Search Results - "Chun-Shien Lu"
-
1
Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT
Published in IEEE transactions on image processing (01-11-2012)“…Privacy has received considerable attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario where the server is…”
Get full text
Journal Article -
2
Improving readability by modifying graphic QR code microstructure
Published in Electronics letters (01-11-2021)“…White modules of quick response codes (QR codes) are degraded by dot gain, especially when printed at smaller sizes, which results in more false blacks than…”
Get full text
Journal Article -
3
Privacy Aware Data Deduplication for Side Channel in Cloud Storage
Published in IEEE transactions on cloud computing (01-04-2020)“…Cloud storage services enable individuals and organizations to outsource data storage to remote servers. Cloud storage providers generally adopt data…”
Get full text
Journal Article -
4
Distributed Compressive Sensing: Performance Analysis With Diverse Signal Ensembles
Published in IEEE transactions on signal processing (2020)“…Distributed compressive sensing (DCS) is a framework that considers joint sparsity within signal ensembles along with multiple measurement vectors (MMVs)…”
Get full text
Journal Article -
5
Compressive Sensing Matrix Design for Fast Encoding and Decoding via Sparse FFT
Published in IEEE signal processing letters (01-04-2018)“…Compressive sensing (CS) is proposed for signal sampling below the Nyquist rate based on the assumption that the signal is sparse in some transformed domain…”
Get full text
Journal Article -
6
Greedy Algorithms for Hybrid Compressed Sensing
Published in IEEE signal processing letters (2020)“…Compressed sensing (CS) is a technique which uses fewer measurements than dictated by the Nyquist sampling theorem. The traditional CS with linear measurements…”
Get full text
Journal Article -
7
Distributed compressive video sensing
Published in 2009 IEEE International Conference on Acoustics, Speech and Signal Processing (01-04-2009)“…Low-complexity video encoding has been applicable to several emerging applications. Recently, distributed video coding (DVC) has been proposed to reduce…”
Get full text
Conference Proceeding -
8
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems
Published in IEEE communications letters (01-10-2012)“…Space shift keying (SSK) modulation and its extension, the generalized SSK (GSSK), present an attractive framework for the emerging large-scale MIMO systems in…”
Get full text
Journal Article -
9
Tree Structure Sparsity Pattern Guided Convex Optimization for Compressive Sensing of Large-Scale Images
Published in IEEE transactions on image processing (01-02-2017)“…Cost-efficient compressive sensing of large-scale images with quickly reconstructed high-quality results is very challenging. In this paper, we present an…”
Get full text
Journal Article -
10
Attention-Guided Prototype Mixing: Diversifying Minority Context on Imbalanced Whole Slide Images Classification Learning
Published in 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) (03-01-2024)“…Real-world medical datasets often suffer from class imbalance, which can lead to degraded performance due to limited samples of the minority class. In another…”
Get full text
Conference Proceeding -
11
Compressed Sensing-Based Clone Identification in Sensor Networks
Published in IEEE transactions on wireless communications (01-04-2016)“…Clone detection, aimed at detecting illegal copies with all of the credentials of legitimate sensor nodes, is of great importance for sensor networks because…”
Get full text
Journal Article -
12
Structural digital signature for image authentication: an incidental distortion resistant scheme
Published in IEEE transactions on multimedia (01-06-2003)“…The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations…”
Get full text
Journal Article -
13
MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks
Published in IEEE transactions on wireless communications (01-06-2013)“…Ensuring the security of communication and access control in Wireless Sensor Networks (WSNs) is of paramount importance. In this paper, we present a security…”
Get full text
Journal Article -
14
GPX-ADMM-Net: Interpretable Deep Neural Network for Image Compressive Sensing
Published in IEEE access (2021)“…The building of effective neural network architectures for solving image compressive sensing (CS) problems is a challenge. Hence, it is helpful to consult the…”
Get full text
Journal Article -
15
Feature-Based Sparse Representation for Image Similarity Assessment
Published in IEEE transactions on multimedia (01-10-2011)“…Assessment of image similarity is fundamentally important to numerous multimedia applications. The goal of similarity assessment is to automatically assess the…”
Get full text
Journal Article -
16
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
Published in IEEE transactions on information forensics and security (01-05-2013)“…We deal with the challenging problem of node replication detection. Although defending against node replication attacks demands immediate attention, compared…”
Get full text
Journal Article -
17
Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection
Published in IEEE transactions on multimedia (01-08-2006)“…The major disadvantage of existing watermarking methods is their limited resistance to extensive geometric attacks. In addition, we have found that the…”
Get full text
Journal Article -
18
Fragile watermarking for authenticating 3-D polygonal meshes
Published in IEEE transactions on multimedia (01-12-2005)“…Designing a powerful fragile watermarking technique for authenticating three-dimensional (3-D) polygonal meshes is a very difficult task. Yeo and Yeung were…”
Get full text
Journal Article -
19
A Necessary and Sufficient Condition for Generalized Demixing
Published in IEEE signal processing letters (01-11-2015)“…Demixing is the problem of identifying multiple structured signals from a superimposed observation. This work analyzes a general framework, based on convex…”
Get full text
Journal Article -
20
Noninteractive Pairwise Key Establishment for Sensor Networks
Published in IEEE transactions on information forensics and security (01-09-2010)“…As a security primitive, key establishment plays the most crucial role in the design of the security mechanisms. Unfortunately, the resource limitation of…”
Get full text
Journal Article