default search action
Jinwei Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j82]Yifan Gu, Xuebing Yang, Mengxuan Sun, Chutong Wang, Hongyu Yang, Chao Yang, Jinwei Wang, Guilan Kong, Jicheng Lv, Wensheng Zhang:
Graph-guided deep hashing networks for similar patient retrieval. Comput. Biol. Medicine 169: 107865 (2024) - [j81]Zhenjie Yao, Yixin Chen, Jinwei Wang, Junjuan Li, Shuohua Chen, Shouling Wu, Yanhui Tu, Minghui Zhao, Luxia Zhang:
Interpretable Trend Analysis Neural Networks for Longitudinal Data Analysis. ACM Trans. Comput. Heal. 5(2): 8:1-8:13 (2024) - [j80]Maoyuan Wang, Jinwei Wang, Bin Ma, Xiangyang Luo:
Improving the transferability of adversarial examples through black-box feature attacks. Neurocomputing 595: 127863 (2024) - [j79]Jiawei Zhang, Jinwei Wang, Hao Wang, Xiangyang Luo, Bin Ma:
Trustworthy adaptive adversarial perturbations in social networks. J. Inf. Secur. Appl. 80: 103675 (2024) - [j78]Jinwei Wang, Wanyun Huang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Adversarial watermark: A robust and reliable watermark against removal. J. Inf. Secur. Appl. 82: 103750 (2024) - [j77]Peng Zhang, Hongmei Li, Bin Chen, Jinwei Wang, Hengguo Zhang:
A novel ultra-local model-based finite time synergetic robustness control for uncertain robotic manipulator. J. Frankl. Inst. 361(18): 107362 (2024) - [j76]Xiuli Chai, Yong Tan, Zhihua Gan, Yakun Niu, Jinwei Wang:
Forgery detection using polynomial fitting in recompressed JPEG images. Signal Image Video Process. 18(3): 2439-2451 (2024) - [j75]Xin Cheng, Jinwei Wang, Hao Wang, Xiangyang Luo, Bin Ma:
Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge. IEEE Trans. Circuits Syst. Video Technol. 34(1): 632-646 (2024) - [j74]Hao Wang, Jinwei Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma, Bin Li, Jinsheng Sun:
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference. IEEE Trans. Circuits Syst. Video Technol. 34(6): 5191-5206 (2024) - [c29]Junjie Zhao, Sen Qiao, Jinwei Wang, Guangjie Liu:
Generating Image Adversarial Example by Modifying JPEG Stream. CVDL 2024: 55:1-55:8 - [c28]Xin Cheng, Hao Wang, Jinwei Wang, Xiangyang Luo, Bin Ma:
Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness. ACM Multimedia 2024: 6540-6548 - 2023
- [j73]Zhenguo Yang, Huomin Dong, Faxiang Zhang, Shaodong Jiang, Jinwei Wang, Chang Wang, Chunxiao Wang:
Distributed Optical Fiber Sensing Event Recognition Based on Markov Transition Field and Knowledge Distillation. IEEE Access 11: 19362-19372 (2023) - [j72]Guohui Ding, Yueyi Zhu, Chenyang Li, Jinwei Wang, Ru Wei, Zhaoyu Liu:
Time Series Data Cleaning Method Based on Optimized ELM Prediction Constraints. J. Inf. Process. Syst. 19(2): 149-163 (2023) - [j71]Junjie Zhao, Junfeng Wu, James Msughter Adeke, Sen Qiao, Jinwei Wang:
Detecting High-Resolution Adversarial Images with Few-Shot Deep Learning. Remote. Sens. 15(9): 2379 (2023) - [j70]Jiawei Zhang, Jinwei Wang, Hao Wang, Xiangyang Luo:
Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks. IEEE Trans. Circuits Syst. Video Technol. 33(2): 562-574 (2023) - [j69]Haitao Zhang, Beijing Chen, Jinwei Wang, Guoying Zhao:
A Local Perturbation Generation Method for GAN-Generated Face Anti-Forensics. IEEE Trans. Circuits Syst. Video Technol. 33(2): 661-676 (2023) - [j68]Shichang Ding, Xiangyang Luo, Jinwei Wang, Xiaoming Fu:
GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework. IEEE Trans. Netw. Sci. Eng. 10(6): 3543-3560 (2023) - [j67]Hao Li, Jinwei Wang, Neal Xiong, Yi Zhang, Athanasios V. Vasilakos, Xiangyang Luo:
A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning. ACM Trans. Multim. Comput. Commun. Appl. 19(6): 214:1-214:23 (2023) - [c27]Tie Hua Zhou, Jinwei Wang, Ling Wang, Haoyu Hao, Tianshuo Bi:
Stress Expression Identification Model for Emotion-Driven Association Calculation over Social Network Blogs. CSoNet 2023: 407-415 - [c26]Xue Bai, Jinwei Wang:
LASTNet: A Swin Transformer with LANets Network for Video emotion recognition. ICAICE 2023: 291-294 - [c25]Hao Wu, Jinwei Wang, Jiawei Zhang, Yufeng Wu, Bin Ma, Xiangyang Luo:
Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum. IJCNN 2023: 1-8 - [c24]Jinwei Wang, Maoyuan Wang, Hao Wu, Bin Ma, Xiangyang Luo:
Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum. PRCV (9) 2023: 421-432 - [i3]Jinwei Wang, Hao Wu, Haihua Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples. CoRR abs/2303.04502 (2023) - 2022
- [j66]Sunil Kumar Jha, Jinwei Wang, Raju Shanmugam:
An accurate soft diagnosis method of breast cancer using the operative fusion of derived features and classification approaches. Expert Syst. J. Knowl. Eng. 39(7) (2022) - [j65]Luhui Yang, Guangjie Liu, Jinwei Wang, Jiangtao Zhai, Yuewei Dai:
A semantic element representation model for malicious domain name detection. J. Inf. Secur. Appl. 66: 103148 (2022) - [j64]Yifan Gu, Xuebing Yang, Lei Tian, Hongyu Yang, Jicheng Lv, Chao Yang, Jinwei Wang, Jianing Xi, Guilan Kong, Wensheng Zhang:
Structure-aware siamese graph neural networks for encounter-level patient similarity learning. J. Biomed. Informatics 127: 104027 (2022) - [j63]Sunil Kumar Jha, Ninoslav Marina, Jinwei Wang, Zulfiqar Ahmad:
A hybrid machine learning approach of fuzzy-rough-k-nearest neighbor, latent semantic analysis, and ranker search for efficient disease diagnosis. J. Intell. Fuzzy Syst. 42(3): 2549-2563 (2022) - [j62]Junfeng Wu, Jinwei Wang, Junjie Zhao, Xiangyang Luo, Bin Ma:
ESGAN for generating high quality enhanced samples. Multim. Syst. 28(5): 1809-1822 (2022) - [j61]Jinwei Wang, Kehui Zeng, Bin Ma, Xiangyang Luo, Qilin Yin, Guangjie Liu, Sunil Kr. Jha:
GAN-generated fake face detection via two-stream CNN with PRNU in the wild. Multim. Tools Appl. 81(29): 42527-42545 (2022) - [j60]Qilin Yin, Jinwei Wang, Wei Lu, Xiangyang Luo:
Contrastive Learning based Multi-task Network for Image Manipulation Detection. Signal Process. 201: 108709 (2022) - [j59]Sunil Kumar Jha, Jinwei Wang, Ninoslav Marina:
A novel model-driven deterministic approach to wind power imputation. Sustain. Comput. Informatics Syst. 36: 100818 (2022) - [j58]Hao Wang, Jinwei Wang, Xiangyang Luo, Yuhui Zheng, Bin Ma, Jinsheng Sun, Sunil Kr. Jha:
Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4065-4080 (2022) - [j57]Jinwei Wang, Junjie Zhao, Qilin Yin, Xiangyang Luo, Yuhui Zheng, Yun-Qing Shi, Sunil Kr. Jha:
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection. IEEE Trans. Multim. 24: 230-244 (2022) - [c23]Jinwei Wang, Xiaocheng Song, Liang Sun:
Dual-Quaternion-Based Sampled-Data Pose Tracking Control of Spacecraft. ASCC 2022: 2127-2132 - [c22]Hao Wu, Jinwei Wang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method. IWDW 2022: 83-97 - [i2]Jiawei Zhang, Jinwei Wang, Hao Wang, Xiangyang Luo:
Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks. CoRR abs/2204.12050 (2022) - 2021
- [j56]Yi Zhang, Xiangyang Luo, Jinwei Wang, Yanqing Guo, Fenlin Liu:
Image robust adaptive steganography adapted to lossy channels in open social networks. Inf. Sci. 564: 306-326 (2021) - [j55]Luhui Yang, Guangjie Liu, Jinwei Wang, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Fast3DS: A real-time full-convolutional malicious domain name detection system. J. Inf. Secur. Appl. 61: 102933 (2021) - [j54]Leiming Yan, Kai Chen, Shikun Tong, Jinwei Wang, Zhen Chen:
Identifying forged seal imprints using positive and unlabeled learning. Multim. Tools Appl. 80(20): 30761-30773 (2021) - [j53]Le Sun, Xiangbo Song, Huxiang Guo, Guangrui Zhao, Jinwei Wang:
Patch-Wise Semantic Segmentation for Hyperspectral Images via a Cubic Capsule Network with EMAP Features. Remote. Sens. 13(17): 3497 (2021) - [j52]Liyan Zhu, Jinwei Wang, Xiangyang Luo, Yi Zhang, Chunfang Yang, Fenlin Liu:
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks. Secur. Commun. Networks 2021: 9864833:1-9864833:15 (2021) - [j51]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun Qing Shi, Sunil Kr. Jha:
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature. ACM Trans. Multim. Comput. Commun. Appl. 17(4): 138:1-138:18 (2021) - [c21]Zhenjie Yao, Yixin Chen, Jinwei Wang, Shouling Wu, Yanhui Tu, Minghui Zhao, Luxia Zhang:
Trend Analysis Neural Networks for Interpretable Analysis of Longitudinal Data. IEEE BigData 2021: 6061-6063 - [c20]Jinwei Wang, Yong Li, Xi Chen, Yongbin Zhou:
Modeling Password Guessability via Variational Auto-Encoder. CSCWD 2021: 348-353 - [c19]Jiawei Zhang, Jinwei Wang, Xiangyang Luo, Bin Ma, Naixue Xiong:
Imperceptible and Reliable Adversarial Attack. FCS 2021: 49-62 - [c18]Junfeng Wu, Jinwei Wang, Junjie Zhao, Xiangyang Luo:
StrGAN for Generating Enhanced Samples. ISPEC 2021: 363-373 - [c17]Hao Wang, Jinwei Wang, Xiangyang Luo, Qilin Yin, Bin Ma, Jinsheng Sun:
Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics. IWDW 2021: 72-86 - [i1]Shichang Ding, Xiangyang Luo, Jinwei Wang, Neal Naixue Xiong:
GCN-Geo: A Graph Convolution Network-based Fine-grained IP Geolocation System. CoRR abs/2112.10767 (2021) - 2020
- [j50]Luhui Yang, Guangjie Liu, Yuewei Dai, Jinwei Wang, Jiangtao Zhai:
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework. IEEE Access 8: 82876-82889 (2020) - [j49]Jinwei Wang, Qiye Ni, Guangjie Liu, Xiangyang Luo, Sunil Kr. Jha:
Image splicing detection based on convolutional neural network with weight combination strategy. J. Inf. Secur. Appl. 54: 102523 (2020) - [j48]Jinwei Wang, Renfeng Liu, Hao Wang, Bin Wu, Yun-Qing Shi:
Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform. KSII Trans. Internet Inf. Syst. 14(7): 2981-2996 (2020) - [j47]Chen Jin, Zeshui Xu, Jinwei Wang:
Assessing economic losses of haze with uncertain probabilistic linguistic analytic hierarchy process. J. Intell. Fuzzy Syst. 39(5): 7547-7569 (2020) - [j46]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain. J. Real Time Image Process. 17(1): 7-16 (2020) - [j45]Jinwei Wang, Xiangbo Song, Le Sun, Wei Huang, Jin Wang:
A Novel Cubic Convolutional Neural Network for Hyperspectral Image Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 4133-4148 (2020) - [j44]Jinwei Wang, Hao Wang, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2736-2749 (2020) - [c16]Qilin Yin, Jinwei Wang, Xiangyang Luo:
A Hybrid Loss Network for Localization of Image Manipulation. IWDW 2020: 237-247 - [c15]Junjie Zhao, Jinwei Wang:
Lightweight DCT-Like Domain Forensics Model for Adversarial Example. IWDW 2020: 265-279 - [e2]Xingming Sun, Jinwei Wang, Elisa Bertino:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12239, Springer 2020, ISBN 978-3-030-57883-1 [contents] - [e1]Xingming Sun, Jinwei Wang, Elisa Bertino:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12240, Springer 2020, ISBN 978-3-030-57880-0 [contents]
2010 – 2019
- 2019
- [j43]Qilin Yin, Jinwei Wang, Xiangyang Luo, Jiangtao Zhai, Sunil Kr. Jha, Yun-Qing Shi:
Quaternion Convolutional Neural Network for Color Image Classification and Forensics. IEEE Access 7: 20293-20301 (2019) - [j42]Jun Chen, Xiangyang Luo, Yingying Liu, Jinwei Wang, Yuanyuan Ma:
Selective Learning Confusion Class for Text-Based CAPTCHA Recognition. IEEE Access 7: 22246-22259 (2019) - [j41]Hao Wang, Jinwei Wang, Jiangtao Zhai, Xiangyang Luo:
Detection of Triple JPEG Compressed Color Images. IEEE Access 7: 113094-113102 (2019) - [j40]Jian Li, Jinwei Wang, Shuang Yu, Xiangyang Luo:
A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation. Int. J. Digit. Crime Forensics 11(1): 100-113 (2019) - [j39]Jinwei Wang, Ting Li, Frank Y. Shih:
Discrimination of Computer Generated and Photographic Images Based on CQWT Quaternion Markov Features. Int. J. Pattern Recognit. Artif. Intell. 33(2): 1954007:1-1954007:13 (2019) - [j38]Jinwei Wang, Guojing Wu, Jian Li, Sunil Kr. Jha:
A new method estimating linear gaussian filter kernel by image PRNU noise. J. Inf. Secur. Appl. 44: 1-11 (2019) - [j37]Jinwei Wang, Yangyang Li, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness. J. Inf. Secur. Appl. 47: 353-362 (2019) - [j36]Youcai Gao, Jinwei Wang, Yun-Qing Shi:
Dynamic multi-watermarking and detecting in DWT domain. J. Real Time Image Process. 16(3): 565-576 (2019) - [j35]Jinwei Wang, Ting Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain. IEEE Trans. Circuits Syst. Video Technol. 29(9): 2775-2785 (2019) - [c14]Jinwei Wang, Wei Huang, Xiangyang Luo, Yung-Qing Shi:
Double JPEG Compression Detection Based on Markov Model. IWDW 2019: 141-149 - 2018
- [j34]Jinwei Wang, Huazhi Sun:
Pain Intensity Estimation Using Deep Spatiotemporal and Handcrafted Features. IEICE Trans. Inf. Syst. 101-D(6): 1572-1580 (2018) - [j33]Ruxin Wang, Wei Lu, Jixian Li, Shijun Xiang, Xianfeng Zhao, Jinwei Wang:
Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain. Int. J. Digit. Crime Forensics 10(4): 90-107 (2018) - [j32]Guangyuan Yang, Xiaolong Li, Jinwei Wang, Zongming Guo:
Efficient large payloads ternary matrix embedding. Multim. Tools Appl. 77(2): 1605-1622 (2018) - [j31]Heng Yao, Fang Cao, Zhenjun Tang, Jinwei Wang, Tong Qiao:
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multim. Tools Appl. 77(14): 18139-18161 (2018) - [j30]Beijing Chen, Chunfei Zhou, Byeungwoo Jeon, Yuhui Zheng, Jinwei Wang:
Quaternion discrete fractional random transform for color image adaptive watermarking. Multim. Tools Appl. 77(16): 20809-20837 (2018) - [j29]Bo Zhao, Lei Huang, Jian Li, Maliang Liu, Jinwei Wang:
Deceptive SAR Jamming Based on 1-bit Sampling and Time-Varying Thresholds. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 11(3): 939-950 (2018) - [c13]Sunil Kr. Jha, Parimala Paramasivam, Zhaoqing Pan, Jinwei Wang:
Decision Stump and StackingC-Based Hybrid Algorithm for Healthcare Data Classification. ICCCS (5) 2018: 205-216 - 2017
- [j28]Fang Cao, Bowen An, Jinwei Wang, Dengpan Ye, Huili Wang:
Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46: 52-60 (2017) - [j27]Bo Ou, Xiaolong Li, Jinwei Wang, Fei Peng:
High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion. Neurocomputing 226: 23-34 (2017) - [j26]Yanyan Xu, Jiaying Gong, Lizhi Xiong, Zhengquan Xu, Jinwei Wang, Yun-Qing Shi:
A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43: 164-172 (2017) - [j25]Jinwei Wang, Shiguo Lian, Yun-Qing Shi:
Hybrid multiplicative multi-watermarking in DWT domain. Multidimens. Syst. Signal Process. 28(2): 617-636 (2017) - [j24]Chuan Qin, Ping Ji, Jinwei Wang, Chin-Chen Chang:
Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multim. Tools Appl. 76(2): 2267-2287 (2017) - [j23]Heng Yao, Shuozhong Wang, Xinpeng Zhang, Chuan Qin, Jinwei Wang:
Detecting Image Splicing Based on Noise Level Inconsistency. Multim. Tools Appl. 76(10): 12457-12479 (2017) - [j22]Bowen Xue, Xiaolong Li, Jinwei Wang, Zongming Guo:
Improved reversible data hiding based on two-dimensional difference-histogram modification. Multim. Tools Appl. 76(11): 13473-13491 (2017) - [j21]Jinwei Wang, Ting Li, Yun-Qing Shi, Shiguo Lian, Jingyu Ye:
Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multim. Tools Appl. 76(22): 23721-23737 (2017) - [j20]Chuan Qin, Ping Ji, Xinpeng Zhang, Jing Dong, Jinwei Wang:
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138: 280-293 (2017) - [j19]Yanzhen Ren, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. IEEE Trans. Inf. Forensics Secur. 12(6): 1345-1357 (2017) - [c12]Shuang Yu, Jian Li, Jinwei Wang:
A Novel Robust Reversible Watermarking Scheme Based on IWT. ICCCS (1) 2017: 39-48 - 2016
- [j18]Chuan Qin, Xueqin Chen, Dengpan Ye, Jinwei Wang, Xingming Sun:
A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361-362: 84-99 (2016) - [j17]Bo Ou, Xiaolong Li, Jinwei Wang:
Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification. J. Vis. Commun. Image Represent. 38: 328-339 (2016) - [j16]Bo Ou, Xiaolong Li, Jinwei Wang:
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. J. Vis. Commun. Image Represent. 39: 12-23 (2016) - [j15]Shuli Zheng, Dandan Li, Donghui Hu, Dengpan Ye, Lina Wang, Jinwei Wang:
Lossless data hiding algorithm for encrypted images with high capacity. Multim. Tools Appl. 75(21): 13765-13778 (2016) - [j14]Jinwei Wang, Leiming Yan, Jin Han, Yuxiang Wang:
Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet. Secur. Commun. Networks 9(4): 357-365 (2016) - [j13]Zhaohong Li, Zhenzhen Zhang, Sheng Guo, Jinwei Wang:
Video inter-frame forgery identification based on the consistency of quotient of MSSIM. Secur. Commun. Networks 9(17): 4548-4556 (2016) - 2015
- [j12]Jinwei Wang, Shiguo Lian, Jin Wang:
Hybrid additive multi-watermarking and decoding. Multim. Syst. 21(4): 345-361 (2015) - 2014
- [j11]Qinghua Ma, Jinwei Wang, Rongnian Wang, Xiaohua Ke:
Study on some qualitative properties for solutions of a certain two-dimensional fractional differential system with Hadamard derivative. Appl. Math. Lett. 36: 7-13 (2014) - [j10]Zengsi Chen, Jinwei Wang, Dexing Kong, Fang-Fang Dong:
A nonlocal energy minimization approach to brain image segmentation with simultaneous bias field estimation and denoising. Mach. Vis. Appl. 25(2): 529-544 (2014) - 2013
- [j9]Jinwei Wang, Xirong Ma, Yuanping Zhu, Jizhou Sun:
Auto-Tuning of Thread Assignment for Matrix-Vector Multiplication on GPUs. IEICE Trans. Inf. Syst. 96-D(11): 2319-2326 (2013) - [j8]Fang-Fang Dong, Zengsi Chen, Jinwei Wang:
A new level set method for inhomogeneous image segmentation. Image Vis. Comput. 31(10): 809-822 (2013) - [j7]Jinwei Wang, Shiguo Lian, Leiming Yan, Jin Han, Yuxiang Wang:
Hybrid additive watermarking and its decoders. Telecommun. Syst. 54(3): 305-313 (2013) - 2012
- [j6]Jinwei Wang, Shiguo Lian:
On multiwatermarking in cloud environment. Concurr. Comput. Pract. Exp. 24(17): 2151-2164 (2012) - [j5]Shiguo Lian, Xi Chen, Jinwei Wang:
Content distribution and copyright authentication based on combined indexing and watermarking. Multim. Tools Appl. 57(1): 49-66 (2012) - [j4]Jinwei Wang, Shiguo Lian:
On the hybrid multi-watermarking. Signal Process. 92(4): 893-904 (2012) - [c11]Leiming Yan, Jinwei Wang, Jin Han, Yuxiang Wang:
A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks. AICI 2012: 134-141 - [c10]Jialin Peng, Jinwei Wang, Dexing Kong:
A new convex variational model for liver segmentation. ICPR 2012: 3754-3757
2000 – 2009
- 2009
- [j3]Hua Bao, Hui Guo, Jinwei Wang, Renchao Zhou, Xuemei Lu, Suhua Shi:
MapView: visualization of short reads alignment on a desktop computer. Bioinform. 25(12): 1554-1555 (2009) - [c9]Jinwei Wang, Huazhi Sun, Jianping Fan:
DUMS: A Dynamical Updatable Monitoring System for Desktop PCs Used for Distributed Computing. TASE 2009: 309-310 - 2008
- [j2]Jinwei Wang, Shiguo Lian, Guangjie Liu, Yuewei Dai, Zhongxuan Liu, Zhen Ren:
Secure multimedia watermarking authentication in wavelet domain. J. Electronic Imaging 17(3): 033010 (2008) - [j1]Jinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian:
Locally optimum detection for Barni's multiplicative watermarking in DWT domain. Signal Process. 88(1): 117-130 (2008) - [c8]Yuewei Dai, Jinwei Wang, Guangjie Liu:
Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion. ICNSC 2008: 911-915 - 2006
- [c7]Jinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian:
Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. ICICIC (3) 2006: 471-474 - [c6]Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Semi-Fragile Watermarking Authentication with Local and Global Watermarks. AIAI 2006: 681-688 - [c5]Guangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang:
Data Hiding in Neural Network Prediction Errors. ISNN (2) 2006: 273-278 - [c4]Shiguo Lian, Zhongxuan Liu, Jinwei Wang, Zhen Ren, Haila Wang:
Secure multimedia browser over network. Visual Information Processing 2006: 62460T - 2005
- [c3]Guangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang:
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. ICNC (3) 2005: 976-979 - [c2]Guangjie Liu, Yuewei Dai, Jinwei Wang, Zhiquan Wang, Shiguo Lian:
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming. MMSP 2005: 1-4 - [c1]Jinwei Wang, Yuzhong Sun, Jianping Fan:
Analysis on Resource Utilization Patterns of Office Computer. IASTED PDCS 2005: 626-631
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-29 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint