deduplication for Side Channel in Cloud Storage. IEEE Trans. Cloud Comput. 8(2): 597-609 (2020) - [j42]Sung-Hsien Hsieh, Wei-Jie Liang, Chun-Shien Lu, Soo-Chang Pei:
Distributed Compressive Sensing: Performance Analysis With Diverse Signal Ensembles. IEEE Trans. Signal Process. 68: 3500-3514 (2020) - [c94]Wan-Hsuan Lin, Chun-Shien Lu:
Automated Graph Generation at Sentence Level for Reading Comprehension Based on Conceptual Graphs. COLING 2020: 2665-2675 - [c93]Shih-Wei Hu, Gang-Xuan Lin, Chun-Shien Lu:
GPX-ADMM-Net: ADMM-based Neural Network with Generalized Proximal Operator. EUSIPCO 2020: 2055-2059 - [c92]Hsuan-Shuo Huang, Wen-Pin Hope Lee, Chun-Shien Lu, Tzren-Ru Chou, Hsi-Chun Wang:
Exploring the Integrated Application of Aesthetic QR Code in Video. ICKII 2020: 152-155 - [c91]Yi Lin Sung, Sung-Hsien Hsieh, Soo-Chang Pei, Chun-Shien Lu:
Difference-Seeking Generative Adversarial Network-Unseen Sample Generation. ICLR 2020 - [c90]Gang-Xuan Lin, Chun-Shien Lu:
QISTA-Net: DNN Architecture to Solve $\ell_{Q}$-Norm Minimization Problem. MLSP 2020: 1-6 - [i14]Gang-Xuan Lin, Shih-Wei Hu, Chun-Shien Lu:
QISTA-Net: DNN Architecture to Solve $\ell_q$-norm Minimization Problem and Image Compressed Sensing. CoRR abs/2010.11363 (2020) - [i13]Ching-Chia Kao, Jhe-Bang Ko, Chun-Shien Lu:
Deterministic Certification to Adversarial Attacks via Bernstein Polynomial Approximation. CoRR abs/2011.14085 (2020)
2010 – 2019
- 2019
- [i12]Ching-Lun Tai, Sung-Hsien Hsieh, Chun-Shien Lu:
Greedy Algorithms for Hybrid Compressed Sensing. CoRR abs/1908.06359 (2019) - 2018
- [j41]Shih-Wei Hu, Gang-Xuan Lin, Sung-Hsien Hsieh, Chun-Shien Lu:
Performance Analysis of Joint-Sparse Recovery from Multiple Measurement Vectors via Convex Optimization: Which Prior Information is Better? IEEE Access 6: 3739-3754 (2018) - [j40]Sung-Hsien Hsieh, Tsung-Hsuan Hung, Chun-Shien Lu, Yu-Chi Chen, Soo-Chang Pei:
A Secure Compressive Sensing-Based Data Gathering System via Cloud Assistance. IEEE Access 6: 31840-31853 (2018) - [j39]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Fast computing position of maximum of circulant convolution. Digit. Signal Process. 83: 83-97 (2018) - [j38]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Compressive Sensing Matrix Design for Fast Encoding and Decoding via Sparse FFT. IEEE Signal Process. Lett. 25(4): 591-595 (2018) - [c89]Chia-Tsen Sun, Pei-Chun Kuan, Yu-Mei Wang, Chun-Shien Lu, Hsi-Chun Wang:
Integration of Graphic QR code and Identity Documents by Laser Perforation to Enhance Anti-Counterfeiting Features. ICME Workshops 2018: 1-6 - [c88]Wei-Zhi Huang, Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Simple Deep Learning Network via Tensor-Train Haar-wavelet Decomposition without Retraining. MLSP 2018: 1-6 - [i11]Hao-Ting Wei, Sung-Hsien Hsieh, Wen-Liang Hwang, Chung-Shou Liao, Chun-Shien Lu:
Link Delay Estimation Using Sparse Recovery for Dynamic Network Tomography. CoRR abs/1812.00369 (2018) - 2017
- [j37]Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks. Comput. Commun. 108: 1-16 (2017) - [j36]Wei-Jie Liang, Tsung-Hsun Chien, Chun-Shien Lu:
Theoretical stopping criteria guided Greedy Algorithm for Compressive Cooperative Spectrum Sensing. Comput. Commun. 111: 165-175 (2017) - [j35]Wei-Jie Liang, Gang-Xuan Lin, Chun-Shien Lu:
Tree Structure Sparsity Pattern Guided Convex Optimization for Compressive Sensing of Large-Scale Images. IEEE Trans. Image Process. 26(2): 847-859 (2017) - [c87]Sung-Hsien Hsieh, Wei-Jie Liang, Chun-Shien Lu, Soo-Chang Pei:
Distributed compressive sensing: Performance analysis with diverse signal ensembles. EUSIPCO 2017: 1324-1328 - 2016
- [j34]Chih-Yang Lin, Kahlil Muchtar, Chia-Hung Yeh, Chun-Shien Lu:
Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication. J. Vis. Commun. Image Represent. 38: 858-871 (2016) - [j33]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Compressed Sensing-Based Clone Identification in Sensor Networks. IEEE Trans. Wirel. Commun. 15(4): 3071-3084 (2016) - [c86]Shih-Wei Hu, Gang-Xuan Lin, Sung-Hsien Hsieh, Wei-Jie Liang, Chun-Shien Lu:
Performance analysis of joint-sparse recovery from multiple measurement vectors with prior information via convex optimization. ICASSP 2016: 4368-4372 - [c85]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Fast binary embedding via circulant downsampled matrix. ICIP 2016: 1789-1793 - [i10]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Fast Binary Embedding via Circulant Downsampled Matrix - A Data-Independent Approach. CoRR abs/1601.06342 (2016) - [i9]Sung-Hsien Hsieh, Wei-Jie Liang, Chun-Shien Lu, Soo-Chang Pei:
Distributed Compressive Sensing: Performance Analysis with Diverse Signal Ensembles. CoRR abs/1609.01899 (2016) - 2015
- [j32]Chun-Shien Lu, Hung-Wei Chen:
Compressive image sensing for fast recovery from limited samples: A variation on compressive sensing. Inf. Sci. 325: 33-47 (2015) - [j31]Chun-Yen Kuo, Gang-Xuan Lin, Chun-Shien Lu:
A Necessary and Sufficient Condition for Generalized Demixing. IEEE Signal Process. Lett. 22(11): 2049-2053 (2015) - [c84]Tsung-Hsuan Hung, Sung-Hsien Hsieh, Chun-Shien Lu:
Privacy-preserving data collection and recovery of compressive sensing. ChinaSIP 2015: 473-477 - [c83]Wei-Jie Liang, Gang-Xuan Lin, Chun-Shien Lu:
Compressive large-scale image sensing. GlobalSIP 2015: 378-382 - [c82]Shih-Wei Hu, Gang-Xuan Lin, Sung-Hsien Hsieh, Chun-Shien Lu:
Phase transition of joint-sparse recovery from multiple measurements via convex optimization. ICASSP 2015: 3576-3580 - [i8]Chun-Yen Kuo, Gang-Xuan Lin, Chun-Shien Lu:
The Necessary And Sufficient Condition for Generalized Demixing. CoRR abs/1503.08286 (2015) - [i7]Wei-Jie Liang, Gang-Xuan Lin, Chun-Shien Lu:
Compressive Sensing of Large-Scale Images: An Assumption-Free Approach. CoRR abs/1505.05407 (2015) - [i6]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Fast Greedy Approaches for Compressive Sensing of Large-Scale Signals. CoRR abs/1509.03979 (2015) - [i5]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Fast Template Matching by Subsampled Circulant Matrix. CoRR abs/1509.04863 (2015) - [i4]Shih-Wei Hu, Gang-Xuan Lin, Sung-Hsien Hsieh, Wei-Jie Liang, Chun-Shien Lu:
Performance Analysis of Joint-Sparse Recovery from Multiple Measurements and Prior Information via Convex Optimization. CoRR abs/1509.06655 (2015) - 2014
- [c81]Chun-Shien Lu, Wei-Jie Liang:
Fast compressive sensing of high-dimensional signals with tree-structure sparsity pattern. ChinaSIP 2014: 738-742 - [c80]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
2D sparse dictionary learning via tensor decomposition. GlobalSIP 2014: 492-496 - [c79]Tsung-Hsun Chien, Wei-Jie Liang, Chun-Shien Lu:
A practical subspace multiple measurement vectors algorithm for cooperative spectrum sensing. GLOBECOM 2014: 787-792 - [i3]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Sparse Fast Fourier Transform for Exactly and Generally K-Sparse Signals by Downsampling and Sparse Recovery. CoRR abs/1407.8315 (2014) - 2013
- [j30]Chih-Yang Lin, Li-Wei Kang, Jau-Hong Kao, Chun-Shien Lu, Yi-Ta Wu:
Multi-camera invariant appearance modeling for non-rigid object identification in a real-time environment. J. Vis. Commun. Image Represent. 24(6): 717-728 (2013) - [j29]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks. IEEE Trans. Inf. Forensics Secur. 8(5): 754-768 (2013) - [j28]Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 12(6): 2817-2829 (2013) - [c78]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Sparse Fast Fourier Transform by downsampling. ICASSP 2013: 5637-5641 - [c77]Chun-Shien Lu, Da-Chun Lin:
Optimal sensing matrix design with hardware friendliness. WCSP 2013: 1-6 - 2012
- [j27]Chia-Mu Yu, Sung-Hsien Hsieh, Han-Wen Liang, Chun-Shien Lu, Wei-Ho Chung, Sy-Yen Kuo, Soo-Chang Pei:
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems. IEEE Commun. Lett. 16(10): 1556-1559 (2012) - [j26]Li-Wei Kang, Chun-Shien Lu, Chih-Yang Lin:
Low-complexity video coding via power-rate-distortion optimization. J. Vis. Commun. Image Represent. 23(3): 569-585 (2012) - [j25]Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei:
Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT. IEEE Trans. Image Process. 21(11): 4593-4607 (2012) - [c76]Chun-Shien Lu:
Session MP8a2: Signal processing and adaptive systems i. ACSCC 2012: 367-368 - [c75]Chun-Shien Lu, Hung-Wei Chen, Sung-Hsien Hsieh:
Fast compressed image sensing based on sampling matrix design. ACSCC 2012: 369-372 - [c74]Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Privacy- and integrity-preserving range query in wireless sensor networks. GLOBECOM 2012: 328-334 - [c73]Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei:
Content authentication of halftone video via flickering as sparse signal. ICIP 2012: 265-268 - [c72]Chun-Shien Lu, Chao-Yung Hsu:
Constraint-optimized keypoint inhibition/insertion attack: security threat to scale-space image feature extraction. ACM Multimedia 2012: 629-638 - [c71]Huan-Cheng Hsu, Chun-Rong Huang, Chun-Shien Lu:
Sparsity cue in image copy detection. ACM Multimedia 2012: 937-940 - [c70]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
CSI: Compressed sensing-based clone identification in sensor networks. PerCom Workshops 2012: 290-295 - [c69]Sung-Hsien Hsieh, Chun-Shien Lu, Soo-Chang Pei:
Fast OMP: Reformulating OMP via iteratively refining ℓ2-norm solutions. SSP 2012: 189-192 - 2011
- [j24]Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Sy-Yen Kuo:
An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. Int. J. Sens. Networks 9(2): 89-106 (2011) - [j23]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 241-255 (2011) - [j22]Chia-Mu Yu, Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo:
Constrained Function-Based Message Authentication for Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(2): 407-425 (2011) - [j21]Li-Wei Kang, Chao-Yung Hsu, Hung-Wei Chen, Chun-Shien Lu, Chih-Yang Lin, Soo-Chang Pei:
Feature-Based Sparse Representation for Image Similarity Assessment. IEEE Trans. Multim. 13(5): 1019-1030 (2011) - [c68]Li-Wei Kang, Chih-Yang Lin, Hung-Wei Chen, Chia-Mu Yu, Chun-Shien Lu, Chao-Yung Hsu, Soo-Chang Pei:
Secure transcoding for compressive multimedia sensing. ICIP 2011: 917-920 - [c67]Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei:
Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. Media Forensics and Security 2011: 788005 - 2010
- [j20]Chia-Mu Yu, Chi-Yuan Chen, Chun-Shien Lu, Sy-Yen Kuo, Han-Chieh Chao:
Acquiring Authentic Data in Unattended Wireless Sensor Networks. Sensors 10(4): 2770-2792 (2010) - [j19]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Noninteractive pairwise key establishment for sensor networks. IEEE Trans. Inf. Forensics Secur. 5(3): 556-569 (2010) - [c66]Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei:
Secure and robust sift with resistance to chosen-plaintext attack. ICIP 2010: 997-1000 - [c65]Li-Wei Kang, Chao-Yung Hsu, Hung-Wei Chen, Chun-Shien Lu:
Secure SIFT-based sparse representation for image copy detection and recognition. ICME 2010: 1248-1253 - [c64]Hung-Wei Chen, Li-Wei Kang, Chun-Shien Lu:
Dictionary learning-based distributed compressive video sensing. PCS 2010: 210-213 - [c63]Mei-Chen Yeh, Chao-Yung Hsu, Chun-Shien Lu:
NTNU-Academia Sinica at TRECVID 2010 Content Based Copy Detection. TRECVID 2010 - [c62]Hung-Wei Chen, Li-Wei Kang, Chun-Shien Lu:
Dynamic measurement rate allocation for distributed compressive video sensing. VCIP 2010: 77440I
2000 – 2009
- 2009
- [j18]Jian-Ru Chen, Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang:
Video JET: packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data. Multim. Tools Appl. 44(2): 249-278 (2009) - [c61]Li-Wei Kang, Chun-Shien Lu:
Distributed compressive video sensing. ICASSP 2009: 1169-1172 - [c60]Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei:
Secure image hashing via minimum distortion estimation. ICIP 2009: 1281-1284 - [c59]Li-Wei Kang, Chun-Shien Lu, Chao-Yung Hsu:
Compressive sensing-based image hashing. ICIP 2009: 1285-1288 - [c58]Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei:
Secure and robust SIFT. ACM Multimedia 2009: 637-640 - [c57]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A DoS-resilient en-route filtering scheme for sensor networks. MobiHoc 2009: 343-344 - [c56]Li-Wei Kang, Chun-Shien Lu:
Power-rate-distortion model for low-complexity video coding. PCS 2009: 1-4 - [c55]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks. SECON 2009: 1-9 - [c54]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. VTC Fall 2009 - [c53]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
A constrained function based message authentication scheme for sensor networks. WCNC 2009: 2180-2185 - [i2]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Secure Multidimensional Queries in Tiered Sensor Networks. CoRR abs/0911.4238 (2009) - [i1]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Constrained Function Based En-Route Filtering for Sensor Networks. CoRR abs/0911.4239 (2009) - 2008
- [j17]Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang:
AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions. Signal Process. Image Commun. 23(3): 179-193 (2008) - [c52]Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei:
Compression of halftone video for electronic paper. ICIP 2008: 1600-1603 - [c51]Jian-Ru Chen, Chun-Shien Lu:
Unequal authenticity protection of video multicasting. ICME 2008: 845-848 - [c50]Chao-Yung Hsu, Chun-Shien Lu, Soo-Chang Pei:
Power-scalable multi-layer halftone video display for electronic paper. ICME 2008: 1445-1448 - [c49]Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo:
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. MobiHoc 2008: 449-450 - [c48]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Mobile Sensor Network Resilient Against Node Replication Attacks. SECON 2008: 597-599 - 2007
- [j16]Deepa Kundur, Ching-Yung Lin, Chun-Shien Lu:
Visual Sensor Networks. EURASIP J. Adv. Signal Process. 2007 (2007) - [j15]Yu-Chen Huang, Chun-Shien Lu, Hsiao-Kuang Wu:
JitterPath: Probing Noise Resilient One-Way Delay Jitter-Based Available Bandwidth Estimation. IEEE Trans. Multim. 9(4): 798-812 (2007) - [c47]Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, Sy-Yen Kuo:
Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment. ICDCS Workshops 2007: 18 - [c46]Li-Wei Kang, Chun-Shien Lu:
Multi-View Distributed Video Coding with Low-Complexity Inter-Sensor Communication Over Wireless Video Sensor Networks. ICIP (3) 2007: 13-16 - [c45]Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang:
Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions. ICME 2007: 1531-1534 - [c44]Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei:
Video Halftoning Preserving Temporal Consistency. ICME 2007: 1938-1941 - [c43]Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo:
Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking. ISWCS 2007: 807-808 - 2006
- [j14]Chun-Shien Lu, Shih-Wei Sun, Chao-Yong Hsu, Pao-Chi Chang:
Media Hash-Dependent Image Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks Based on False Positive-Oriented Detection. IEEE Trans. Multim. 8(4): 668-685 (2006) - [c42]Chao-Yong Hsu, Chun-Shien Lu:
Informed Authentication Watermarking Via Stego Data Reconstruction. ICASSP (5) 2006: 385-388 - [c41]Li-Wei Kang, Chun-Shien Lu:
Wyner-Ziv Video Coding with Coding Mode-Aided Motion Compensation. ICIP 2006: 237-240 - [c40]Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei:
Joint Screening Halftoning and Visual Cryptography for Image Protection. IWDW 2006: 212-225 - [c39]Li-Wei Kang, Chun-Shien Lu:
Low-Complexity Wyner-Ziv Video Coding Based on Robust Media Hashing. MMSP 2006: 267-272 - [c38]Yu-Chen Huang, Chun-Shien Lu, Hsiao-Kuang Wu:
Available bandwidth estimation via one-way delay jitter and queuing delay propagation model. WCNC 2006: 112-121 - 2005
- [j13]Chun-Shien Lu, Chao-Yong Hsu:
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Multim. Syst. 11(2): 159-173 (2005) - [j12]Chun-Shien Lu:
Towards robust image watermarking: combining content-dependent key, moment normalization, and side-informed embedding. Signal Process. Image Commun. 20(2): 129-150 (2005) - [j11]Chun-Shien Lu, Jan-Ru Chen, Kuo-Chin Fan:
Real-time frame-dependent video watermarking in VLC domain. Signal Process. Image Commun. 20(7): 624-642 (2005) - [j10]Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin:
Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multim. 7(6): 997-1006 (2005) - [c37]Shih-Wei Sun, Chun-Shien Lu, Chao-Yong Hus, Pao-Chi Chang:
Media Hash-dependent Image Watermarking Resilent Against Both Geometric Attacks and Estimation Attacks Based on Fals Positive-Oriented Detection. ICDAT 2005: 155-174 - [c36]Chun-Shien Lu, Chia-Mu Yu:
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks. ICME 2005: 169-172 - [c35]Chao-Yong Hsu, Chun-Shien Lu:
Joint Image Halftoning and Watermarking in High-Resolution Digital Form. ICME 2005: 534-537 - [c34]Chao-Yong Hsu, Chun-Shien Lu:
Near-perfect cover image recovery anti-multiple watermark embedding approaches. ISCAS (6) 2005: 5517-5520 - [c33]Chia-Mu Yu, Chun-Shien Lu:
Robust non-interactive zero-knowledge watermarking scheme against cheating prover. MM&Sec 2005: 103-110 - [c32]Chun-Shien Lu, Shih-Wei Sun, Pao-Chi Chang:
Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. Security, Steganography, and Watermarking of Multimedia Contents 2005: 147-163 - 2004
- [c31]Yu-Chen Huang, Chun-Shien Lu, Hsiao-Kuang Wu:
Reliable available bandwidth estimation based on distinguishing queuing regions and resolving false estimations [video transmission]. GLOBECOM 2004: 4081-4086 - [c30]Chun-Shien Lu, Jan-Ru Chen, Kuo-Chin Fan:
Resistance of content-dependent video watermarking to watermark-estimation attacks. ICC 2004: 1386-1390 - [c29]Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, Pao-Chi Chang:
Robust mesh-based hashing for copy detection and tracing of images. ICME 2004: 731-734 - [c28]Chun-Shien Lu, Chao-Yong Hsu:
Content-dependent multipurpose watermarking resistant against generalized copy attack. ICME 2004: 2039-2042 - [c27]Chun-Shien Lu:
On the security of structural information extraction/embedding for images. ISCAS (2) 2004: 169-172 - [c26]Chao-Yong Hsu, Chun-Shien Lu:
Geometric distortion-resilient image hashing system and its application scalability. MM&Sec 2004: 81-92 - [c25]Jan-Ru Chen, Chun-Shien Lu, Kuo-Chin Fan:
A significant motion vector protection-based error-resilient scheme in H.264. MMSP 2004: 287-290 - 2003
- [j9]Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao:
A message-based cocktail watermarking system. Pattern Recognit. 36(4): 957-968 (2003) - [j8]Arthur Chun-Chieh Shih, Hong-Yuan Mark Liao, Chun-Shien Lu:
A new iterated two-band diffusion equation: theory and its application. IEEE Trans. Image Process. 12(4): 466-476 (2003) - [j7]Chun-Shien Lu, Hong-Yuan Mark Liao:
Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multim. 5(2): 161-173 (2003) - [c24]Chun-Shien Lu:
Dual security-based image steganography. ICME 2003: 489-492 - [c23]Chun-Shien Lu, Chao-Yong Hsu:
Content-Dependent Anti-disclosure Image Watermark. IWDW 2003: 61-76 - [c22]Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin:
Authentication of 3-D Polygonal Meshes. IWDW 2003: 168-183 - 2002
- [j6]Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter:
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector. IEEE Trans. Image Process. 11(3): 280-292 (2002) - [c21]Chun-Shien Lu:
Audio fingerprinting based on analyzing time-frequency localization of signals. IEEE Workshop on Multimedia Signal Processing 2002: 174-177 - [c20]Chun-Shien Lu:
Characterization of abrupt/gradual video shot transitions as unsmoothed/smoothed singularity. IEEE Workshop on Multimedia Signal Processing 2002: 202-205 - [c19]Chun-Shien Lu:
Wireless multimedia error resilience via a data hiding technique. IEEE Workshop on Multimedia Signal Processing 2002: 316-319 - [c18]Chun-Shien Lu, Jan-Ru Chen, Hong-Yuan Mark Liao, Kuo-Chin Fan:
Real-Time MPEG2 Video Watermarking in the VLC Domain. ICPR (2) 2002: 552- - [c17]Chun-Shien Lu:
Block DCT-Based Robust Watermarking Using Side Information Extracted by Mean Filtering. ICPR (2) 2002: 1001-1004 - 2001
- [j5]Wen-Liang Hwang, Chun-Shien Lu, Pau-Choo Chung:
Segmentation of Perspective Textured Planes through the Ridges of Continuous Wavelet Transform. J. Vis. Commun. Image Represent. 12(2): 201-216 (2001) - [j4]Chun-Shien Lu, Hong-Yuan Mark Liao:
Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Process. 10(10): 1579-1592 (2001) - [c16]Chun-Shien Lu, Hong-Yuan Mark Liao:
Video object-based watermarking: a rotation and flipping resilient scheme. ICIP (2) 2001: 483-486 - [c15]Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao:
A message-based cocktail watermarking system. ICIP (3) 2001: 1035-1038 - [c14]Chun-Shien Lu, Hong-Yuan Mark Liao:
An Oblivious And Robust Watermarking Scheme Using Communications-With-Side-Information Mechanism. ITCC 2001: 103-107 - [c13]Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter:
A new watermarking scheme resistant to denoising and copy attacks. MMSP 2001: 505-510 - [c12]Chun-Shien Lu, Hong-Yuan Mark Liao:
Digital Watermarking: A Communications with Side Information Perspective. IEEE Pacific Rim Conference on Multimedia 2001: 927-932 - 2000
- [j3]Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, Hong-Yuan Mark Liao:
Cocktail Watermarking for Digital Image Protection. IEEE Trans. Multim. 2(4): 209-224 (2000) - [c11]Chun-Shien Lu, Hong-Yuan Mark Liao:
Oblivious Cocktail Watermarking by Sparse Code Shrinkage: A Regional- and Global-Based Scheme. ICIP 2000: 13-16 - [c10]Gwo-Jong Yu, Chun-Shien Lu, Hong-Yuan Mark Liao, Jang-Ping Sheu:
Mean Quantization Blind Watermarking for Image Authentication. ICIP 2000: 706-709 - [c9]Chwen-Jye Sze, Hong-Yuan Mark Liao, Shih-Kun Huang, Chun-Shien Lu:
Dyadic Wavelet-Based Nonlinear Conduction Equation: Theory and Applications. ICIP 2000: 880-883 - [c8]Chun-Shien Lu, Hong-Yuan Mark Liao, Chwen-Jye Sze:
Combined Watermarking for Image Authentication and Protection. IEEE International Conference on Multimedia and Expo (III) 2000: 1415-1418 - [c7]Chun-Shien Lu, Hong-Yuan Mark Liao, Liang-Hua Chen:
Multipurpose Audio Watermarking. ICPR 2000: 3286-3289 - [c6]Chun-Shien Lu, Hong-Yuan Mark Liao:
Structural digital signature for image authentication: an incidental distortion resistant scheme. ACM Multimedia Workshops 2000: 115-118
1990 – 1999
- 1999
- [c5]Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze:
Cocktail Watermarking on Images. Information Hiding 1999: 333-347 - [c4]Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze:
Highly Robust Image Watermarking Using Complementary Modulations. ISW 1999: 136-153 - 1998
- [j2]Wen-Liang Hwang, Chun-Shien Lu, Pau-Choo Chung:
Shape from texture: estimation of planar surface orientation through the ridge surfaces of continuous wavelet transform. IEEE Trans. Image Process. 7(5): 773-780 (1998) - [c3]Chun-Shien Lu, Pau-Choo Chung:
Wold features for unsupervised texture segmentation. ICPR 1998: 1689-1693 - 1997
- [j1]Chun-Shien Lu, Pau-Choo Chung, Chih F. Chen:
Unsupervised texture segmentation via wavelet transform. Pattern Recognit. 30(5): 729-742 (1997) - [c2]Chun-Shien Lu, Wen-Liang Hwang, Pau-Choo Chung:
Segmentation of 3-D Textured Images Using Continuous Wavelet Transform. ICIP (1) 1997: 235-238 - 1996
- [c1]Chun-Shien Lu, Wen-Liang Hwang, Hong-Yuan Mark Liao, Pau-Choo Chung:
Shape from texture based on the ridge of continuous wavelet transform. ICIP (1) 1996: 295-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint