default search action
Bin Yang 0001
Person information
- affiliation: Peking University, Institute of Computer Science and Technology, Beijing, China
Other persons with the same name
- Bin Yang (aka: Yang Bin) — disambiguation page
- Bin Yang 0002 — East China Normal University, China (and 4 more)
- Bin Yang 0003 — Technical University Munich, Faculty of Civil Engineering and Surveying, Germany
- Bin Yang 0004 — Northwest A&F University, College of Science,Yangling, China (and 1 more)
- Bin Yang 0005 — University Pierre and Marie Curie-Sorbonne University, Paris, France
- Bin Yang 0006 — Huazhong University of Science & Technology, Wuhan, China
- Bin Yang 0007 — Nankai University, College of Software, Tianjin, China
- Bin Yang 0008 — Hunan University, Key Laboratory of Visual Perception and Artificial Intelligence of Hunan Province, Changsha, China (and 2 more)
- Bin Yang 0009 — University of Stuttgart, Institute of Signal Processing and System Theory, Germany (and 2 more)
- Bin Yang 0010 — Aalto University, School of Electrical Engineering, Espoo, Finland (and 2 more)
- Bin Yang 0011 — Central South University, School of Information Science and Engineering, Changsha, China
- Bin Yang 0012 — Fudan University, Department of Electronic Engineering, Key Laboratory for Information Science of Electromagnetic Waves, Shanghai, China (and 1 more)
- Bin Yang 0013 — Central South University, School of Geosciences and Info-Physics, Changsha, China (and 1 more)
- Bin Yang 0014 — Chang'an University, State Engineering Laboratory of Highway Maintenance Equipment, Xi'an, China
- Bin Yang 0015 — Zhengzhou Information Science and Technology Institute, China
- Bin Yang 0016 (aka: Sean Bin Yang) — Aalborg University, Denmark (and 1 more)
- Bin Yang 0017 — Zaozhuang University, School of Information Science and Engineering, China
- Bin Yang 0018 — Dalian University of Technology, School of Control Science and Engineering, China (and 1 more)
- Bin Yang 0019 — East China University of Science and Technology, School of Mechanical and Power Engineering, Shanghai, China
- Bin Yang 0020 — Guangdong University of Technology, School of Civil and Transportation Engineering, Guangzhou, China
- Bin Yang 0021 — Uber Advanced Technologies Group, USA (and 1 more)
- Bin Yang 0022 — Sensetime Group Limited, Shatin, Hong Kong (and 3 more)
- Bin Yang 0023 — Hunan University, College of Electrical and Information Engineering, Changsha, China
- Bin Yang 0024 — Xi'an Jiaotong University, School of Electronics and Information Engineering, China
- Bin Yang 0025 — Jiangnan University, School of Design, Wuxi, China (and 1 more)
- Bin Yang 0026 — Wuhan University, Wuhan, China
- Bin Yang 0027 — Southeast University, Nanjin, China
- Bin Yang 0028 — North China Electric Power University, State Key Laboratory of Alternative Electrical Power System With Renewable Energy Sources, Beijing, China
- Bin Yang 0029 — Tongji University, Department of Structural Engineering, Shanghai, China
- Bin Yang 0030 — University of South China, School of Electrical Engineering, Hengyang, China (and 1 more)
- Bin Yang 0031 — Shanghai Jiao Tong University, National Key Laboratory of Science and Technology on Micro/Nano Fabrication, China
- Bin Yang 0032 — Air Force Military Medical University, Department of Biomedical Engineering, Xi'an, China (and 1 more)
- Bin Yang 0033 (aka: Yang Bin 0033) — Shanghai Maritime University, Logistics Management Department, Graduate School College, China
- Bin Yang 0034 — Hangzhou Dianzi University, School of Cyberspace, China
- Bin Yang 0035 — Zhejiang University of Technology, College of Mechanical Engineering, Hangzhou, China (and 2 more)
- Bin Yang 0036 — Beihang University, School of Reliability and Systems Engineering, Beijing, China (and 1 more)
- Bin Yang 0037 — IoT Software and Systems, Beijing Engineering Research Center, Beijing, China (and 1 more)
- Bin Yang 0038 — China Unicom Research Institute, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j15]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
A further study of large payloads matrix embedding. Inf. Sci. 324: 257-269 (2015) - [j14]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
Matrix embedding in finite abelian group. Signal Process. 113: 250-258 (2015) - [j13]Jian Li, Xiaolong Li, Bin Yang, Xingming Sun:
Segmentation-Based Image Copy-Move Forgery Detection Scheme. IEEE Trans. Inf. Forensics Secur. 10(3): 507-518 (2015) - [j12]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
Efficient Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Trans. Inf. Forensics Secur. 10(9): 2016-2027 (2015) - [c36]Fei Peng, Xiaolong Li, Bin Yang:
An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors. ICME 2015: 1-6 - 2014
- [j11]Fei Peng, Xiaolong Li, Bin Yang:
Improved PVO-based reversible data hiding. Digit. Signal Process. 25: 255-265 (2014) - [j10]Xinlu Gui, Xiaolong Li, Bin Yang:
A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 98: 370-380 (2014) - [c35]Xinlu Gui, Xiaolong Li, Wenfa Qi, Bin Yang:
Blind median filtering detection based on histogram features. APSIPA 2014: 1-4 - [c34]Xiaolong Li, Weiming Zhang, Bo Ou, Bin Yang:
A brief review on reversible data hiding: Current techniques and future prospects. ChinaSIP 2014: 426-430 - [c33]Ran Hu, Xiaolong Li, Bin Yang:
A new lossy compression scheme for encrypted gray-scale images. ICASSP 2014: 7387-7390 - [c32]Xinlu Gui, Xiaolong Li, Bin Yang:
Efficient reversible data hiding based on two-dimensional pixel-intensity-histogram modification. ICASSP 2014: 7420-7424 - [c31]Xinlu Gui, Siren Cai, Xiaolong Li, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Reference Pixels and Adaptive Block Selection. IIH-MSP 2014: 276-280 - [c30]Xinlu Gui, Xiaolong Li, Bin Yang:
Steganalysis of LSB Matching Based on Local Binary Patterns. IIH-MSP 2014: 475-480 - [c29]Xinlu Gui, Xiaolong Li, Bin Yang:
High-Dimensional Histogram Utilization for Reversible Data Hiding. IWDW 2014: 243-253 - 2013
- [j9]Xiaolong Li, Jian Li, Bin Li, Bin Yang:
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1): 198-205 (2013) - [j8]Xiaolong Li, Bin Li, Xiangyang Luo, Bin Yang, Ruihui Zhu:
Steganalysis of a PVD-based content adaptive image steganography. Signal Process. 93(9): 2529-2538 (2013) - [j7]Jian Li, Xiaolong Li, Bin Yang:
Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation. Signal Process. 93(9): 2748-2758 (2013) - [j6]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. IEEE Trans. Inf. Forensics Secur. 8(7): 1091-1100 (2013) - [j5]Xiaolong Li, Bin Li, Bin Yang, Tieyong Zeng:
General Framework to Histogram-Shifting-Based Reversible Data Hiding. IEEE Trans. Image Process. 22(6): 2181-2191 (2013) - 2012
- [j4]Fei Peng, Xiaolong Li, Bin Yang:
Adaptive reversible data hiding scheme based on integer transform. Signal Process. 92(1): 54-62 (2012) - [c28]Xinlu Gui, Xiaolong Li, Bin Yang:
A content-adaptive ±1-based steganography by minimizing the distortion of first order statistics. ICASSP 2012: 1781-1784 - [c27]Xinlu Gui, Xiaolong Li, Bin Yang:
Improved payload location for LSB matching steganography. ICIP 2012: 1125-1128 - [c26]Jian Li, Xiaolong Li, Bin Yang:
A new PEE-based reversible watermarking algorithm for color image. ICIP 2012: 2181-2184 - [c25]Xinlu Gui, Xiaolong Li, Bin Yang:
A novel integer transform for efficient reversible watermarking. ICPR 2012: 947-950 - [c24]Yuanzhi Qi, Xiaolong Li, Bin Wang, Bin Yang:
A Study of Optimal Matrix for Efficient Matrix Embedding in. IWDW 2012: 8-18 - [c23]Fei Peng, Xiaolong Li, Bin Yang:
Calibration Based Reliable Detector for Detecting LSB Matching Steganography. IWDW 2012: 44-53 - 2011
- [j3]Xiaolong Li, Bin Yang, Tieyong Zeng:
Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection. IEEE Trans. Image Process. 20(12): 3524-3533 (2011) - [c22]Ruoyu Wu, Xiaolong Li, Bin Yang:
Identifying computer generated graphics VIA histogram features. ICIP 2011: 1933-1936 - [c21]Yi Luo, Xiaolong Li, Bin Yang:
Locating steganographic payload for LSB matching embedding. ICME 2011: 1-6 - [c20]Yi Luo, Fei Peng, Xiaolong Li, Bin Yang:
Reversible image water marking based on prediction-error expansion and compensation. ICME 2011: 1-6 - 2010
- [j2]Xiang Wang, Xiaolong Li, Bin Yang, Zongming Guo:
Efficient Generalized Integer Transform for Reversible Watermarking. IEEE Signal Process. Lett. 17(6): 567-570 (2010) - [c19]Chao Wang, Xiaolong Li, Bin Yang, Xiaoqing Lu, Chengcheng Liu:
A content-adaptive approach for reducing embedding impact in steganography. ICASSP 2010: 1762-1765 - [c18]Xudong Chen, Xiaolong Li, Bin Yang, Yingmin Tang:
Reversible image watermarking based on a generalized integer transform. ICASSP 2010: 2382-2385 - [c17]Chao Wang, Xiaolong Li, Bin Yang:
High capacity reversible image watermarking based on integer transform. ICIP 2010: 217-220 - [c16]Kaiwei Cai, Xiaolong Li, Tieyong Zeng, Bin Yang, Xiaoqing Lu:
Reliable histogram features for detecting LSB matching. ICIP 2010: 1761-1764 - [c15]Chao Wang, Xiaolong Li, Bin Yang:
Efficient reversible image watermarking by using dynamical prediction-error expansion. ICIP 2010: 3673-3676
2000 – 2009
- 2009
- [j1]Xiaolong Li, Bin Yang, Daofang Cheng, Tieyong Zeng:
A Generalization of LSB Matching. IEEE Signal Process. Lett. 16(2): 69-72 (2009) - [c14]Yunkai Gao, Xiaolong Li, Bin Yang, Yifeng Lu:
Detecting LSB matching by characterizing the amplitude of histogram. ICASSP 2009: 1505-1508 - [c13]Yunkai Gao, Xiaolong Li, Tieyong Zeng, Bin Yang:
Improving embedding efficiency via matrix embedding: A case study. ICIP 2009: 109-112 - [c12]Yunkai Gao, Xiaolong Li, Bin Yang:
Constructing specific matrix for efficient matrix embedding. ICME 2009: 1006-1009 - [c11]Chengcheng Liu, Xiaolong Li, Xiaoqing Lu, Bin Yang:
Improving embedding efficiency by incorporating SDCS and WPC. ICME 2009: 1018-1021 - [c10]Yunkai Gao, Xiaolong Li, Bin Yang:
Employing Optimal Matrix for Efficient Matrix Embedding. IIH-MSP 2009: 161-165 - [c9]Yifeng Lu, Xiaolong Li, Bin Yang:
A ±1-Based Steganography by Minimizing the Distortion of First Order Statistics. IIH-MSP 2009: 754-758 - [c8]Wenfa Qi, Xiaolong Li, Bin Yang:
Bilinear Coons Patch and its Application in Security Pattern Design. IIH-MSP 2009: 881-884 - [c7]Yifeng Lu, Xiaolong Li, Bin Yang:
A Secure Steganography: Noisy Region Embedding. IIH-MSP 2009: 1046-1051 - [c6]Xiang Wang, Xiaolong Li, Bin Yang, Zongming Guo:
A Reversible Watermarking Scheme for High-Fidelity Applications. PCM 2009: 613-624 - [c5]Gaoyang Wang, Xiaolong Li, Bin Yang:
A High Capacity Reversible Watermarking Scheme Based on an Integer Transform. PCM 2009: 1287-1292 - 2008
- [c4]Xiaolong Li, Tieyong Zeng, Bin Yang:
A further study on steganalysis of LSB matching by calibration. ICIP 2008: 2072-2075 - [c3]Xiaolong Li, Tieyong Zeng, Bin Yang:
Improvement of the embedding efficiency of LSB matching by sum and difference covering set. ICME 2008: 209-212 - [c2]Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang:
A Statistics-Based Watermarking Scheme Robust to Print-and-Scan. ISECS 2008: 894-898 - [c1]Xiaolong Li, Tieyong Zeng, Bin Yang:
Detecting LSB matching by applying calibration technique for difference image. MM&Sec 2008: 133-138
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint