default search action
Wei Lu 0001
Person information
- affiliation: Sun Yat-sen University, School of Information Science and Technology, Guangzhou, China
- affiliation (PhD 2007): Shanghai Jiao Tong University, China
- affiliation (2006 - 2007): Hong Kong Polytechnic University, Hong Kong
Other persons with the same name
- Wei Lu — disambiguation page
- Wei Lu 0002 — Rupert Labs, Mountain View, CA, USA (and 1 more)
- Wei Lu 0003 (aka: Wei D. Lu) — University of Michigan, Department of Electrical Engineering and Computer Science, MI, USA (and 3 more)
- Wei Lu 0004 — Oak Ridge Naional Laboratory, Computational Science and Engineering Division, Knoxville, TN, USA (and 1 more)
- Wei Lu 0005 — Dalian University of Technology, School of Control Science and Engineering, China
- Wei Lu 0006 — University of Electronic Science and Technology of China, School of Management and Economics, Chengdu, China (and 1 more)
- Wei Lu 0007 — University of Science and Technology of China, School of Information Science and Technology, Hefei, China
- Wei Lu 0008 — Wuhan University, School of Resource and Environmental Sciences, China
- Wei Lu 0009 — Hefei University of Technology, School of Electrical Engineering and Automation, China
- Wei Lu 0010 — Beijing Jiaotong University, School of Software Engineering, China (and 1 more)
- Wei Lu 0011 — Singapore University of Technology and Design, Singapore (and 1 more)
- Wei Lu 0012 — University of Paris-Saclay, France
- Wei Lu 0013 — Air Force Early Warning Academy, Wuhan, China
- Wei Lu 0014 — Tianjin University, School of Microelectronics, China
- Wei Lu 0015 — Renmin University of China, School of Information and DEKE, Beijing, China
- Wei Lu 0016 — Jiangxi Normal University, School of Software, Nanchang, China
- Wei Lu 0017 — University of New South Wales, Graduate School of Biomedical Engineering, Sydney, NSW, Australia
- Wei Lu 0018 — Keene State College, NH, USA (and 1 more)
- Wei Lu 0019 — Wuhan University, School of Information Management, China
- Wei Lu 0020 — University of Toronto, Toronto, ON, Canada
- Wei Lu 0021 — Shanghai Jiao Tong University, Institute of Image Communication and Network Engineering, China
- Wei Lu 0022 — Southeast University, School of Mathematics, Nanjing, China
- Wei Lu 0023 — Huawei Technologies Canada Company Ltd., Edmonton, Canada
- Wei Lu 0024 — Iowa State University, Ames, IA, USA
- Wei Lu 0025 — Memorial Sloan Kettering Cancer Center, Department of Medical Physics, NY, USA (and 3 more)
- Wei Lu 0026 — Tianjin University, School of Electrical and Information Engineering, China
- Wei Lu 0027 — National Institute of Informatics, Japan (and 1 more)
- Wei Lu 0028 — Hewlett-Packard, IPG R&D Hub, Singapore (and 2 more)
- Wei Lu 0029 — Tsinghua University, Department of Engineering Physics, Beijing, China (and 1 more)
- Wei Lu 0030 — Ant Group: Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j101]Shaowu Wu, Wei Lu, Xiaolin Yin, Rui Yang:
Robust watermarking against arbitrary scaling and cropping attacks. Signal Process. 226: 109655 (2025) - 2024
- [j100]Fenghua Zhang, Bingwen Feng, Zhihua Xia, Jian Weng, Wei Lu, Bing Chen:
Conditional image hiding network based on style transfer. Inf. Sci. 662: 120225 (2024) - [j99]Ziqi Sheng, Wenbo Xu, Cong Lin, Wei Lu, Long Ye:
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention. J. Vis. Commun. Image Represent. 98: 104014 (2024) - [j98]Chuntao Zhu, Bolin Zhang, Qilin Yin, Chengxi Yin, Wei Lu:
Deepfake detection via inter-frame inconsistency recomposition and enhancement. Pattern Recognit. 147: 110077 (2024) - [j97]Zuomin Qu, Zuping Xi, Wei Lu, Xiangyang Luo, Qian Wang, Bin Li:
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios. IEEE Trans. Inf. Forensics Secur. 19: 3943-3957 (2024) - [j96]Junyan Wu, Qilin Yin, Ziqi Sheng, Wei Lu, Jiwu Huang, Bin Li:
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations. IEEE Trans. Inf. Forensics Secur. 19: 7133-7146 (2024) - [j95]Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang:
Detection of Deepfake Videos Using Long-Distance Attention. IEEE Trans. Neural Networks Learn. Syst. 35(7): 9366-9379 (2024) - [c24]Qingfeng Zheng, Peijia Zheng, Weiqi Luo, Wei Lu:
A Fast and Tunable Privacy-Preserving Action Recognition Framework over Compressed Video. ICME 2024: 1-6 - [i5]Junyan Wu, Wei Lu, Xiangyang Luo, Rui Yang, Qian Wang, Xiaochun Cao:
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization. CoRR abs/2407.16554 (2024) - [i4]Zuomin Qu, Wei Lu, Xiangyang Luo, Qian Wang, Xiaochun Cao:
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification. CoRR abs/2409.13349 (2024) - 2023
- [j94]Hao Lin, Wenmin Huang, Weiqi Luo, Wei Lu:
DeepFake detection with multi-scale convolution and vision transformer. Digit. Signal Process. 134: 103895 (2023) - [j93]Bingwen Feng, Guofeng Li, Zhiquan Luo, Wei Lu:
Multilevel histogram shape-based image watermarking invariant to geometric attacks. IET Image Process. 17(7): 2097-2112 (2023) - [j92]Bing Chen, Xiaolin Yin, Wei Lu, Honglin Ren:
Reversible data hiding in encrypted domain by signal reconstruction. Multim. Tools Appl. 82(1): 1203-1222 (2023) - [j91]Xiaolin Yin, Shaowu Wu, Bing Chen, Ke Wang, Wei Lu:
Reversible data hiding in JPEG document images based on zero coefficients embedding. Signal Process. 206: 108917 (2023) - [j90]Guofeng Li, Bingwen Feng, Mingjin He, Jian Weng, Wei Lu:
High-capacity coverless image steganographic scheme based on image synthesis. Signal Process. Image Commun. 111: 116894 (2023) - [j89]Wei Lu, Wenbo Xu, Ziqi Sheng:
An Interpretable Image Tampering Detection Approach Based on Cooperative Game. IEEE Trans. Circuits Syst. Video Technol. 33(2): 952-962 (2023) - [j88]Xiaolin Yin, Shaowu Wu, Ke Wang, Wei Lu, Yicong Zhou, Jiwu Huang:
Anti-Rounding Image Steganography With Separable Fine-Tuned Network. IEEE Trans. Circuits Syst. Video Technol. 33(11): 7066-7079 (2023) - [j87]Qingxiao Guan, Peng Liu, Weiming Zhang, Wei Lu, Xinpeng Zhang:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. IEEE Trans. Inf. Forensics Secur. 18: 501-516 (2023) - [j86]Qilin Yin, Wei Lu, Bin Li, Jiwu Huang:
Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection. IEEE Trans. Inf. Forensics Secur. 18: 4046-4058 (2023) - [c23]Donger Mo, Peijia Zheng, Yufei Zhou, Jingyi Chen, Shan Huang, Weiqi Luo, Wei Lu, Chunfang Yang:
Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption. IWDW 2023: 63-78 - 2022
- [j85]Wenbo Xu, Junwei Luo, Chuntao Zhu, Wei Lu, Jinhua Zeng, Shaopei Shi, Cong Lin:
Document images forgery localization using a two-stream network. Int. J. Intell. Syst. 37(8): 5272-5289 (2022) - [j84]Minglin Liu, Hangyu Fan, Kangkang Wei, Weiqi Luo, Wei Lu:
Adversarial robust image steganography against lossy JPEG compression. Signal Process. 200: 108668 (2022) - [j83]Qilin Yin, Jinwei Wang, Wei Lu, Xiangyang Luo:
Contrastive Learning based Multi-task Network for Image Manipulation Detection. Signal Process. 201: 108709 (2022) - [j82]Wei Lu, Junjia Chen, Junhong Zhang, Jiwu Huang, Jian Weng, Yicong Zhou:
Secure Halftone Image Steganography Based on Feature Space and Layer Embedding. IEEE Trans. Cybern. 52(6): 5001-5014 (2022) - [j81]Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun-Qing Shi:
Robust Estimation of Upscaling Factor on Double JPEG Compressed Images. IEEE Trans. Cybern. 52(10): 10814-10826 (2022) - [j80]Bing Chen, Wei Lu, Jiwu Huang, Jian Weng, Yicong Zhou:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. IEEE Trans. Dependable Secur. Comput. 19(2): 978-991 (2022) - [c22]Ruopan Lai, Xiongjie Fang, Peijia Zheng, Hongmei Liu, Wei Lu, Weiqi Luo:
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption. ICAIS (3) 2022: 373-385 - [i3]Zechen Liang, Yuan-Gen Wang, Wei Lu, Xiaochun Cao:
ADT-SSL: Adaptive Dual-Threshold for Semi-Supervised Learning. CoRR abs/2205.10571 (2022) - 2021
- [j79]Zheng Zhao, Penghui Wang, Wei Lu:
Multi-Layer Fusion Neural Network for Deepfake Detection. Int. J. Digit. Crime Forensics 13(4): 26-39 (2021) - [j78]Jiarui Liu, Kaiman Zhu, Wei Lu, Xiangyang Luo, Xianfeng Zhao:
A lightweight 3D convolutional neural network for deepfake detection. Int. J. Intell. Syst. 36(9): 4990-5004 (2021) - [j77]Qiyue Lyu, Junwei Luo, Ke Liu, Xiaolin Yin, Jiarui Liu, Wei Lu:
Copy Move Forgery Detection based on double matching. J. Vis. Commun. Image Represent. 76: 103057 (2021) - [j76]Zhaopeng Xu, Jiarui Liu, Wei Lu, Bozhi Xu, Xianfeng Zhao, Bin Li, Jiwu Huang:
Detecting facial manipulated videos based on set convolutional neural networks. J. Vis. Commun. Image Represent. 77: 103119 (2021) - [j75]Mujian Yu, Xiaolin Yin, Wanteng Liu, Wei Lu:
Secure halftone image steganography based on density preserving and distortion fusion. Signal Process. 188: 108227 (2021) - [j74]Shangjun Luo, Jiarui Liu, Wenbo Xu, Wei Lu, Yanmei Fang, Jinhua Zeng, Shaopei Shi:
Upscaling factor estimation on pre-JPEG compressed images based on difference histogram of spectral peaks. Signal Process. Image Commun. 94: 116223 (2021) - [j73]Xiaolin Yin, Wei Lu, Wanteng Liu, Jing-Ming Guo, Jiwu Huang, Yun-Qing Shi:
Reversible Data Hiding in Halftone Images Based on Dynamic Embedding States Group. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2631-2645 (2021) - [j72]Wei Lu, Junhong Zhang, Xianfeng Zhao, Weiming Zhang, Jiwu Huang:
Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2909-2922 (2021) - [j71]Wei Lu, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang, Yun Q. Shi:
Secure Halftone Image Steganography Based on Pixel Density Transition. IEEE Trans. Dependable Secur. Comput. 18(3): 1137-1149 (2021) - [c21]Wenbo Xu, Wanteng Liu, Cong Lin, Ke Wang, Wenbin Wang, Wei Lu:
Halftone Image Steganography Based on Reassigned Distortion Measurement. ICAIS (2) 2021: 376-387 - [c20]Xiaolin Yin, Mujian Yu, Lili Chen, Ke Wang, Wei Lu:
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units. ICAIS (2) 2021: 388-399 - [c19]Junwei Luo, Cong Lin, Lingwen Zeng, Jifan Liang, Wei Lu:
Halftone Image Steganalysis by Reconstructing Grayscale Image. ICAIS (2) 2021: 412-423 - [c18]Mujian Yu, Junwei Luo, Bozhi Xu, Guoliang Chen, Wei Lu:
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition. ICAIS (2) 2021: 424-436 - [i2]Wei Lu, Lingyi Liu, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang:
Detection of Deepfake Videos Using Long Distance Attention. CoRR abs/2106.12832 (2021) - 2020
- [j70]Congge Xie, Jian Weng, Wei Lu, Lin Hou:
General construction of revocable identity-based fully homomorphic signature. Sci. China Inf. Sci. 63(3) (2020) - [j69]Jiarui Liu, Wei Lu, Yilin Zhan, Junjia Chen, Zhaopeng Xu, Ruipeng Li:
Efficient binary image steganalysis based on ensemble neural network of multi-module. J. Real Time Image Process. 17(1): 137-147 (2020) - [j68]Wenjing Lyu, Wei Lu, Ming Ma:
No-reference quality metric for contrast-distorted image based on gradient domain and HSV space. J. Vis. Commun. Image Represent. 69: 102797 (2020) - [j67]Xiaolin Yin, Wei Lu, Junhong Zhang, Jianfei Chen, Wanteng Liu:
Reversible data hiding in binary images by flipping pattern pair with opposite center pixel. J. Vis. Commun. Image Represent. 70: 102816 (2020) - [j66]Fei Xue, Wei Lu, Honglin Ren, Huimei Xiao, Qin Zhang, Xianjin Liu:
Forensics of visual privacy protection in digital images. Multim. Tools Appl. 79(17-18): 12427-12445 (2020) - [j65]Xianjin Liu, Wei Lu, Yingjie Xue, Yuileong Yeung:
Upscaling factor estimation on double JPEG compressed images. Multim. Tools Appl. 79(19-20): 12891-12914 (2020) - [j64]Wanteng Liu, Xiaolin Yin, Wei Lu, Junhong Zhang, Jinhua Zeng, Shaopei Shi, Mingzhi Mao:
Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process. 167 (2020) - [j63]Qin Zhang, Wei Lu, Tao Huang, Shangjun Luo, Zhaopeng Xu, Yijun Mao:
On the robustness of JPEG post-compression to resampling factor estimation. Signal Process. 168 (2020) - [j62]Lingwen Zeng, Wei Lu, Wanteng Liu, Junjia Chen:
Deep residual network for halftone image steganalysis with stego-signal diffusion. Signal Process. 172: 107576 (2020) - [j61]Xiaolin Yin, Wei Lu, Junhong Zhang, Wanteng Liu:
Reversible data hiding in halftone images based on minimizing the visual distortion of pixels flipping. Signal Process. 173: 107605 (2020) - [j60]Ming Ma, Wei Lu, Wenjing Lyu:
Defocus blur detection via edge pixel DCT feature of local patches. Signal Process. 176: 107670 (2020) - [j59]Xianjin Liu, Wei Lu, Qin Zhang, Jiwu Huang, Yun-Qing Shi:
Downscaling Factor Estimation on Pre-JPEG Compressed Images. IEEE Trans. Circuits Syst. Video Technol. 30(3): 618-631 (2020) - [j58]Yuileong Yeung, Wei Lu, Yingjie Xue, Jiwu Huang, Yun Qing Shi:
Secure Binary Image Steganography With Distortion Measurement Based on Prediction. IEEE Trans. Circuits Syst. Video Technol. 30(5): 1423-1434 (2020) - [j57]Wei Lu, Ruipeng Li, Lingwen Zeng, Junjia Chen, Jiwu Huang, Yun-Qing Shi:
Binary Image Steganalysis Based on Histogram of Structuring Elements. IEEE Trans. Circuits Syst. Video Technol. 30(9): 3081-3094 (2020) - [j56]Xin Chen, Jian Weng, Weiqi Luo, Wei Lu, Huimin Wu, Jiaming Xu, Qi Tian:
Sample Balancing for Deep Learning-Based Visual Recognition. IEEE Trans. Neural Networks Learn. Syst. 31(10): 3962-3976 (2020) - [c17]Bingwen Feng, Zhiquan Liu, Kaimin Wei, Wei Lu, Yuchun Lin:
Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels. IWDW 2020: 15-30
2010 – 2019
- 2019
- [j55]Xianjin Liu, Wei Lu, Wanteng Liu, Shangjun Luo, Yaohua Liang, Ming Li:
Image Deblocking Detection Based on a Convolutional Neural Network. IEEE Access 7: 26432-26439 (2019) - [j54]Yongxuan Lai, Yifan Xu, Fan Yang, Wei Lu, Quan Yu:
Privacy-aware query processing in vehicular ad-hoc networks. Ad Hoc Networks 91 (2019) - [j53]Xinchao Huang, Zihan Liu, Wei Lu, Hongmei Liu, Shijun Xiang:
Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment. Int. J. Digit. Crime Forensics 11(2): 47-62 (2019) - [j52]Yingjie Xue, Wanteng Liu, Wei Lu, Yuileong Yeung, Xianjin Liu, Hongmei Liu:
Efficient halftone image steganography based on dispersion degree optimization. J. Real Time Image Process. 16(3): 601-609 (2019) - [j51]Junhong Zhang, Wei Lu, Xiaolin Yin, Wanteng Liu, Yuileong Yeung:
Binary image steganography based on joint distortion measurement. J. Vis. Commun. Image Represent. 58: 600-605 (2019) - [j50]Huimei Xiao, Wei Lu, Ruipeng Li, Nan Zhong, Yuileong Yeung, Junjia Chen, Fei Xue, Wei Sun:
Defocus blur detection based on multiscale SVD fusion in gradient domain. J. Vis. Commun. Image Represent. 59: 52-61 (2019) - [j49]Zhaopeng Xu, Wei Lu, Qin Zhang, Yuileong Yeung, Xin Chen:
Gait recognition based on capsule network. J. Vis. Commun. Image Represent. 59: 159-167 (2019) - [j48]Xianjin Liu, Wei Lu, Tao Huang, Hongmei Liu, Yingjie Xue, Yuileong Yeung:
Scaling factor estimation on JPEG compressed images by cyclostationarity analysis. Multim. Tools Appl. 78(7): 7947-7964 (2019) - [j47]Fei Xue, Wei Lu, Ziyi Ye, Hongmei Liu:
JPEG image tampering localization based on normalized gray level co-occurrence matrix. Multim. Tools Appl. 78(8): 9895-9918 (2019) - [j46]Cong Lin, Wei Lu, Xinchao Huang, Ke Liu, Wei Sun, Hanhui Lin:
Region duplication detection based on hybrid feature and evaluative clustering. Multim. Tools Appl. 78(15): 20739-20763 (2019) - [j45]Fang Zhang, Wei Lu, Hongmei Liu, Yuileong Yeung, Yingjie Xue:
Reversible data hiding in binary images based on image magnification. Multim. Tools Appl. 78(15): 21891-21915 (2019) - [j44]Yuileong Yeung, Wei Lu, Yingjie Xue, Junjia Chen, Ruipeng Li:
Secure binary image steganography based on LTP distortion minimization. Multim. Tools Appl. 78(17): 25079-25100 (2019) - [j43]Cong Lin, Wei Lu, Xinchao Huang, Ke Liu, Wei Sun, Hanhui Lin, Zhiyuan Tan:
Copy-move forgery detection using combined features and transitive matching. Multim. Tools Appl. 78(21): 30081-30096 (2019) - [j42]Ke Liu, Wei Lu, Cong Lin, Xinchao Huang, Xianjin Liu, Yuileong Yeung, Yingjie Xue:
Copy move forgery detection based on keypoint and patch match. Multim. Tools Appl. 78(22): 31387-31413 (2019) - [j41]Bing Chen, Xiaotian Wu, Wei Lu, Honglin Ren:
Reversible data hiding in encrypted images with additive and multiplicative public-key homomorphism. Signal Process. 164: 48-57 (2019) - [j40]Honglin Ren, Wei Lu, Bing Chen:
Reversible data hiding in encrypted binary images by pixel prediction. Signal Process. 165: 268-277 (2019) - [j39]Qin Zhang, Huimei Xiao, Fei Xue, Wei Lu, Hongmei Liu, Fangjun Huang:
Digital image forensics of non-uniform deblurring. Signal Process. Image Commun. 76: 167-177 (2019) - [j38]Wei Lu, Liyu He, Yuileong Yeung, Yingjie Xue, Hongmei Liu, Bingwen Feng:
Secure Binary Image Steganography Based on Fused Distortion Measurement. IEEE Trans. Circuits Syst. Video Technol. 29(6): 1608-1618 (2019) - [j37]Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng:
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE Trans. Parallel Distributed Syst. 30(6): 1251-1266 (2019) - [c16]Wanteng Liu, Xiaolin Yin, Wei Lu, Junhong Zhang:
Halftone Image Steganography with Distortion Measurement Based on Structural Similarity. IWDW 2019: 281-292 - 2018
- [j36]Ruxin Wang, Wei Lu, Jixian Li, Shijun Xiang, Xianfeng Zhao, Jinwei Wang:
Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain. Int. J. Digit. Crime Forensics 10(4): 90-107 (2018) - [j35]Zhaozhi Xie, Wei Lu, Xianjin Liu, Yingjie Xue, Yuileong Yeung:
Copy-move detection of digital audio based on multi-feature decision. J. Inf. Secur. Appl. 43: 37-46 (2018) - [j34]Jialiang Chen, Wei Lu, Yanmei Fang, Xianjin Liu, Yuileong Yeung, Yingjie Xue:
Binary image steganalysis based on local texture pattern. J. Vis. Commun. Image Represent. 55: 149-156 (2018) - [j33]Huimin Wu, Jian Weng, Xin Chen, Wei Lu:
Feedback weight convolutional neural network for gait recognition. J. Vis. Commun. Image Represent. 55: 424-432 (2018) - [j32]Cong Lin, Wei Lu, Wei Sun, Jinhua Zeng, Tianhua Xu, Jian-Huang Lai:
Region duplication detection based on image segmentation and keypoint contexts. Multim. Tools Appl. 77(11): 14241-14258 (2018) - [j31]Fengjun Zhang, Wei Lu, Hongmei Liu, Fei Xue:
Natural image deblurring based on L0-regularization and kernel shape optimization. Multim. Tools Appl. 77(20): 26239-26257 (2018) - [j30]Qingbo Zhang, Wei Lu, Ruxin Wang, Guoqiang Li:
Digital image splicing detection based on Markov features in block DWT domain. Multim. Tools Appl. 77(23): 31239-31260 (2018) - [j29]Jixian Li, Wei Lu, Jian Weng, Yijun Mao, Guoqiang Li:
Double JPEG compression detection based on block statistics. Multim. Tools Appl. 77(24): 31895-31910 (2018) - [j28]Xin Chen, Jian Weng, Wei Lu, Jiaming Xu:
Multi-Gait Recognition Based on Attribute Discovery. IEEE Trans. Pattern Anal. Mach. Intell. 40(7): 1697-1710 (2018) - [j27]Zhijun Zhang, Lunan Zheng, Jian Weng, Yijun Mao, Wei Lu, Lin Xiao:
A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation. IEEE Trans. Cybern. 48(11): 3135-3148 (2018) - [j26]Xin Chen, Jian Weng, Wei Lu, Jiaming Xu, Jiasi Weng:
Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE Trans. Neural Networks Learn. Syst. 29(9): 3938-3952 (2018) - 2017
- [j25]Fan Yang, Jingwei Li, Wei Lu, Jian Weng:
Copy-move forgery detection based on hybrid features. Eng. Appl. Artif. Intell. 59: 73-83 (2017) - [j24]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei:
Steganalysis of content-adaptive binary image data hiding. J. Vis. Commun. Image Represent. 46: 119-127 (2017) - [j23]Jingwei Li, Fan Yang, Wei Lu, Wei Sun:
Keypoint-based copy-move detection scheme by adopting MSCRs and improved feature matching. Multim. Tools Appl. 76(20): 20483-20497 (2017) - [j22]Fei Xue, Ziyi Ye, Wei Lu, Hongmei Liu, Bin Li:
MSE period based estimation of first quantization step in double compressed JPEG images. Signal Process. Image Commun. 57: 76-83 (2017) - [c15]Yafei Yuan, Wei Lu, Bingwen Feng, Jian Weng:
Steganalysis with CNN Using Multi-channels Filtered Residuals. ICCCS (1) 2017: 110-120 - [c14]Bingwen Feng, Jian Weng, Wei Lu:
Improved Algorithms for Robust Histogram Shape-Based Image Watermarking. IWDW 2017: 275-289 - [i1]Ming Li, Jian Weng, Anjia Yang, Wei Lu:
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing. IACR Cryptol. ePrint Arch. 2017: 444 (2017) - 2016
- [j21]Qingbo Zhang, Wei Lu, Jian Weng:
Joint image splicing detection in DCT and Contourlet transform domain. J. Vis. Commun. Image Represent. 40: 449-458 (2016) - [j20]Bingwen Feng, Wei Lu, Wei Sun, Jiwu Huang, Yun-Qing Shi:
Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation. Signal Process. Image Commun. 41: 1-14 (2016) - [c13]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei:
Multiple Watermarking Using Multilevel Quantization Index Modulation. IWDW 2016: 312-326 - 2015
- [j19]Bingwen Feng, Wei Lu, Wei Sun:
Binary image steganalysis based on pixel mesh Markov transition matrix. J. Vis. Commun. Image Represent. 26: 284-295 (2015) - [j18]Bingwen Feng, Wei Lu, Wei Sun:
Novel steganographic method based on generalized K-distance N-dimensional pixel matching. Multim. Tools Appl. 74(21): 9623-9646 (2015) - [j17]Bingwen Feng, Wei Lu, Wei Sun:
Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Trans. Inf. Forensics Secur. 10(2): 243-255 (2015) - [c12]Bingwen Feng, Wei Lu, Wei Sun, Zhuoqian Liang, Juan Liu:
Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation. IWDW 2015: 239-249 - 2014
- [c11]Xu Lin, Bingwen Feng, Wei Lu, Wei Sun:
Content-Adaptive Residual for Steganalysis. IWDW 2014: 389-398 - [c10]Bingwen Feng, Wei Lu, Lu Dai, Wei Sun:
Steganography Based on High-Dimensional Reference Table. IWDW 2014: 574-587 - 2013
- [j16]Likai Chen, Wei Lu, Jiangqun Ni, Wei Sun, Jiwu Huang:
Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3): 244-254 (2013) - [c9]Bingwen Feng, Wei Lu, Wei Sun:
High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion. IWDW 2013: 514-528 - 2012
- [j15]Likai Chen, Wei Lu, Jiangqun Ni:
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection. Int. J. Digit. Crime Forensics 4(1): 49-62 (2012) - [j14]Wei Lu, Wei Sun, Hongtao Lu:
Novel robust image watermarking based on subsampling and DWT. Multim. Tools Appl. 60(1): 31-46 (2012) - [j13]Zhongwei He, Wei Lu, Wei Sun, Jiwu Huang:
Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit. 45(12): 4292-4299 (2012) - 2011
- [j12]Wei Lu, Wei Sun, Fu-Lai Chung, Hongtao Lu:
Revealing digital fakery using multiresolution decomposition and higher order statistics. Eng. Appl. Artif. Intell. 24(4): 666-672 (2011) - [j11]Zhongwei He, Wei Sun, Wei Lu, Hongtao Lu:
Digital image splicing detection based on approximate run length. Pattern Recognit. Lett. 32(12): 1591-1597 (2011) - [c8]Zhongwei He, Wei Lu, Wei Sun:
Improved Run Length Based Detection of Digital Image Splicing. IWDW 2011: 349-360 - 2010
- [j10]Wei Lu, Hongtao Lu, Fu-Lai Chung:
Feature based robust watermarking using image normalization. Comput. Electr. Eng. 36(1): 2-18 (2010) - [j9]Wei Sun, Wei Lu:
Watermark-based digital fake image detection. Int. J. Comput. Appl. Technol. 38(1/2/3): 113-117 (2010) - [c7]Wei Lu, Wei Sun, Hongtao Lu:
Blind image watermark analysis using higher order statistics. ICNC 2010: 3567-3569
2000 – 2009
- 2009
- [j8]Wei Lu, Wei Sun, Hongtao Lu:
Robust watermarking based on DWT and nonnegative matrix factorization. Comput. Electr. Eng. 35(1): 183-188 (2009) - [c6]Wei Lu, Wei Sun, Hongtao Lu:
Enriched Gabor Feature Based PCA for Face Recognition with One Training Image per Person. ICNC (2) 2009: 542-546 - 2008
- [j7]Wei Lu, Fu-Lai Chung, Hongtao Lu, Kup-Sze Choi:
Detecting fake images using watermarks and support vector machines. Comput. Stand. Interfaces 30(3): 132-136 (2008) - [j6]Wei Lu, Hongtao Lu:
Robust Watermarking based on Subsampling and Nonnegative Matrix Factorization. Informatica 19(4): 555-566 (2008) - [c5]Wei Lu, Wei Sun, Hongtao Lu:
Blind Image Watermark Analysis Using Feature Fusion and Neural Network Classifier. ISNN (2) 2008: 237-242 - 2007
- [j5]Wei Lu, Hongtao Lu, Fu-Lai Chung:
Novel robust image watermarking using difference correlation detector. Comput. Stand. Interfaces 29(1): 132-137 (2007) - 2006
- [j4]Wei Lu, Hongtao Lu, Korris Fu-Lai Chung:
Feature based watermarking using watermark template match. Appl. Math. Comput. 177(1): 377-386 (2006) - [j3]Wei Lu, Hongtao Lu, Fu-Lai Chung:
Robust digital image watermarking based on subsampling. Appl. Math. Comput. 181(2): 886-893 (2006) - [j2]Wei Lu, Fu-Lai Chung, Hongtao Lu:
Blind Fake Image Detection Scheme Using SVD. IEICE Trans. Commun. 89-B(5): 1726-1728 (2006) - [c4]Wei Lu, Fu-Lai Chung, Hongtao Lu:
Image Fakery and Neural Network Based Detection. ISNN (2) 2006: 610-615 - [c3]Wei Lu, Hongtao Lu, Fu-Lai Chung:
Robust Image Watermarking Using RBF Neural Network. ISNN (2) 2006: 623-628 - 2005
- [j1]Wei Lu, Hongtao Lu, Fu-Lai Chung:
Attacking Subsampling-Based Watermarking. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(11): 3239-3240 (2005) - [c2]Wei Lu, Hongtao Lu, Fu-Lai Chung:
Subsampling-Based Robust Watermarking Using Neural Network Detector. ISNN (2) 2005: 801-806 - 2004
- [c1]Wei Lu, Hongtao Lu, Ruimin Shen:
Color Image Watermarking Based on Neural Networks. ISNN (2) 2004: 651-656
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint