Temporal forensics and anti-forensics for motion compensated video MC Stamm, WS Lin, KJR Liu IEEE Transactions on Information Forensics and Security 7 (4), 1315-1329, 2012 | 243 | 2012 |
Targetvue: Visual analysis of anomalous user behaviors in online communication systems N Cao, C Shi, S Lin, J Lu, YR Lin, CY Lin IEEE transactions on visualization and computer graphics 22 (1), 280-289, 2015 | 170 | 2015 |
Anti-forensics of JPEG compression MC Stamm, SK Tjoa, WS Lin, KJR Liu 2010 IEEE International conference on acoustics, speech and signal …, 2010 | 163 | 2010 |
Undetectable image tampering through JPEG compression anti-forensics MC Stamm, SK Tjoa, WS Lin, KJR Liu 2010 IEEE international conference on image processing, 2109-2112, 2010 | 126 | 2010 |
Incentive cooperation strategies for peer-to-peer live multimedia streaming social networks WS Lin, HV Zhao, KJR Liu IEEE transactions on multimedia 11 (3), 396-412, 2009 | 117 | 2009 |
Insider threat prediction YX Anni R. Coden, Ching-Yung Lin, Wan-Yi Lin US Patent 9,589,245, 2017 | 97* | 2017 |
Digital image source coder forensics via intrinsic fingerprints WS Lin, SK Tjoa, HV Zhao, KJR Liu IEEE Transactions on Information Forensics and Security 4 (3), 460-475, 2009 | 96 | 2009 |
Indirect reciprocity security game for large-scale wireless networks L Xiao, Y Chen, WS Lin, KJR Liu IEEE Transactions on Information Forensics and Security 7 (4), 1368-1380, 2012 | 88 | 2012 |
Forensics vs. anti-forensics: A decision and game theoretic framework MC Stamm, WS Lin, KJR Liu 2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012 | 77 | 2012 |
Energy-efficient cellular network operation via base station cooperation F Han, Z Safar, WS Lin, Y Chen, KJR Liu 2012 IEEE international conference on communications (ICC), 4374-4378, 2012 | 72 | 2012 |
Near-optimal waveform design for sum rate optimization in time-reversal multiuser downlink systems YH Yang, B Wang, WS Lin, KJR Liu IEEE Transactions on Wireless Communications 12 (1), 346-357, 2012 | 66 | 2012 |
A new algorithm for the binate covering problem and its application to the minimization of boolean relations Jeong, Somenzi 1992 IEEE/ACM International Conference on Computer-Aided Design, 417-420, 1992 | 62* | 1992 |
Cooperative peer-to-peer streaming: An evolutionary game-theoretic approach Y Chen, B Wang, WS Lin, Y Wu, KJR Liu IEEE Transactions on Circuits and Systems for Video Technology 20 (10), 1346 …, 2010 | 60 | 2010 |
Behavior dynamics in media-sharing social networks HV Zhao, WS Lin, KJR Liu Cambridge University Press, 2011 | 48 | 2011 |
A cheat-proof game theoretic demand response scheme for smart grids Y Chen, WS Lin, F Han, YH Yang, Z Safar, KJR Liu 2012 IEEE International Conference on Communications (ICC), 3362-3366, 2012 | 42 | 2012 |
Behavior modeling and forensics for multimedia social networks HV Zhao, WS Lin, KJR Liu IEEE Signal Processing Magazine 26 (1), 118-139, 2009 | 41 | 2009 |
Defending multimodal fusion models against single-source adversaries K Yang, WY Lin, M Barman, F Condessa, Z Kolter Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 35 | 2021 |
Artificial-intelligence powered ground truth generation for object detection and tracking on image sequences GR Ji Eun Kim, Wan-Yi Lin, Lixiu Yu US Patent 11,126,855, 2021 | 27 | 2021 |
Block size forensic analysis in digital images S Tjoa, WS Lin, HV Zhao, KJR Liu 2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007 | 25 | 2007 |
Generating data from imbalanced training data sets YX Ching-Yung Lin, Wan-Yi Lin US Patent 9,224,104, 2015 | 23 | 2015 |