Author of the publication

Intelligent Multimedia Group of Tsinghua University at TRECVID 2006.

, , , , , , , , , , , , , , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack., , , , and . IEEE Signal Process. Lett., (2023)Improved CNN Prediction Based Reversible Data Hiding., , , , and . CoRR, (2023)TransGrasp: Grasp Pose Estimation of a Category of Objects by Transferring Grasps from Only One Labeled Instance., , , and . ECCV (39), volume 13699 of Lecture Notes in Computer Science, page 445-461. Springer, (2022)SDBIA: A Novel Approach to Improve the Reading Performance of Large Objects for Object-Based Storage Device., , , and . FCST, page 114-118. IEEE Computer Society, (2007)Establishing Robust Generative Image Steganography via Popular Stable Diffusion., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs., , , , , and . ACM Multimedia, page 7274-7282. ACM, (2023)IDA-3D: Instance-Depth-Aware 3D Object Detection From Stereo Vision for Autonomous Driving., , , and . CVPR, page 13012-13021. Computer Vision Foundation / IEEE, (2020)A Test-Time Entropy Minimization Method for Cross-Domain Linguistic Steganalysis., , , , and . IEEE Signal Process. Lett., (2024)Transparent Object Depth Completion., , , , and . CoRR, (2024)From Covert Hiding To Visual Editing: Robust Generative Video Steganography., , , , , , and . ACM Multimedia, page 2757-2765. ACM, (2024)