Search Results - "Weiqi, Luo"

Refine Results
  1. 1

    Localization of Diffusion-Based Inpainting in Digital Images by Li, Haodong, Luo, Weiqi, Huang, Jiwu

    “…Image inpainting, an image processing technique for restoring missing or damaged image regions, can be utilized by forgers for removing objects in digital…”
    Get full text
    Journal Article
  2. 2

    Edge Adaptive Image Steganography Based on LSB Matching Revisited by Luo, Weiqi, Huang, Fangjun, Huang, Jiwu

    “…The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing…”
    Get full text
    Journal Article
  3. 3

    Image Forgery Localization via Integrating Tampering Possibility Maps by Li, Haodong, Luo, Weiqi, Qiu, Xiaoqing, Huang, Jiwu

    “…Over the past decade, many efforts have been made in passive image forensics. Although it is able to detect tampered images at high accuracies based on some…”
    Get full text
    Journal Article
  4. 4

    JPEG Error Analysis and Its Applications to Digital Image Forensics by Luo, Weiqi, Huang, Jiwu, Qiu, Guoping

    “…JPEG is one of the most extensively used image formats. Understanding the inherent characteristics of JPEG may play a useful role in digital image forensics…”
    Get full text
    Journal Article
  5. 5

    BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET by Weng, Jia-Si, Weng, Jian, Zhang, Yue, Luo, Weiqi, Lan, Weiming

    Published in IEEE transactions on vehicular technology (01-01-2019)
    “…Recently, emerging SDN-based VANET (i.e., vehicular ad hoc network based on software-defined networking) enables VANET management to be programmable and…”
    Get full text
    Journal Article
  6. 6

    Residual guided coordinate attention for selection channel aware image steganalysis by Wei, Kangkang, Luo, Weiqi, Liu, Minglin, Ye, Miaoxin

    Published in Multimedia systems (01-08-2023)
    “…According to the embedding probability used in modern content adaptive steganography, some selection channel aware (SCA) methods have been proposed to enhance…”
    Get full text
    Journal Article
  7. 7

    A Concise Transmitted Torque Calculation Method for Pre-Design of Axial Permanent Magnetic Coupler by Xikang, Cheng, Wei, Liu, Yang, Zhang, Sitong, Liu, Weiqi, Luo

    Published in IEEE transactions on energy conversion (01-06-2020)
    “…In this article, a concise and practical analytical method of transmitted torque calculation for pre-design of Axial Permanent Magnetic Coupler (APMC) by…”
    Get full text
    Journal Article
  8. 8

    Orthogonal Least Squares Detector for Generalized Spatial Modulation by Wen, Jinming, Li, Jie, Ge, Huanmin, Zhou, Zhengchun, Luo, Weiqi

    “…Generalized spatial modulation (GSM), which is a novel multiple-input multiple-output (MIMO) transmission technique, has attracted massive research attention…”
    Get full text
    Journal Article
  9. 9

    A simple modelling on transmission torque of eddy‐current axial magnetic couplings considering thermal effect by Cheng, Xikang, Liu, Wei, Luo, Weiqi, Sun, Minghao, Zhang, Yang

    Published in IET electric power applications (01-04-2022)
    “…This paper proposes modelling on the transmission torque of an eddy‐current axial magnetic coupling (EAMC) considering the thermal effect. A new and simple…”
    Get full text
    Journal Article
  10. 10

    Sample Balancing for Deep Learning-Based Visual Recognition by Chen, Xin, Weng, Jian, Luo, Weiqi, Lu, Wei, Wu, Huimin, Xu, Jiaming, Tian, Qi

    “…Sample balancing includes sample selection and sample reweighting. Sample selection aims to remove some bad samples that may lead to bad local optima. Sample…”
    Get full text
    Journal Article
  11. 11

    First principles study of the structure and stability of carbynes by Luo, Weiqi, Windl, Wolfgang

    Published in Carbon (New York) (01-02-2009)
    “…Possible structures for carbynes are investigated by a first principles study and their free energy as a function of temperature and pressure is examined. A…”
    Get full text
    Journal Article
  12. 12

    Genome-wide analysis of polygalacturonase gene family from pear genome and identification of the member involved in pear softening by Zhang, Suling, Ma, Min, Zhang, Huping, Zhang, Shaoling, Qian, Ming, Zhang, Zhen, Luo, Weiqi, Fan, Jinbu, Liu, Zhiqiang, Wang, Libin

    Published in BMC plant biology (27-12-2019)
    “…Polygalacturonase (PG), as an important hydrolase participating in the degradation of pectin, plays an important role in softening process of fruit. However,…”
    Get full text
    Journal Article
  13. 13

    Clustering Steganographic Modification Directions for Color Components by Tang, Weixuan, Li, Bin, Luo, Weiqi, Huang, Jiwu

    Published in IEEE signal processing letters (01-02-2016)
    “…It is conventionally assumed that steganographic schemes for gray-scale images can be directly applied to color images by embedding messages independently in…”
    Get full text
    Journal Article
  14. 14

    Exposing Fake Bit Rate Videos and Estimating Original Bit Rates by Bian, Shan, Luo, Weiqi, Huang, Jiwu

    “…Bit rate is one of the important criterions for digital video quality. With some video tools, however, video bit rate can be easily increased without improving…”
    Get full text
    Journal Article
  15. 15

    Risk-based regionalization approach for area-wide management of HLB vectors in the Mediterranean Basin by Galvañ, Anaïs, Bassanezi, Renato Beozzo, Luo, Weiqi, Vanaclocha, Pilar, Vicent, Antonio, Lázaro, Elena

    Published in Frontiers in plant science (04-12-2023)
    “…Huanglongbing (HLB) is one of the most devastating citrus diseases worldwide. It is associated with the non-culture bacteria Liberibacter spp., which can be…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Video Sequence Matching Based on the Invariance of Color Correlation by Lei, Yanqiang, Luo, Weiqi, Wang, Yuangen, Huang, Jiwu

    “…Video sequence matching aims to locate a query video clip in a video database. It plays an important role in reducing storage redundancy and detecting video…”
    Get full text
    Journal Article
  18. 18

    Machine Learning-Based Malicious Application Detection of Android by Wei, Linfeng, Luo, Weiqi, Weng, Jian, Zhong, Yanjun, Zhang, Xiaoqian, Yan, Zheng

    Published in IEEE access (01-01-2017)
    “…In this paper, we propose a machine learning-based approach to detect malicious mobile malware in Android applications. This paper is able to capture…”
    Get full text
    Journal Article
  19. 19

    ZnO@Bi5O7I Heterojunction Derived from ZIF-8@BiOI for Enhanced Photocatalytic Activity under Visible Light by Tang, Jijun, Duan, Zhengzhou, Xu, Qinyun, Li, Chuwen, Hou, Dongmei, Gao, Guicheng, Luo, Weiqi, Wang, Yujia, Zhu, Yu

    Published in Materials (01-01-2022)
    “…In the study, ZIF-8@BIOI composites were synthesized by the hydrothermal method and then calcined to acquire the ZnO@Bi5O7I composite as a novel composite for…”
    Get full text
    Journal Article
  20. 20

    Robust Detection of Region-Duplication Forgery in Digital Image by Weiqi Luo, Jiwu Huang, Guoping Qiu

    “…Region duplication forgery, in which a part of a digital image is copied and then pasted to another portion of the same image in order to conceal an important…”
    Get full text
    Conference Proceeding