default search action
Shuren Qi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Shuren Qi, Yushu Zhang, Chao Wang, Tao Xiang, Xiaochun Cao, Yong Xiang:
Representing Noisy Image Without Denoising. IEEE Trans. Pattern Anal. Mach. Intell. 46(10): 6713-6730 (2024) - [j14]Chao Wang, Shuren Qi, Zhiqiu Huang, Yushu Zhang, Rushi Lan, Xiaochun Cao, Feng-Lei Fan:
Spatial-Frequency Discriminability for Revealing Adversarial Perturbations. IEEE Trans. Circuits Syst. Video Technol. 34(12): 12608-12623 (2024) - [j13]Wenying Wen, Ziye Yuan, Shuren Qi, Yushu Zhang, Yuming Fang:
PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine. IEEE Trans. Multim. 26: 5795-5806 (2024) - [j12]Yushu Zhang, Zhibin Fu, Shuren Qi, Mingfu Xue, Xiaochun Cao, Yong Xiang:
PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13874-13886 (2024) - [j11]Wenying Wen, Haigang Huang, Shuren Qi, Yushu Zhang, Yuming Fang:
Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages. IEEE Trans. Netw. Sci. Eng. 11(3): 2951-2962 (2024) - [i9]Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Jian Weng, Xiaochun Cao:
Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales. CoRR abs/2402.15430 (2024) - [i8]Shuren Qi, Fei Wang, Tieyong Zeng, Fenglei Fan:
Rethink Deep Learning with Invariance in Data Representation. CoRR abs/2412.04858 (2024) - 2023
- [j10]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. ACM Comput. Surv. 55(2): 1:1-1:35 (2023) - [j9]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Principled Design of Image Representation: Towards Forensic Tasks. IEEE Trans. Pattern Anal. Mach. Intell. 45(5): 5337-5354 (2023) - [j8]Yushu Zhang, Zhibin Fu, Shuren Qi, Mingfu Xue, Zhongyun Hua, Yong Xiang:
Localization of Inpainting Forgery With Feature Enhancement Network. IEEE Trans. Big Data 9(3): 936-948 (2023) - [j7]Chao Wang, Zhiqiu Huang, Shuren Qi, Yaoshen Yu, Guohua Shen, Yushu Zhang:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. IEEE Trans. Inf. Forensics Secur. 18: 1064-1079 (2023) - [j6]Yushu Zhang, Qing Tan, Shuren Qi, Mingfu Xue:
PRNU-based Image Forgery Localization with Deep Multi-scale Fusion. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 67:1-67:20 (2023) - [j5]Yushu Zhang, Nuo Chen, Shuren Qi, Mingfu Xue, Zhongyun Hua:
Detection of Recolored Image by Texture Features in Chrominance Components. ACM Trans. Multim. Comput. Commun. Appl. 19(3): 121:1-121:23 (2023) - [i7]Shuren Qi, Yushu Zhang, Chao Wang, Tao Xiang, Xiaochun Cao, Yong Xiang:
Representing Noisy Image Without Denoising. CoRR abs/2301.07409 (2023) - [i6]Chao Wang, Shuren Qi, Zhiqiu Huang, Yushu Zhang, Xiaochun Cao:
Towards an Accurate and Secure Detector against Adversarial Perturbations. CoRR abs/2305.10856 (2023) - [i5]Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng:
Security and Privacy on Generative Data in AIGC: A Survey. CoRR abs/2309.09435 (2023) - 2022
- [c3]Qing Tan, Shuren Qi, Yushu Zhang, Mingfu Xue:
PRNU-based Image Forgery Localization With Convolutional Neural Network. MMSP 2022: 1-6 - [i4]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Principled Design of Image Representation: Towards Forensic Tasks. CoRR abs/2203.00913 (2022) - [i3]Yushu Zhang, Nuo Chen, Shuren Qi, Mingfu Xue, Xiaochun Cao:
Detecting Recolored Image by Spatial Correlation. CoRR abs/2204.10973 (2022) - [i2]Chao Wang, Zhiqiu Huang, Shu-Ren Qi, Yaoshen Yu, Guohua Shen:
Shrinking the Semantic Gap: Spatial Pooling of Local Moment Invariants for Copy-Move Forgery Detection. CoRR abs/2207.09135 (2022) - 2021
- [j4]Hongying Yang, Shu-Ren Qi, Jialin Tian, Panpan Niu, Xiangyang Wang:
Robust and discriminative image representation: fractional-order Jacobi-Fourier moments. Pattern Recognit. 115: 107898 (2021) - [i1]Shuren Qi, Yushu Zhang, Chao Wang, Jiantao Zhou, Xiaochun Cao:
A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation. CoRR abs/2103.14799 (2021) - 2020
- [j3]Hong-Ying Yang, Shu-Ren Qi, Chao Wang, Si-bo Yang, Xiang-Yang Wang:
Image analysis by log-polar Exponent-Fourier moments. Pattern Recognit. 101: 107177 (2020) - [j2]Hong-Ying Yang, Shu-Ren Qi, Pan-Pan Niu, Xiang-Yang Wang:
Color image zero-watermarking based on fast quaternion generic polar complex exponential transform. Signal Process. Image Commun. 82: 115747 (2020)
2010 – 2019
- 2019
- [j1]Hong-Ying Yang, Shu-Ren Qi, Ying Niu, Pan-Pan Niu, Xiang-Yang Wang:
Copy-move forgery detection based on adaptive keypoints extraction and matching. Multim. Tools Appl. 78(24): 34585-34612 (2019)
2000 – 2009
- 2003
- [c2]Zhong Ji, Shuren Qi:
Detection of EEG basic rhythm feature by using band relative intensity ratio (BRIR). ICASSP (6) 2003: 429-432 - [c1]Zhong Ji, Shuren Qi:
Detection of EEG basic rhythm feature by using band relative intensity ratio(BRIR). ICME 2003: 845-848
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 22:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint