


default search action
Junhui He
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c5]Junhui He, Shangyu Wu, Weidong Wen, Chun Jason Xue, Qingan Li:
CHESS: Optimizing LLM Inference via Channel-Wise Thresholding and Selective Sparsification. EMNLP 2024: 18658-18668 - [i1]Junhui He, Shangyu Wu, Weidong Wen, Chun Jason Xue, Qingan Li:
CHESS: Optimizing LLM Inference via Channel-Wise Thresholding and Selective Sparsification. CoRR abs/2409.01366 (2024) - 2022
- [j18]Junhui He:
Analyzing the Effectiveness of Interaction Between Brand Awareness and Social Network Advertising: The Moderating Role of Social Facilitation. Int. J. Technol. Hum. Interact. 18(1): 1-18 (2022) - [j17]Yingxuan Chen, Junhui He
, Yunting Xian:
Reversible data hiding for JPEG images based on improved mapping and frequency ordering. Signal Process. 198: 108604 (2022) - [c4]Hu Wang, Junhui He:
Research on the Mechanism of Public Opinion Dissemination in Social Networks Based on Opinion Dynamics. ICCEIC 2022: 105-114 - 2021
- [j16]Tingting Xiao, Dezhi Han, Junhui He, Kuan-Ching Li
, Rodrigo Fernandes de Mello:
Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connect. Sci. 33(1): 95-112 (2021) - [j15]Hao-Tian Wu
, Ruoyan Jia, Jean-Luc Dugelay, Junhui He:
Reversible image visual transformation for privacy and content protection. Multim. Tools Appl. 80(20): 30863-30877 (2021) - 2020
- [j14]Xinming Yin, Junhui He
, Yi Guo, Dezhi Han
, Kuan-Ching Li
, Arcangelo Castiglione
:
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree. Sensors 20(20): 5735 (2020) - [j13]Junhui He
, Xinlu Pan, Hao-Tian Wu
, Shaohua Tang:
Improved block ordering and frequency selection for reversible data hiding in JPEG images. Signal Process. 175: 107647 (2020) - [j12]Junhui He
, Dezhi Han, Kuan-Ching Li
:
On one-time cookies protocol based on one-time password. Soft Comput. 24(8): 5657-5670 (2020) - [j11]Junhui He
, Yuzhang Xu, Weiqi Luo, Shaohua Tang, Jiwu Huang:
A novel selective encryption scheme for H.264/AVC video with improved visual security. Signal Process. Image Commun. 89: 115994 (2020) - [j10]Junhui He
, Junxi Chen, Shaohua Tang
:
Reversible Data Hiding in JPEG Images Based on Negative Influence Models. IEEE Trans. Inf. Forensics Secur. 15: 2121-2133 (2020) - [c3]Fakhreddine Ababsa, Junhui He, Jean-Rémy Chardonnet
:
Combining HoloLens and Leap-Motion for Free Hand-Based 3D Interaction in MR Environments. AVR (1) 2020: 315-327
2010 – 2019
- 2019
- [j9]Qing-Song Zeng, Xiao-Yu Huang, Xian-Hong Xiang, Junhui He
:
Kernel Analysis based on SVDD for Face Recognition from Image Set. J. Intell. Fuzzy Syst. 36(6): 5499-5511 (2019) - [j8]Xiao-Yu Huang, Bing Liang, Junhui He
:
Online collaborative filtering via fusing the rating consistencies. Knowl. Based Syst. 177: 94-103 (2019) - [j7]Junhui He
, Junxi Chen, Weiqi Luo, Shaohua Tang
, Jiwu Huang
:
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(12): 3501-3515 (2019) - 2018
- [j6]Junhui He
, Junxi Chen, Shichang Xiao, Xiaoyu Huang
, Shaohua Tang:
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition. Secur. Commun. Networks 2018: 7080673:1-7080673:11 (2018) - [j5]Junhui He, Bingjia Shao:
Examining the dynamic effects of social network advertising: A semiotic perspective. Telematics Informatics 35(2): 504-516 (2018) - [j4]Junhui He
, Shuhao Huang, Shaohua Tang, Jiwu Huang
:
JPEG Image Encryption With Improved Format Compatibility and File Size Preservation. IEEE Trans. Multim. 20(10): 2645-2658 (2018) - 2017
- [j3]Junhui He
, Weiqiang Lan, Shaohua Tang:
A secure image sharing scheme with high quality stego-images based on steganography. Multim. Tools Appl. 76(6): 7677-7698 (2017) - 2011
- [j2]Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi:
A Survey on Image Steganography and Steganalysis. J. Inf. Hiding Multim. Signal Process. 2(2): 142-172 (2011)
2000 – 2009
- 2009
- [c2]Zhiyuan Xie, Junhui He
, Shaohua Tang:
A CPK-Based Security Scheme at Network Layer. CIS (2) 2009: 406-410 - 2006
- [j1]Junhui He
, Jiwu Huang:
Steganalysis of stochastic modulation steganography. Sci. China Ser. F Inf. Sci. 49(3): 273-285 (2006) - 2005
- [c1]Junhui He, Jiwu Huang, Guoping Qiu
:
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. IWDW 2005: 1-14
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint