Search Results - "Yinian Mao"
-
1
Robust and secure image hashing
Published in IEEE transactions on information forensics and security (01-06-2006)“…Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for…”
Get full text
Journal Article -
2
Deriving and Validating User Experience Model for DASH Video Streaming
Published in IEEE transactions on broadcasting (01-12-2015)“…Ever since video compression and streaming techniques have been introduced, measurement of perceived video quality has been a non-trivial task. Dynamic…”
Get full text
Journal Article -
3
A joint signal processing and cryptographic approach to multimedia encryption
Published in IEEE transactions on image processing (01-07-2006)“…In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search,…”
Get full text
Journal Article -
4
Unicity Distance of Robust Image Hashing
Published in IEEE transactions on information forensics and security (01-09-2007)“…An image hash is a randomized compact representation of image content and finds applications in image authentication, image and video watermarking, and image…”
Get full text
Journal Article -
5
JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Management
Published in IEEE/ACM transactions on networking (01-10-2006)“…In secure group communications, the time cost associated with key updates in the events of member join and departure is an important aspect of quality of…”
Get full text
Journal Article -
6
Security evaluation for communication-friendly encryption of multimedia
Published in 2004 International Conference on Image Processing, 2004. ICIP '04 (2004)“…This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption…”
Get full text
Conference Proceeding -
7
Extended T: Learning With Mixed Closed-Set and Open-Set Noisy Labels
Published in IEEE transactions on pattern analysis and machine intelligence (01-03-2023)“…The noise transition matrix T, reflecting the probabilities that true labels flip into noisy ones, is of vital importance to model label noise and build…”
Get full text
Journal Article -
8
Extended TT: Learning With Mixed Closed-Set and Open-Set Noisy Labels
Published in IEEE transactions on pattern analysis and machine intelligence (01-03-2023)“…The noise transition matrix <inline-formula><tex-math notation="LaTeX">T</tex-math> <mml:math><mml:mi>T</mml:mi></mml:math><inline-graphic…”
Get full text
Journal Article -
9
Extended : Learning with Mixed Closed-set and Open-set Noisy Labels
Published in IEEE transactions on pattern analysis and machine intelligence (01-01-2023)“…The noise transition matrix [Formula Omitted], reflecting the probabilities that true labels flip into noisy ones, is of vital importance to model label noise…”
Get full text
Journal Article -
10
Collusion-resistant intentional de-synchronization for digital video fingerprinting
Published in IEEE International Conference on Image Processing 2005 (2005)“…A powerful class of attacks in multimedia fingerprinting is known as collusion attacks, where a clique of colluders, each having a copy of the same multimedia…”
Get full text
Conference Proceeding -
11
LR-SVM+: Learning Using Privileged Information with Noisy Labels
Published in IEEE transactions on multimedia (2022)“…The paradigm of Learning Using Privileged Information (LUPI) always assumes that labels are annotated precisely. However, in practice, this assumption may be…”
Get full text
Journal Article -
12
A study on Quality of Experience for adaptive streaming service
Published in 2013 IEEE International Conference on Communications Workshops (ICC) (01-06-2013)“…This paper proposes a Quality of Experience (QoE) test methodology for adaptive streaming service. We analyze the factors influencing the QoE of adaptive…”
Get full text
Conference Proceeding -
13
Security of feature extraction in image hashing
Published in Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (2005)“…Security and robustness are two important requirements for image hash functions. We introduce "differential entropy" as a metric to quantify the amount of…”
Get full text
Conference Proceeding -
14
Dynamic join-exit amortization and scheduling for time-efficient group key agreement
Published in IEEE INFOCOM 2004 (2004)“…We propose a time-efficient contributory key agreement framework for secure communications in dynamic groups. The proposed scheme employs a special…”
Get full text
Conference Proceeding -
15
mathcal -LiSLAM: LiDAR SLAM With Planes, Lines, and Cylinders
Published in IEEE robotics and automation letters (01-07-2022)“…Planes, lines, and cylinders widely exist in man-made environments. This letter introduces a LiDAR simultaneous localization and mapping (SLAM) system using…”
Get full text
Journal Article -
16
[Formula Omitted]-LiSLAM: LiDAR SLAM With Planes, Lines, and Cylinders
Published in IEEE robotics and automation letters (01-01-2022)“…Planes, lines, and cylinders widely exist in man-made environments. This letter introduces a LiDAR simultaneous localization and mapping (SLAM) system using…”
Get full text
Journal Article -
17
Tracing Malicious Relays in Cooperative Wireless Communications
Published in IEEE transactions on information forensics and security (01-06-2007)“…A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this…”
Get full text
Journal Article -
18
EDPLVO: Efficient Direct Point-Line Visual Odometry
Published in 2022 International Conference on Robotics and Automation (ICRA) (23-05-2022)“…This paper introduces an efficient direct visual odometry (VO) algorithm using points and lines. Pixels on lines are generally adopted in direct methods…”
Get full text
Conference Proceeding -
19
Image hashing resilient to geometric and filtering operations
Published in IEEE 6th Workshop on Multimedia Signal Processing, 2004 (2004)“…Image hash functions provide compact representations of images, which is useful for search and authentication applications. In this work, we have identified a…”
Get full text
Conference Proceeding -
20
Square-Root Inverse Filter-based GNSS-Visual-Inertial Navigation
Published 17-05-2024“…While Global Navigation Satellite System (GNSS) is often used to provide global positioning if available, its intermittency and/or inaccuracy calls for fusion…”
Get full text
Journal Article