Search Results - "Yinian Mao"

Refine Results
  1. 1

    Robust and secure image hashing by Swaminathan, A., Yinian Mao, Min Wu

    “…Image hash functions find extensive applications in content authentication, database search, and watermarking. This paper develops a novel algorithm for…”
    Get full text
    Journal Article
  2. 2

    Deriving and Validating User Experience Model for DASH Video Streaming by Yao Liu, Dey, Sujit, Ulupinar, Fatih, Luby, Michael, Yinian Mao

    Published in IEEE transactions on broadcasting (01-12-2015)
    “…Ever since video compression and streaming techniques have been introduced, measurement of perceived video quality has been a non-trivial task. Dynamic…”
    Get full text
    Journal Article
  3. 3

    A joint signal processing and cryptographic approach to multimedia encryption by Mao, Yinian, Wu, Min

    Published in IEEE transactions on image processing (01-07-2006)
    “…In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search,…”
    Get full text
    Journal Article
  4. 4

    Unicity Distance of Robust Image Hashing by Mao, Yinian, Wu, Min

    “…An image hash is a randomized compact representation of image content and finds applications in image authentication, image and video watermarking, and image…”
    Get full text
    Journal Article
  5. 5

    JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Management by Yinian Mao, Yan Sun, Min Wu, Liu, K.J. Ray

    Published in IEEE/ACM transactions on networking (01-10-2006)
    “…In secure group communications, the time cost associated with key updates in the events of member join and departure is an important aspect of quality of…”
    Get full text
    Journal Article
  6. 6

    Security evaluation for communication-friendly encryption of multimedia by Yinian Mao, Min Wu

    “…This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption…”
    Get full text
    Conference Proceeding
  7. 7

    Extended T: Learning With Mixed Closed-Set and Open-Set Noisy Labels by Xia, Xiaobo, Han, Bo, Wang, Nannan, Deng, Jiankang, Li, Jiatong, Mao, Yinian, Liu, Tongliang

    “…The noise transition matrix T, reflecting the probabilities that true labels flip into noisy ones, is of vital importance to model label noise and build…”
    Get full text
    Journal Article
  8. 8

    Extended TT: Learning With Mixed Closed-Set and Open-Set Noisy Labels by Xia, Xiaobo, Han, Bo, Wang, Nannan, Deng, Jiankang, Li, Jiatong, Mao, Yinian, Liu, Tongliang

    “…The noise transition matrix <inline-formula><tex-math notation="LaTeX">T</tex-math> <mml:math><mml:mi>T</mml:mi></mml:math><inline-graphic…”
    Get full text
    Journal Article
  9. 9

    Extended : Learning with Mixed Closed-set and Open-set Noisy Labels by Xia, Xiaobo, Han, Bo, Wang, Nannan, Deng, Jiankang, Li, Jiatong, Mao, Yinian, Liu, Tongliang

    “…The noise transition matrix [Formula Omitted], reflecting the probabilities that true labels flip into noisy ones, is of vital importance to model label noise…”
    Get full text
    Journal Article
  10. 10

    Collusion-resistant intentional de-synchronization for digital video fingerprinting by Yinian Mao, Mihcak, M.K.

    “…A powerful class of attacks in multimedia fingerprinting is known as collusion attacks, where a clique of colluders, each having a copy of the same multimedia…”
    Get full text
    Conference Proceeding
  11. 11

    LR-SVM+: Learning Using Privileged Information with Noisy Labels by Wu, Zhengning, Xia, Xiaobo, Wang, Ruxin, Li, Jiatong, Yu, Jun, Mao, Yinian, Liu, Tongliang

    Published in IEEE transactions on multimedia (2022)
    “…The paradigm of Learning Using Privileged Information (LUPI) always assumes that labels are annotated precisely. However, in practice, this assumption may be…”
    Get full text
    Journal Article
  12. 12

    A study on Quality of Experience for adaptive streaming service by Liu Yitong, Shen Yun, Mao Yinian, Liu Jing, Lin Qi, Yang Dacheng

    “…This paper proposes a Quality of Experience (QoE) test methodology for adaptive streaming service. We analyze the factors influencing the QoE of adaptive…”
    Get full text
    Conference Proceeding
  13. 13

    Security of feature extraction in image hashing by Swaminathan, A., Yinian Mao, Min Wu

    “…Security and robustness are two important requirements for image hash functions. We introduce "differential entropy" as a metric to quantify the amount of…”
    Get full text
    Conference Proceeding
  14. 14

    Dynamic join-exit amortization and scheduling for time-efficient group key agreement by Mao, Yinian, Sun, Yan, Wu, Min, Liu, K.J. Ray

    Published in IEEE INFOCOM 2004 (2004)
    “…We propose a time-efficient contributory key agreement framework for secure communications in dynamic groups. The proposed scheme employs a special…”
    Get full text
    Conference Proceeding
  15. 15

    mathcal -LiSLAM: LiDAR SLAM With Planes, Lines, and Cylinders by Zhou, Lipu, Huang, Guoquan, Mao, Yinian, Yu, Jincheng, Wang, Shengze, Kaess, Michael

    Published in IEEE robotics and automation letters (01-07-2022)
    “…Planes, lines, and cylinders widely exist in man-made environments. This letter introduces a LiDAR simultaneous localization and mapping (SLAM) system using…”
    Get full text
    Journal Article
  16. 16

    [Formula Omitted]-LiSLAM: LiDAR SLAM With Planes, Lines, and Cylinders by Zhou, Lipu, Huang, Guoquan, Mao, Yinian, Yu, Jincheng, Wang, Shengze, Kaess, Michael

    Published in IEEE robotics and automation letters (01-01-2022)
    “…Planes, lines, and cylinders widely exist in man-made environments. This letter introduces a LiDAR simultaneous localization and mapping (SLAM) system using…”
    Get full text
    Journal Article
  17. 17

    Tracing Malicious Relays in Cooperative Wireless Communications by Mao, Y., Wu, M.

    “…A cooperative communication system explores a new dimension of diversity in wireless communications to combat the unfriendly wireless environment. While this…”
    Get full text
    Journal Article
  18. 18

    EDPLVO: Efficient Direct Point-Line Visual Odometry by Zhou, Lipu, Huang, Guoquan, Mao, Yinian, Wang, Shengze, Kaess, Michael

    “…This paper introduces an efficient direct visual odometry (VO) algorithm using points and lines. Pixels on lines are generally adopted in direct methods…”
    Get full text
    Conference Proceeding
  19. 19

    Image hashing resilient to geometric and filtering operations by Swaminathan, A., Yinian Mao, Min Wu

    “…Image hash functions provide compact representations of images, which is useful for search and authentication applications. In this work, we have identified a…”
    Get full text
    Conference Proceeding
  20. 20

    Square-Root Inverse Filter-based GNSS-Visual-Inertial Navigation by Hu, Jun, Lang, Xiaoming, Zhang, Feng, Mao, Yinian, Huang, Guoquan

    Published 17-05-2024
    “…While Global Navigation Satellite System (GNSS) is often used to provide global positioning if available, its intermittency and/or inaccuracy calls for fusion…”
    Get full text
    Journal Article