Follow
Yuanman Li
Yuanman Li
Assistant Professor, Shenzhen University
Verified email at um.edu.mo - Homepage
Title
Cited by
Cited by
Year
Fast and effective image copy-move forgery detection via hierarchical feature point matching
Y Li, J Zhou
IEEE Transactions on Information Forensics and Security 14 (5), 1307-1322, 2019
1772019
Color image encryption using orthogonal Latin squares and a new 2D chaotic system
Z Hua, Z Zhu, Y Chen, Y Li
Nonlinear Dynamics 104 (4), 4505-4522, 2021
1552021
Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing
Z Hua, K Zhang, Y Li, Y Zhou
Signal Processing 183, 107998, 2021
1222021
Robust high-capacity watermarking over online social network shared images
W Sun, J Zhou, Y Li, M Cheung, J She
IEEE Transactions on Circuits and Systems for Video Technology 31 (3), 1208-1221, 2020
582020
Detecting adversarial examples from sensitivity inconsistency of spatial-transform domain
J Tian, J Zhou, Y Li, J Duan
Proceedings of the AAAI Conference on Artificial Intelligence 35 (11), 9877-9885, 2021
482021
Deep generative model for image inpainting with local binary pattern learning and spatial attention
H Wu, J Zhou, Y Li
IEEE Transactions on Multimedia 24, 4016-4027, 2021
372021
Temporal Pyramid Network with Spatial-Temporal Attention for Pedestrian Trajectory Prediction
Y Li, R Liang, W Wei, W Wang, J Zhou, X Li
IEEE Transactions on Network Science and Engineering, 2021
372021
Privacy-preserving distributed deep learning based on secret sharing
J Duan, J Zhou, Y Li
Information Sciences 527, 108-127, 2020
322020
Trajectory forecasting based on prior-aware directed graph convolutional neural network
Y Su, J Du, Y Li, X Li, R Liang, Z Hua, J Zhou
IEEE Transactions on Intelligent Transportation Systems 23 (9), 16773-16785, 2022
302022
Temporal pyramid network for pedestrian trajectory prediction with multi-supervision
R Liang, Y Li, X Li, Y Tang, J Zhou, W Zou
Proceedings of the AAAI conference on artificial intelligence 35 (3), 2029-2037, 2021
282021
Image encryption using value-differencing transformation and modified zigzag transformation
Z Hua, J Li, Y Li, Y Chen
Nonlinear Dynamics 106 (4), 3583-3599, 2021
262021
SIFT keypoint removal and injection via convex relaxation
Y Li, J Zhou, A Cheng, X Liu, YY Tang
IEEE Transactions on Information Forensics and Security 11 (8), 1722-1735, 2016
242016
Robust subspace clustering with independent and piecewise identically distributed noise modeling
Y Li, J Zhou, X Zheng, J Tian, YY Tang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2019
202019
Weighted error entropy-based information theoretic learning for robust subspace representation
Y Li, J Zhou, J Tian, X Zheng, YY Tang
IEEE Transactions on Neural Networks and Learning Systems 33 (9), 4228-4242, 2021
192021
Secure and verifiable outsourcing of nonnegative matrix factorization (NMF)
J Duan, J Zhou, Y Li
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016
192016
Image copy-move forgery detection using hierarchical feature point matching
Y Li, J Zhou
2016 Asia-Pacific Signal and Information Processing Association Annual …, 2016
172016
SIFT keypoint removal via directed graph construction for color images
Y Li, J Zhou, A Cheng
IEEE Transactions on Information Forensics and Security 12 (12), 2971-2985, 2017
162017
Privacy-preserving and verifiable deep learning inference based on secret sharing
J Duan, J Zhou, Y Li, C Huang
Neurocomputing 483, 221-234, 2022
152022
Parameter-free similarity-aware attention module for medical image classification and segmentation
J Du, K Guan, Y Zhou, Y Li, T Wang
IEEE Transactions on Emerging Topics in Computational Intelligence, 2022
142022
Meta-path based neighbors for behavioral target generalization in sequential recommendation
J Chen, Z Gong, Y Li, H Zhang, H Yu, J Zhu, G Fan, XM Wu, K Wu
IEEE Transactions on Network Science and Engineering 9 (3), 1658-1667, 2022
142022
The system can't perform the operation now. Try again later.
Articles 1–20