Follow
Xiaochen Yuan
Xiaochen Yuan
Macao Polytechnic University
Verified email at mpu.edu.mo - Homepage
Title
Cited by
Cited by
Year
Image forgery detection using adaptive oversegmentation and feature point matching
CM Pun, XC Yuan, XL Bi
IEEE Transactions on Information Forensics and Security 10 (8), 1705-1716, 2015
3392015
Triple-Classification of Respiratory Sounds Using Optimized S-Transform and Deep Residual Networks
H Chen, X Yuan, Z Pei, M Li, J Li
IEEE Access 7, 32845-32852, 2019
1282019
Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection
X Bi, CM Pun, XC Yuan
Information Sciences 345, 226-242, 2016
1032016
Quaternion-Based Image Hashing for Adaptive Tampering Localization
CP Yan, CM Pun, XC Yuan
IEEE Transactions on Information Forensics and Security 11 (12), 2664-2677, 2016
832016
Multi-scale noise estimation for image splicing forgery detection
CM Pun, B Liu, XC Yuan
Journal of Visual Communication and Image Representation 38, 195-206, 2016
832016
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection
CP Yan, CM Pun, XC Yuan
Signal Processing 121, 1-16, 2016
832016
Robust segments detector for de-synchronization resilient audio watermarking
CM Pun, XC Yuan
IEEE Transactions on Audio, Speech, and Language Processing 21 (11), 2412-2424, 2013
652013
Digital image forgery detection using JPEG features and local noise discrepancies
B Liu, CM Pun, XC Yuan
The Scientific World Journal 2014 (1), 230425, 2014
562014
Multi-scale feature extraction and adaptive matching for copy-move forgery detection
XL Bi, CM Pun, XC Yuan
Multimedia Tools and Applications 77, 363-385, 2018
482018
Robust Mel-Frequency Cepstral coefficients feature detection and dual-tree complex wavelet transform for digital audio watermarking
XC Yuan, CM Pun, CLP Chen
Information Sciences 298, 159-179, 2015
432015
Geometric invariant watermarking by local Zernike moments of binary image patches
XC Yuan, CM Pun, CLP Chen
Signal Processing 93 (7), 2087-2095, 2013
432013
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme
M Li, Z Tian, X Du, X Yuan, C Shan, M Guizani
Neurocomputing 518, 165-173, 2023
382023
Local multi-watermarking method based on robust and adaptive feature extraction
XC Yuan, M Li
Signal Processing 149, 103-117, 2018
382018
Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems
K Fang, T Wang, X Yuan, C Miao, Y Pan, J Li
Future Generation Computer Systems 126, 295-304, 2022
372022
Feature extraction and local Zernike moments based geometric invariant watermarking
XC Yuan, CM Pun
Multimedia tools and applications 72, 777-799, 2014
352014
Quaternion Discrete Fourier Transform-Based Color Image Watermarking Method Using Quaternion QR Decomposition
M Li, X Yuan, H Chen, J Li
IEEE Access 8, 72308-72315, 2020
312020
Robust image hashing using progressive feature selection for tampering detection
CM Pun, CP Yan, XC Yuan
Multimedia Tools and Applications 77, 11609-11633, 2018
272018
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection
CM Pun, C Yan, XC Yuan
IEEE Transactions on Information Forensics and Security 12 (2), 377-391, 2017
272017
Quaternion-valued correlation learning for few-shot semantic segmentation
Z Zheng, G Huang, X Yuan, CM Pun, H Liu, WK Ling
IEEE Transactions on Circuits and Systems for Video Technology 33 (5), 2102-2115, 2022
252022
Reinforcement learning-based optimization for mobile edge computing scheduling game
T Wang, B Lu, W Wang, W Wei, X Yuan, J Li
IEEE Transactions on Emerging Topics in Computational Intelligence 7 (1), 55-64, 2022
162022
The system can't perform the operation now. Try again later.
Articles 1–20