Index for yu_n

Yu, N.[Ning] Co Author Listing * 360 video compression based on sphere-rotated frame prediction
* Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints
* Cascaded Residual Density Network for Crowd Counting
* Comments on Steganography Using Reversible Texture Synthesis
* Consistent matching based on boosted salience channels for group re-identification
* Controllable Image Processing via Adaptive FilterBank Pyramid
* Cross-Modality Person Re-Identification With Shared-Specific Feature Transfer
* Decomposing Joint Distortion for Adaptive Steganography
* Denoising for Multiple Image Copies through Joint Sparse Representation
* Density-Aware Graph for Deep Semi-Supervised Visual Recognition
* Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio
* Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion
* Direct Adversarial Attack on Stego Sandwiched Between Black Boxes
* Distortion Design for Secure Adaptive 3-D Mesh Steganography
* DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense
* Effective correlation vector quantisation algorithm and its VLSI architecture
* Flow Guided Siamese Network for Visual Tracking
* Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
* in-memory relevance feedback technique for high-performance image retrieval systems, An
* JPEG Steganography With Estimated Side-Information
* Learning to Detect Multiple Photographic Defects
* LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks
* LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
* Monet: A System for Reliving Your Memories by Theme-Based Photo Storytelling
* MoVieUp: Automatic Mobile Video Mashup
* Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once
* Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism
* Part-based multi-graph ranking for visual tracking
* Pyramid Sub-Region Sensitive Network for Object Detection
* Reversible Data Hiding in Encrypted Images by Reversible Image Transformation
* Reversible Data Hiding Under Inconsistent Distortion Metrics
* Robust Superpixel-Guided Attentional Adversarial Attack
* Shortening the Cover for Fast JPEG Steganography
* Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks
* Stereoscopic Neural Style Transfer
* Texture Mixer: A Network for Controllable Synthesis and Interpolation of Texture
* Topic-Oriented Image Captioning Based on Order-Embedding
Includes: Yu, N.[Ning] Yu, N. Yu, N.[Nannan]
37 for Yu, N.

Yu, N.H.[Neng Hai] Co Author Listing * Ada-Sal Network: emulate the Human Visual System
* Adaptive color quantization based on perceptive edge protection
* Anomaly detection via 3D-HOF and fast double sparse representation
* Automatic Matching Algorithm Based on SIFT Descriptors for Remote Sensing Ship Image, An
* Coherent Online Video Style Transfer
* Complementary hashing for approximate nearest neighbor search
* Constructing a Nonnegative Low-Rank and Sparse Graph With Data-Adaptive Features
* Context and Attribute Grounded Dense Captioning
* ContextRank: Personalized Tourism Recommendation by Exploiting Context Information of Geotagged Web Photos
* Controversial pixel prior rule for JPEG adaptive steganography
* Crowd Tracking by Group Structure Evolution
* Crowd Tracking with Dynamic Evolution of Group Structures
* Decouple Learning for Parameterized Image Operators
* Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View
* Dynamic Background Subtraction Using Spatial-Color Binary Patterns
* Edge Saliency Map Detection with Texture Suppression
* Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice
* Fast Video Stitching for Aerially Captured HD Videos
* Flickr Distance: A Relationship Measure for Visual Concepts
* Fusion of SVD and LDA for face recognition
* Image camouflage by reversible image transformation
* Improving the Embedding Strategy for Batch Adaptive Steganography
* Large scale image retrieval with visual groups
* Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification
* Low-Complexity Screen Compression Scheme for Interactive Screen Sharing, A
* low-complexity screen compression scheme, A
* Memory-Based Neighbourhood Embedding for Visual Recognition
* Multi-graph similarity reinforcement for image annotation refinement
* Multiple-instance ranking: Learning to rank images for image retrieval
* Neural network with saliency based feature selection ability
* New Graph Constructor for Semi-supervised Discriminant Analysis via Group Sparsity, A
* Non-Negative Low Rank and Sparse Graph for Semi-Supervised Learning
* Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications
* Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem
* Provably Secure Generative Steganography Based on Autoregressive Model
* Real-time attacks on robust watermarking tools in the wild by CNN
* Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression
* Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability
* Reversible Data Hiding in Color Image With Grayscale Invariance
* Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models
* Reversible visual transformation via exploring the correlations within color images
* Rotation robust detection of copy-move forgery
* Scale-Invariant Visual Language Modeling for Object Categorization
* Second Order Perdicting-Error Sorting for Reversible Data Hiding
* Self-Robust 3D Point Recognition via Gather-Vector Guidance
* Semantics Disentangling for Text-To-Image Generation
* Semantics-Preserving Bag-of-Words Models and Applications
* Semi-supervised Classification via Low Rank Graph
* StyleBank: An Explicit Representation for Neural Image Style Transfer
* SVD based linear filtering in DCT domain
* Targeted attack and security enhancement on texture synthesis based steganography
* Tracking Based on SURF and Superpixel
* Zoom-Net: Mining Deep Feature Interactions for Visual Relationship Recognition
Includes: Yu, N.H.[Neng Hai] Yu, N.H.[Neng-Hai]
53 for Yu, N.H.

Yu, N.M.[Ning Mei] Co Author Listing * Efficient Salient Object Detection Model with Dilated Convolutional Networks
* Recognition of Moving Object in High Dynamic Scene for Visual Prosthesis
Includes: Yu, N.M.[Ning Mei] Yu, N.M.[Ning-Mei]

Yu, N.Y.[Nam Yul] Co Author Listing * Convolutional Compressed Sensing Using Decimated Sidelnikov Sequences
* Deterministic Construction of Real-Valued Ternary Sensing Matrices Using Optical Orthogonal Codes
* Indistinguishability of Compressed Encryption With Circulant Matrices for Wireless Security
* Robust object tracking using enhanced random ferns
* Secure Communications With Asymptotically Gaussian Compressed Encryption
Includes: Yu, N.Y.[Nam Yul] Yu, N.Y. Yu, N.Y.[Nan-Yang]

Index for "y"


Last update: 5-Oct-20 11:33:33
Use price@usc.edu for comments.