default search action
Rongrong Ni
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j81]Biao Yang, Sen Yang, Peng Wang, Hai Wang, Jiaming Jiang, Rongrong Ni, Changchun Yang:
FRPNet: An improved Faster-ResNet with PASPP for real-time semantic segmentation in the unstructured field scene. Comput. Electron. Agric. 217: 108623 (2024) - [j80]Biao Yang, Yanan Lu, Rui Wan, Hongyu Hu, Changchun Yang, Rongrong Ni:
Meta-IRLSOT++: A meta-inverse reinforcement learning method for fast adaptation of trajectory prediction networks. Expert Syst. Appl. 240: 122499 (2024) - [j79]Xin Li, Rongrong Ni, Yao Zhao, Yu Ni, Haoliang Li:
Multi-teacher Universal Distillation Based on Information Hiding for Defense Against Facial Manipulation. Int. J. Comput. Vis. 132(11): 5293-5307 (2024) - [j78]Xu Zhou, Jie Li, Gongjin Lan, Rongrong Ni, Angelo Cangelosi, Jiaxin Wang, Xiaofeng Liu:
Efficient lower layers parameter decoupling personalized federated learning method of facial expression recognition for home care robots. Inf. Fusion 106: 102261 (2024) - [j77]Biao Yang, Peng Wang, Miaomiao Cao, Xianlin Zhu, Suhong Wang, Rongrong Ni, Changchun Yang:
Uncertainty-Aware Label Contrastive Distribution Learning for Automatic Depression Detection. IEEE Trans. Comput. Soc. Syst. 11(2): 2979-2989 (2024) - [j76]Yang Yu, Xiaolong Liu, Rongrong Ni, Siyuan Yang, Yao Zhao, Alex C. Kot:
PVASS-MDD: Predictive Visual-Audio Alignment Self-Supervision for Multimodal Deepfake Detection. IEEE Trans. Circuits Syst. Video Technol. 34(8): 6926-6936 (2024) - [j75]Biao Yang, Zhiwen Wei, Hongyu Hu, Rui Wang, Yang Chang Chun, Rongrong Ni:
DPCIAN: A Novel Dual-Channel Pedestrian Crossing Intention Anticipation Network. IEEE Trans. Intell. Transp. Syst. 25(6): 6023-6034 (2024) - [j74]Biao Yang, Fucheng Fan, Rongrong Ni, Hai Wang, Ammar Jafaripournimchahi, Hongyu Hu:
A Multi-Task Learning Network With a Collision-Aware Graph Transformer for Traffic-Agents Trajectory Prediction. IEEE Trans. Intell. Transp. Syst. 25(7): 6677-6690 (2024) - [j73]Yang Yu, Rongrong Ni, Siyuan Yang, Yao Zhao, Alex C. Kot:
Narrowing Domain Gaps With Bridging Samples for Generalized Face Forgery Detection. IEEE Trans. Multim. 26: 3405-3417 (2024) - [j72]Xiaofeng Liu, Rongrong Ni, Biao Yang, Siyang Song, Angelo Cangelosi:
Unlocking Human-Like Facial Expressions in Humanoid Robots: A Novel Approach for Action Unit Driven Facial Expression Disentangled Synthesis. IEEE Trans. Robotics 40: 3850-3865 (2024) - [c59]Yuanhui Guo, Rongrong Ni, Zhitao Yu, Biao Yang:
UDA-KB: Unsupervised Domain Adaptation RGB-Thermal Semantic Segmentation via Knowledge Bridge. PRCV (10) 2024: 61-74 - 2023
- [j71]Rongrong Ni, Biao Yang, Xu Zhou, Siyang Song, Xiaofeng Liu:
Diverse local facial behaviors learning from enhanced expression flow for microexpression recognition. Knowl. Based Syst. 275: 110729 (2023) - [j70]Rui Zhai, Rongrong Ni, Yu Chen, Yang Yu, Yao Zhao:
Defending Fake via Warning: Universal Proactive Defense Against Face Manipulation. IEEE Signal Process. Lett. 30: 1072-1076 (2023) - [j69]Rongrong Ni, Biao Yang, Xu Zhou, Angelo Cangelosi, Xiaofeng Liu:
Facial Expression Recognition Through Cross-Modality Attention Fusion. IEEE Trans. Cogn. Dev. Syst. 15(1): 175-185 (2023) - [j68]Xin Li, Rongrong Ni, Pengpeng Yang, Zhiqiang Fu, Yao Zhao:
Artifacts-Disentangled Adversarial Learning for Deepfake Detection. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1658-1670 (2023) - [j67]Yang Yu, Rongrong Ni, Yao Zhao, Siyuan Yang, Fen Xia, Ning Jiang, Guoqing Zhao:
MSVT: Multiple Spatiotemporal Views Transformer for DeepFake Video Detection. IEEE Trans. Circuits Syst. Video Technol. 33(9): 4462-4471 (2023) - [j66]Huili Cai, Xiaofeng Liu, Rongrong Ni, Siyang Song, Angelo Cangelosi:
Emotion Recognition Through Combining EEG and EOG Over Relevant Channels With Optimal Windowing. IEEE Trans. Hum. Mach. Syst. 53(4): 697-706 (2023) - [j65]Haichao Yao, Rongrong Ni, Hadi Amirpour, Christian Timmerer, Yao Zhao:
Detection and Localization of Video Transcoding From AVC to HEVC Based on Deep Representations of Decoded Frames and PU Maps. IEEE Trans. Multim. 25: 5014-5029 (2023) - [j64]Yang Yu, Xiaohui Zhao, Rongrong Ni, Siyuan Yang, Yao Zhao, Alex C. Kot:
Augmented Multi-Scale Spatiotemporal Inconsistency Magnifier for Generalized DeepFake Detection. IEEE Trans. Multim. 25: 8487-8498 (2023) - [i12]Yu Chen, Yang Yu, Rongrong Ni, Yao Zhao, Haoliang Li:
NPVForensics: Jointing Non-critical Phonemes and Visemes for Deepfake Detection. CoRR abs/2306.06885 (2023) - 2022
- [j63]Yu Sun, Rongrong Ni, Yao Zhao:
MFAN: Multi-Level Features Attention Network for Fake Certificate Image Detection. Entropy 24(1): 118 (2022) - [j62]Jie Li, Xiaofeng Liu, Zhelong Wang, Hongyu Zhao, Tingting Zhang, Sen Qiu, Xu Zhou, Huili Cai, Rongrong Ni, Angelo Cangelosi:
Real-Time Human Motion Capture Based on Wearable Inertial Sensor Networks. IEEE Internet Things J. 9(11): 8953-8966 (2022) - [j61]Biao Yang, Fucheng Fan, Rongrong Ni, Jie Li, Chu Kiong Loo, Xiaofeng Liu:
Continual learning-based trajectory prediction with memory augmented networks. Knowl. Based Syst. 258: 110022 (2022) - [j60]Yu Sun, Rongrong Ni, Yao Zhao:
ET: Edge-Enhanced Transformer for Image Splicing Detection. IEEE Signal Process. Lett. 29: 1232-1236 (2022) - [j59]Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Detection of Double JPEG Compression With the Same Quantization Matrix via Convergence Analysis. IEEE Trans. Circuits Syst. Video Technol. 32(5): 3279-3290 (2022) - [j58]Wenjie Li, Xiaolong Li, Rongrong Ni, Yao Zhao:
Quantization Step Estimation for JPEG Image Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(7): 4816-4827 (2022) - [j57]Yang Yu, Rongrong Ni, Wenjie Li, Yao Zhao:
Detection of AI-Manipulated Fake Faces via Mining Generalized Features. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 94:1-94:23 (2022) - [c58]Xiaohui Zhao, Yang Yu, Rongrong Ni, Yao Zhao:
Exploring Complementarity of Global and Local Spatiotemporal Information for Fake Face Video Detection. ICASSP 2022: 2884-2888 - [c57]Tingting Chen, Yang Yu, Rongrong Ni, Yao Zhao:
Information Adversarial Disentanglement for Face Swapping. PRCV (4) 2022: 201-212 - 2021
- [j56]Hao Zou, Pengpeng Yang, Rongrong Ni, Yao Zhao:
Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network. Secur. Commun. Networks 2021: 6663486:1-6663486:8 (2021) - [j55]Wenjie Li, Xiaolong Li, Rongrong Ni, Yao Zhao:
PVO-based reversible data hiding using adaptive multiple histogram generation and modification. Signal Process. Image Commun. 99: 116405 (2021) - [j54]Qi Chang, Xiaolong Li, Yao Zhao, Rongrong Ni:
Adaptive Pairwise Prediction-Error Expansion and Multiple Histograms Modification for Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 31(12): 4850-4863 (2021) - [j53]Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni:
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering. IEEE Trans. Inf. Forensics Secur. 16: 5397-5412 (2021) - [c56]Huili Cai, Xiaofeng Liu, Aimin Jiang, Rongrong Ni, Xu Zhou, Angelo Cangelosi:
Combination of EOG and EEG for emotion recognition over different window sizes. ICHMS 2021: 1-6 - [c55]Xiying Wang, Rongrong Ni, Wenjie Li, Yao Zhao:
Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios. ICIP 2021: 3627-3631 - [c54]Dongdong Yang, Wenjie Li, Rongrong Ni, Yao Zhao:
Enhancing Adversarial Examples Transferability via Ensemble Feature Manifolds. AdvM @ ACM Multimedia 2021: 49-54 - [c53]Jianyu Ma, Haichao Yao, Rongrong Ni, Yao Zhao:
Slow Video Detection Based on Spatial-Temporal Feature Representation. PRCV (3) 2021: 298-309 - [c52]Zhibing Wang, Xin Li, Rongrong Ni, Yao Zhao:
Attention Guided Spatio-Temporal Artifacts Extraction for Deepfake Detection. PRCV (4) 2021: 374-386 - [i11]Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva:
Efficient video integrity analysis through container characterization. CoRR abs/2101.10795 (2021) - [i10]Yakun Niu, Benedetta Tondi, Yao Zhao, Rongrong Ni, Mauro Barni:
Image Splicing Detection, Localization and Attribution via JPEG Primary Quantization Matrix Estimation and Clustering. CoRR abs/2102.01439 (2021) - 2020
- [j52]Pengpeng Yang, Daniele Baracchi, Rongrong Ni, Yao Zhao, Fabrizio Argenti, Alessandro Piva:
A Survey of Deep Learning-Based Source Image Forensics. J. Imaging 6(3): 9 (2020) - [j51]Pengpeng Yang, Daniele Baracchi, Massimo Iuliani, Dasara Shullani, Rongrong Ni, Yao Zhao, Alessandro Piva:
Efficient Video Integrity Analysis Through Container Characterization. IEEE J. Sel. Top. Signal Process. 14(5): 947-954 (2020) - [j50]Haichao Yao, Rongrong Ni, Yao Zhao:
Double compression detection for H.264 videos with adaptive GOP structure. Multim. Tools Appl. 79(9-10): 5789-5806 (2020) - [j49]Yang Yu, Haichao Yao, Rongrong Ni, Yao Zhao:
Detection of fake high definition for HEVC videos based on prediction mode feature. Signal Process. 166 (2020) - [j48]Haorui Wu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Improved PPVO-based high-fidelity reversible data hiding. Signal Process. 167 (2020) - [c51]Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Primary Quality Factor Estimation Of Resized Double Compressed JPEG Images. ICIP 2020: 583-587 - [c50]Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni:
Increased-Confidence Adversarial Examples for Deep Learning Counter-Forensics. ICPR Workshops (6) 2020: 411-424 - [c49]Xiaoyu Zhao, Yakun Niu, Rongrong Ni, Yao Zhao:
Defocused Image Splicing Localization by Distinguishing Multiple Cues between Raw Naturally Blur and Artificial Blur. IWDW 2020: 153-167 - [i9]Wenjie Li, Benedetta Tondi, Rongrong Ni, Mauro Barni:
Increased-confidence adversarial examples for improved transferability of Counter-Forensic attacks. CoRR abs/2005.06023 (2020) - [i8]Yang Yu, Rongrong Ni, Yao Zhao:
Mining Generalized Features for Detecting AI-Manipulated Fake Faces. CoRR abs/2010.14129 (2020)
2010 – 2019
- 2019
- [j47]Mengmeng Zhang, Rongrong Ni, Yao Zhao:
A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution. Int. J. Digit. Crime Forensics 11(4): 28-49 (2019) - [j46]Haorui Wu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Improved reversible data hiding based on PVO and adaptive pairwise embedding. J. Real Time Image Process. 16(3): 685-695 (2019) - [j45]Haichao Yao, Rongrong Ni, Yao Zhao:
An approach to detect video frame deletion under anti-forensics. J. Real Time Image Process. 16(3): 751-764 (2019) - [j44]Wenjie Li, Rongrong Ni, Xiaolong Li, Yao Zhao:
Robust median filtering detection based on the difference of frequency residuals. Multim. Tools Appl. 78(7): 8363-8381 (2019) - [j43]Pengpeng Yang, Rongrong Ni, Yao Zhao, Wei Zhao:
Source camera identification based on content-adaptive fusion residual networks. Pattern Recognit. Lett. 119: 195-204 (2019) - [j42]Mengyao Xiao, Xiaolong Li, Yangyang Wang, Yao Zhao, Rongrong Ni:
Reversible data hiding based on pairwise embedding and optimal expansion path. Signal Process. 158: 210-218 (2019) - [j41]Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni:
An enhanced approach for detecting double JPEG compression with the same quantization matrix. Signal Process. Image Commun. 76: 89-96 (2019) - [j40]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
Secure Detection of Image Manipulation by Means of Random Feature Selection. IEEE Trans. Inf. Forensics Secur. 14(9): 2454-2469 (2019) - [c48]Shanshan Bai, Haichao Yao, Rongrong Ni, Yao Zhao:
Detection and Localization of Video Object Removal by Spatio-Temporal LBP Coherence Analysis. ICIG (3) 2019: 244-254 - [i7]Pengpeng Yang, Rongrong Ni, Yao Zhao, Gang Cao, Wei Zhao:
Dual-Domain Fusion Convolutional Neural Network for Contrast Enhancement Forensics. CoRR abs/1910.07992 (2019) - 2018
- [j39]Biao Yang, Jinmeng Cao, Rongrong Ni, Yuyu Zhang:
Facial Expression Recognition Using Weighted Mixture Deep Neural Network Based on Double-Channel Facial Images. IEEE Access 6: 4630-4640 (2018) - [j38]Biao Yang, Jinmeng Cao, Rongrong Ni, Ling Zou:
Anomaly Detection in Moving Crowds through Spatiotemporal Autoencoding and Additional Attention. Adv. Multim. 2018: 2087574:1-2087574:8 (2018) - [j37]Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu:
Security Consideration for Deep Learning-Based Image Forensics. IEICE Trans. Inf. Syst. 101-D(12): 3263-3266 (2018) - [j36]Lu Liu, Yao Zhao, Rongrong Ni, Qi Tian:
Copy-Move Forgery Localization Using Convolutional Neural Networks and CFA Features. Int. J. Digit. Crime Forensics 10(4): 140-155 (2018) - [j35]Hongshen Tang, Rongrong Ni, Yao Zhao, Xiaolong Li:
Median filtering detection of small-size image based on CNN. J. Vis. Commun. Image Represent. 51: 162-168 (2018) - [j34]Yu Sun, Rongrong Ni, Yao Zhao:
Nonoverlapping Blocks Based Copy-Move Forgery Detection. Secur. Commun. Networks 2018: 1301290:1-1301290:11 (2018) - [j33]Omar Al Shaya, Pengpeng Yang, Rongrong Ni, Yao Zhao, Alessandro Piva:
A New Dataset for Source Identification of High Dynamic Range Images. Sensors 18(11): 3801 (2018) - [c47]Pengpeng Yang, Rongrong Ni, Yao Zhao:
Double JPEG Compression Detection by Exploring the Correlations in DCT Domain. APSIPA 2018: 728-732 - [c46]Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, Rongrong Ni:
Non-Local Graph-Based Prediction for Reversible Data Hiding in Images. ICIP 2018: 1693-1697 - [c45]Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Wenjie Li:
Cycle GAN-Based Attack on Recaptured Images to Fool both Human and Machine. IWDW 2018: 83-92 - [i6]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
Secure Detection of Image Manipulation by means of Random Feature Selection. CoRR abs/1802.00573 (2018) - [i5]Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, Rongrong Ni:
Non-Local Graph-Based Prediction For Reversible Data Hiding In Images. CoRR abs/1802.06935 (2018) - [i4]Pengpeng Yang, Rongrong Ni, Yao Zhao, Gang Cao, Haorui Wu, Wei Zhao:
Robust Contrast Enhancement Forensics Using Convolutional Neural Networks. CoRR abs/1803.04749 (2018) - [i3]Wei Zhao, Pengpeng Yang, Rongrong Ni, Yao Zhao, Haorui Wu:
Security Consideration For Deep Learning-Based Image Forensics. CoRR abs/1803.11157 (2018) - [i2]Pengpeng Yang, Rongrong Ni, Yao Zhao:
Double JPEG Compression Detection by Exploring the Correlations in DCT Domain. CoRR abs/1806.01571 (2018) - 2017
- [j32]Song Li, Rongrong Ni, Yao Zhao:
A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function. J. Inf. Hiding Multim. Signal Process. 8(1): 97-108 (2017) - [j31]Yakun Niu, Yao Zhao, Rongrong Ni:
Robust median filtering detection based on local difference descriptor. Signal Process. Image Commun. 53: 65-72 (2017) - [j30]Zhipeng Chen, Yao Zhao, Rongrong Ni:
Detection of operation chain: JPEG-Resampling-JPEG. Signal Process. Image Commun. 57: 8-20 (2017) - [c44]Yanhong Wu, Xiaolong Li, Yao Zhao, Rongrong Ni:
A new detector for JPEG decompressed bitmap identification. APSIPA 2017: 842-845 - [c43]Hongshen Tang, Rongrong Ni, Yao Zhao, Xiaolong Li:
Detection of various image operations based on CNN. APSIPA 2017: 1479-1485 - [c42]Wenjie Li, Rongrong Ni, Yao Zhao:
JPEG Photo Privacy-Preserving Algorithm Based on Sparse Representation and Data Hiding. ICIG (3) 2017: 575-586 - [c41]Jingyuan Ma, Huihui Bai, Meiqin Liu, Dongxia Chang, Rongrong Ni, Yao Zhao:
Adaptive Multiple Description Depth Image Coding Based on Wavelet Sub-band Coefficients. IIH-MSP (2) 2017: 34-41 - [c40]Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao:
Recaptured Image Forensics Based on Quality Aware and Histogram Feature. IWDW 2017: 31-41 - [c39]Chenchen Cui, Rongrong Ni, Yao Zhao:
Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants. IWDW 2017: 318-330 - [c38]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
A gradient-based pixel-domain attack against SVM detection of global image manipulations. WIFS 2017: 1-6 - [i1]Pengpeng Yang, Wei Zhao, Rongrong Ni, Yao Zhao:
Source Camera Identification Based On Content-Adaptive Fusion Network. CoRR abs/1703.04856 (2017) - 2016
- [j29]Biao Yang, Rongrong Ni, Dapeng Jang:
一种对光照变化鲁棒的移动目标前景提取方法 (Robust Moving Object Foreground Extraction Approach to Illumination Change). 计算机科学 43(Z11): 186-189 (2016) - [c37]Shumei Shang, Yao Zhao, Rongrong Ni:
Double JPEG detection using high order statistic features. DSP 2016: 550-554 - [c36]Pengpeng Yang, Rongrong Ni, Yao Zhao:
Recapture Image Forensics Based on Laplacian Convolutional Neural Networks. IWDW 2016: 119-128 - [c35]Wengai Liu, Rongrong Ni, Yao Zhao:
Reversible 3D Image Data Hiding with Quality Enhancement. IWDW 2016: 446-455 - 2015
- [j28]Zhipeng Chen, Yao Zhao, Rongrong Ni:
Detection for Operation Chain: Histogram Equalization and Dither-like Operation. KSII Trans. Internet Inf. Syst. 9(9): 3751-3770 (2015) - [j27]Rongrong Ni, Yao Zhao, Xiaobo Zhai:
Recaptured Images Forensics Based On Color Moments and DCT Coefficients Features. J. Inf. Hiding Multim. Signal Process. 6(2): 323-333 (2015) - [j26]Shikui Wei, Su Jiang, Wenxian Jin, Yao Zhao, Rongrong Ni, Zhenfeng Zhu:
Redundancy filtering and fusion verification for video copy detection. Multim. Syst. 21(2): 207-216 (2015) - [j25]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni:
Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding. Signal Process. 108: 642-657 (2015) - [c34]Jianwei Li, Yao Zhao, Rongrong Ni:
Detection of Seam Carving and Contrast Enhancement Operation Chain. IIH-MSP 2015: 235-238 - [c33]Ruihan Li, Rongrong Ni, Yao Zhao:
An Effective Detection Method Based on Physical Traits of Recaptured Images on LCD Screens. IWDW 2015: 107-116 - [c32]Gang Cao, Yongbin Wang, Yao Zhao, Rongrong Ni, Chunyu Lin:
On the Security of Image Manipulation Forensics. PCM (1) 2015: 97-105 - 2014
- [j24]Gang Cao, Yao Zhao, Rongrong Ni, Huawei Tian, Lifang Yu:
Attacking contrast enhancement forensics in digital images. Sci. China Inf. Sci. 57(5): 1-13 (2014) - [j23]Lifang Yu, Yao Zhao, Rongrong Ni, Gang Cao:
A channel selection rule for YASS. Sci. China Inf. Sci. 57(8): 1-10 (2014) - [j22]Lifang Yu, Yao Zhao, Rongrong Ni, Yun-Qing Shi:
On YASS's Non-monotonic Security Performance. Circuits Syst. Signal Process. 33(11): 3527-3537 (2014) - [j21]Gang Cao, Yao Zhao, Rongrong Ni, Bo Ou, Yongbin Wang:
Forensic detection of noise addition in digital images. J. Electronic Imaging 23(2): 023004 (2014) - [j20]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni:
Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Process. Image Commun. 29(7): 760-772 (2014) - [j19]Gang Cao, Yao Zhao, Rongrong Ni, Xuelong Li:
Contrast Enhancement-Based Forensics in Digital Images. IEEE Trans. Inf. Forensics Secur. 9(3): 515-525 (2014) - [j18]Huawei Tian, Yuming Fang, Yao Zhao, Weisi Lin, Rongrong Ni, Zhenfeng Zhu:
Salient Region Detection by Fusing Bottom-Up and Top-Down Features Extracted From a Single Image. IEEE Trans. Image Process. 23(10): 4389-4398 (2014) - [c31]Rui Liu, Rongrong Ni, Yao Zhao:
A reversible data hiding based on adaptive prediction technique and histogram shifting. APSIPA 2014: 1-6 - [c30]Yahui Liu, Yao Zhao, Rongrong Ni:
Forensics of image blurring and sharpening history based on NSCT domain. APSIPA 2014: 1-4 - [c29]Rongrong Ni, Heng-Da Cheng, Yao Zhao, Lize Chen:
Adaptive reversible watermarking using trimmed prediction and pixel-selection-based sorting. ChinaSIP 2014: 616-620 - [c28]Lu Liu, Rongrong Ni, Yao Zhao, Siran Li:
Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and CFA Features. IIH-MSP 2014: 626-629 - [c27]Xiumei Qiao, Rongrong Ni, Yao Zhao:
Superpixel-Based Watermarking Scheme for Image Authentication and Recovery. IWDW 2014: 160-173 - 2013
- [j17]Huawei Tian, Yao Zhao, Zheng Wang, Rongrong Ni, Lunming Qin:
Robust Multi-Bit Watermarking for Free-View Television Using Light Field Rendering. IEICE Trans. Inf. Syst. 96-D(12): 2820-2829 (2013) - [j16]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni:
Reversible data hiding based on PDE predictor. J. Syst. Softw. 86(10): 2700-2709 (2013) - [j15]Huawei Tian, Yao Zhao, Rongrong Ni, Lunming Qin, Xuelong Li:
LDFT-Based Watermarking Resilient to Local Desynchronization Attacks. IEEE Trans. Cybern. 43(6): 2190-2201 (2013) - [j14]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni, Yun-Qing Shi:
Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding. IEEE Trans. Image Process. 22(12): 5010-5021 (2013) - [c26]Zhipeng Chen, Yao Zhao, Rongrong Ni:
Forensics of blurred images based on no-reference image quality assessment. ChinaSIP 2013: 437-441 - [c25]Su Jiang, Yao Zhao, Shikui Wei, Rongrong Ni, Zhenfeng Zhu:
Frame filtering and path verification for improving video copy detection. ICIMCS 2013: 34-37 - [c24]Xiaobo Zhai, Rongrong Ni, Yao Zhao:
Recaptured Image Detection Based on Texture Features. IIH-MSP 2013: 234-237 - [c23]Rongrong Ni, Heng-Da Cheng, Yao Zhao, Zhitong Zhang, Rui Liu:
Reversible Image Watermarking Based on Neural Network and Parity Property. MUE 2013: 285-292 - [c22]Rongrong Ni, Heng-Da Cheng, Yao Zhao, Yu Hou:
High Capacity Reversible Watermarking for Images Based on Classified Neural Network. SCIA 2013: 697-706 - 2012
- [j13]Yao Zhao, Rongrong Ni, Zhenfeng Zhu:
RST transforms resistant image watermarking based on centroid and sector-shaped partition. Sci. China Inf. Sci. 55(3): 650-662 (2012) - [j12]Lifang Yu, Yun Q. Shi, Yao Zhao, Rongrong Ni, Gang Cao:
A Study on Embedding Efficiency of Matrix Encoding. Int. J. Digit. Crime Forensics 4(1): 37-48 (2012) - [j11]Bo Ou, Yao Zhao, Rongrong Ni:
Reversible watermarking using optional prediction error histogram modification. Neurocomputing 93: 67-76 (2012) - 2011
- [j10]Gang Cao, Yao Zhao, Rongrong Ni, Alex C. Kot:
Unsharp Masking Sharpening Detection via Overshoot Artifacts Analysis. IEEE Signal Process. Lett. 18(10): 603-606 (2011) - [c21]Huawei Tian, Zheng Wang, Yao Zhao, Rongrong Ni, Lunming Qin:
Spread Spectrum-Based Multi-bit Watermarking for Free-View Video. IWDW 2011: 156-166 - 2010
- [j9]Lifang Yu, Yao Zhao, Rongrong Ni, Ting Li:
Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm. EURASIP J. Adv. Signal Process. 2010 (2010) - [j8]Nan Liu, Yao Zhao, Zhenfeng Zhu, Rongrong Ni:
Commercial Shot Classification Based on Multiple Features Combination. IEICE Trans. Inf. Syst. 93-D(9): 2651-2655 (2010) - [j7]Gang Cao, Yao Zhao, Rongrong Ni:
Edge-based Blur Metric for Tamper Detection. J. Inf. Hiding Multim. Signal Process. 1(1): 20-27 (2010) - [c20]Huawei Tian, Yao Zhao, Rongrong Ni, Jeng-Shyang Pan:
Geometrically Invariant Image Watermarking Using Scale-Invariant Feature Transform and K-Means Clustering. ICCCI (1) 2010: 128-135 - [c19]Gang Cao, Yao Zhao, Rongrong Ni:
Forensic estimation of gamma correction in digital images. ICIP 2010: 2097-2100 - [c18]Yue Ming, Qiuqi Ruan, Rongrong Ni:
Learning effective features for 3D face recognition. ICIP 2010: 2421-2424 - [c17]Shuai Liu, Qiuqi Ruan, Rongrong Ni:
Orthogonal Discriminant Neighborhood Preserving Embedding for facial expression recognition. ICIP 2010: 2757-2760 - [c16]Gang Cao, Yao Zhao, Rongrong Ni, Lifang Yu, Huawei Tian:
Forensic detection of median filtering in digital images. ICME 2010: 89-94 - [c15]Lifang Yu, Yao Zhao, Rongrong Ni, Yun Q. Shi:
A high-performance YASS-like scheme using randomized big-blocks. ICME 2010: 474-479 - [c14]Huawei Tian, Yao Zhao, Rongrong Ni, Jeng-Shyang Pan:
Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform. IIH-MSP 2010: 442-445 - [c13]Bo Ou, Yao Zhao, Rongrong Ni, Gang Cao:
A High Payload Histogram-Based Reversible Wartermarking Using Linear Prediction. IIH-MSP 2010: 446-449 - [c12]Bo Ou, Yao Zhao, Rongrong Ni:
Reversible Watermarking Using Prediction Error Histogram and Blocking. IWDW 2010: 170-180 - [c11]Gang Cao, Yao Zhao, Rongrong Ni, Huawei Tian:
Anti-forensics of contrast enhancement in digital images. MM&Sec 2010: 25-34
2000 – 2009
- 2009
- [j6]ShaoWei Weng, Yao Zhao, Rongrong Ni, Jeng-Shyang Pan:
Lossless data hiding based on prediction-error adjustment. Sci. China Ser. F Inf. Sci. 52(2): 269-275 (2009) - [j5]Lifang Yu, Yao Zhao, Rongrong Ni, Zhenfeng Zhu:
PM1 steganography in JPEG images using genetic algorithm. Soft Comput. 13(4): 393-400 (2009) - [c10]Gang Cao, Yao Zhao, Rongrong Ni:
Detection of image sharpening based on histogram aberration and ringing artifacts. ICME 2009: 1026-1029 - 2008
- [j4]Rongrong Ni, Qiuqi Ruan:
Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback. IEICE Trans. Inf. Syst. 91-D(8): 2196-2198 (2008) - [j3]ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni:
Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs. IEEE Signal Process. Lett. 15: 721-724 (2008) - [c9]Rongrong Ni, Qiuqi Ruan, Yao Zhao, Yanxia Wang:
Image authentication based on chaotic system with feedback and palm characteristics. EUSIPCO 2008: 1-5 - [c8]ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni:
Reversible watermarking based on PMO of triplets. ICIP 2008: 453-456 - [c7]ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni:
Reversible Watermarking Based on the Invariant Sum Value. ISDA (3) 2008: 331-334 - [c6]Ting Li, Yao Zhao, Rongrong Ni, Lifang Yu:
A High Capacity Steganographic Algorithm in Color Images. IWDW 2008: 218-228 - 2007
- [j2]Rongrong Ni, Qiuqi Ruan, Jun Lu:
Adaptive Watermarking and Performance Analysis Based on Image Content. Int. J. Wavelets Multiresolution Inf. Process. 5(1): 173-185 (2007) - [c5]ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni:
A Novel Reversible Watermarking Based on an Integer Transform. ICIP (3) 2007: 241-244 - [c4]ShaoWei Weng, Yao Zhao, Jeng-Shyang Pan, Rongrong Ni:
A Novel High-Capacity Reversiblewatermarking Scheme. ICME 2007: 631-634 - 2006
- [c3]Rongrong Ni, Qiuqi Ruan:
Adaptive Watermarking Model and Detection Performance Analysis. ICICIC (3) 2006: 479-482 - [c2]Rongrong Ni, Qiuqi Ruan:
Region of Interest Watermarking Based on Fractal Dimension. ICPR (3) 2006: 934-937 - 2005
- [j1]Rongrong Ni, Qiuqi Ruan, Heng-Da Cheng:
Secure semi-blind watermarking based on iteration mapping and image features. Pattern Recognit. 38(3): 357-368 (2005) - [c1]Jun Lu, Qiuqi Ruan, Rongrong Ni:
A Scalable Overlay Multicast Congestion Control for Multimedia Streaming. LCN 2005: 400-407
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint