


Остановите войну!
for scientists:
Guorui Feng
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j88]Yuxue Zhang, Guorui Feng:
Efficient Multi-Scale Feature Fusion for Image Manipulation Detection. IEICE Trans. Inf. Syst. 105(5): 1107-1111 (2022) - [j87]Yalan Qin, Hanzhou Wu, Jian Zhao, Guorui Feng:
Enforced block diagonal subspace clustering with closed form solution. Pattern Recognit. 130: 108791 (2022) - [j86]Biao Yi
, Hanzhou Wu
, Guorui Feng
, Xinpeng Zhang
:
ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling. IEEE Signal Process. Lett. 29: 687-691 (2022) - [j85]Zichi Wang
, Guorui Feng
, Xinpeng Zhang
:
Repeatable Data Hiding: Towards the Reusability of Digital Images. IEEE Trans. Circuits Syst. Video Technol. 32(1): 135-146 (2022) - [j84]Yalan Qin
, Hanzhou Wu, Xinpeng Zhang
, Guorui Feng
:
Semi-Supervised Structured Subspace Learning for Multi-View Clustering. IEEE Trans. Image Process. 31: 1-14 (2022) - [j83]Quan Wang
, Sheng Li, Xinpeng Zhang, Guorui Feng
:
Multi-granularity Brushstrokes Network for Universal Style Transfer. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 107:1-107:17 (2022) - [c21]Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model For Efficient Linguistic Steganalysis. ICASSP 2022: 3074-3078 - [i5]Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. CoRR abs/2203.03795 (2022) - 2021
- [j82]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021) - [j81]Zichi Wang, Guorui Feng, Hanzhou Wu, Xinpeng Zhang:
Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]. IEEE Comput. Intell. Mag. 16(4): 70-84 (2021) - [j80]Yanli Ren
, Xiao Xu, Guorui Feng
, Xinpeng Zhang:
Non-Interactive and secure outsourcing of PCA-Based face recognition. Comput. Secur. 110: 102416 (2021) - [j79]Zichi Wang
, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Multichannel Steganography in Digital Images for Multiple Receivers. IEEE Multim. 28(1): 65-73 (2021) - [j78]Hailuan Liu, Lingyan Fan, Jianjun Luo, Guorui Feng:
Embedded multiport data buffer for a solid-state drive controller. IEICE Electron. Express 18(9): 20210132 (2021) - [j77]Guorui Feng, Sheng Li, Haoliang Li
, Shujun Li:
Special issue on low complexity methods for multimedia security. Multim. Syst. 27(3): 301-302 (2021) - [j76]Liyun Dou
, Zichi Wang
, Zhenxing Qian
, Guorui Feng
:
Reversible Privacy Protection with the Capability of Antiforensics. Secur. Commun. Networks 2021: 5558873:1-5558873:12 (2021) - [j75]Lingzan Yu
, Yanli Ren
, Guorui Feng
, Xinpeng Zhang
:
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations. Secur. Commun. Networks 2021: 6184920:1-6184920:14 (2021) - [j74]Yalan Qin
, Hanzhou Wu, Guorui Feng:
Structured subspace learning-induced symmetric nonnegative matrix factorization. Signal Process. 186: 108115 (2021) - [j73]Xuhao Jiang, Liquan Shen, Guorui Feng, Liangwei Yu, Ping An:
An optimized CNN-based quality assessment model for screen content image. Signal Process. Image Commun. 94: 116181 (2021) - [j72]Hanzhou Wu
, Biao Yi, Feng Ding
, Guorui Feng
, Xinpeng Zhang
:
Linguistic Steganalysis With Graph Neural Networks. IEEE Signal Process. Lett. 28: 558-562 (2021) - [j71]Qiangjie Li, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Embedding Probability Guided Network for Image Steganalysis. IEEE Signal Process. Lett. 28: 1095-1099 (2021) - [j70]Yi Luo, Guorui Feng
, Xinpeng Zhang
:
Hierarchical Authorization of Convolutional Neural Networks for Multi-User. IEEE Signal Process. Lett. 28: 1560-1564 (2021) - [j69]Chuan Qin
, Liang Wu, Xinpeng Zhang
, Guorui Feng
:
Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval. IEEE Signal Process. Lett. 28: 1893-1897 (2021) - [j68]Yanli Ren
, Min Dong, Zhenxing Qian
, Xinpeng Zhang
, Guorui Feng
:
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. IEEE Trans. Cloud Comput. 9(1): 145-154 (2021) - [j67]Chuan Qin
, Enli Liu, Guorui Feng
, Xinpeng Zhang
:
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4523-4537 (2021) - [c20]Quan Wang, Guorui Feng:
Image Style Recognition Using Graph Network and Perception Layer. CICAI 2021: 565-574 - [c19]Sheng Li, Xun Zhu, Guorui Feng, Xinpeng Zhang, Zhenxing Qian:
Diffusing the Liveness Cues for Face Anti-spoofing. ACM Multimedia 2021: 1636-1644 - [i4]Yalan Qin, Guorui Feng, Hanzhou Wu, Yanli Ren, Xinpeng Zhang:
Orientation Convolutional Networks for Image Recognition. CoRR abs/2102.01523 (2021) - [i3]Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model for Efficient Linguistic Steganalysis: An Empirical Study. CoRR abs/2107.12168 (2021) - 2020
- [j66]Hongen Jia
, Yang Li, Guorui Feng, Kaitai Li:
An efficient two-grid method for the Cahn-Hilliard equation with the concentration-dependent mobility and the logarithmic Flory-Huggins bulk potential. Appl. Math. Comput. 387: 124548 (2020) - [j65]Kangli Hao, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Iris Segmentation Using Feature Channel Optimization for Noisy Environments. Cogn. Comput. 12(6): 1205-1216 (2020) - [j64]Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Semi-structured data protection scheme based on robust watermarking. EURASIP J. Image Video Process. 2020(1): 12 (2020) - [j63]Huaqi Wang, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Defeating data hiding in social networks using generative adversarial network. EURASIP J. Image Video Process. 2020(1): 30 (2020) - [j62]Xuhao Jiang, Liquan Shen
, Liangwei Yu, Mingxing Jiang, Guorui Feng:
No-reference screen content image quality assessment based on multi-region features. Neurocomputing 386: 30-41 (2020) - [j61]Mengtian Xu, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm. IEEE Internet Things J. 7(9): 8547-8558 (2020) - [j60]Liyun Dou, Zhenxing Qian, Chuan Qin, Guorui Feng, Xinpeng Zhang:
Anti-forensics of diffusion-based image inpainting. J. Electronic Imaging 29(4): 043026 (2020) - [j59]Zhiyang Jin
, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Feature extraction optimization of JPEG steganalysis based on residual images. Signal Process. 170: 107455 (2020) - [j58]Lingchen Zhou
, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
On Security Enhancement of Steganography via Generative Adversarial Image. IEEE Signal Process. Lett. 27: 166-170 (2020) - [j57]Yanli Ren
, Xinpeng Zhang
, Guorui Feng
, Zhenxing Qian
, Fengyong Li
:
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing. IEEE Trans. Cloud Comput. 8(1): 207-219 (2020) - [j56]Guorui Feng
, Xinpeng Zhang
, Yanli Ren
, Zhenxing Qian
, Sheng Li
:
Diversity-Based Cascade Filters for JPEG Steganalysis. IEEE Trans. Circuits Syst. Video Technol. 30(2): 376-386 (2020) - [j55]Sheng Li
, Xinpeng Zhang
, Zhenxing Qian
, Guorui Feng
, Yanli Ren
:
Key Based Artificial Fingerprint Generation for Privacy Protection. IEEE Trans. Dependable Secur. Comput. 17(4): 828-840 (2020) - [j54]Jingzhi Lin
, Zhenxing Qian
, Zichi Wang, Xinpeng Zhang, Guorui Feng:
A New Steganography Method for Dynamic GIF Images Based on Palette Sort. Wirel. Commun. Mob. Comput. 2020: 8812087:1-8812087:13 (2020) - [c18]Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu:
A Deep Learning Approach to Detection of Warping Forgery in Images. ICAIS (2) 2020: 109-118 - [c17]Guorui Feng, Jian Wu:
Image Forgery Detection Based on the Convolutional Neural Network. ICMLC 2020: 266-270 - [c16]Zichi Wang, Guorui Feng, Xinpeng Zhang:
Steganographic Distortion Function for Enhanced Images. IWDW 2020: 31-40
2010 – 2019
- 2019
- [j53]Yimin Wang
, Lingsheng Kong
, Zhenxing Qian
, Guorui Feng
, Xinpeng Zhang
, Jianmin Zheng
:
Breaking Permutation-Based Mesh Steganography and Security Improvement. IEEE Access 7: 183300-183310 (2019) - [j52]Yan Sun, Guorui Feng, Yanli Ren:
JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering. IEICE Trans. Inf. Syst. 102-D(1): 198-201 (2019) - [j51]Chunhui Gao, Guorui Feng, Yanli Ren, Lizhuang Liu:
Iris Segmentation Based on Improved U-Net Network Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(8): 982-985 (2019) - [j50]Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Breaking Steganography: Slight Modification with Distortion Minimization. Int. J. Digit. Crime Forensics 11(1): 114-125 (2019) - [j49]Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Special issue on real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(3): 559-563 (2019) - [j48]Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Additional articles of special issue on Real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(4): 811-812 (2019) - [j47]Lingyan Fan, Wuyi Sun, Guorui Feng:
Image Steganalysis via Random Subspace Fisher Linear Discriminant Vector Functional Link Network and Feature Mapping. Mob. Networks Appl. 24(4): 1269-1278 (2019) - [j46]Ximei Zeng, Guorui Feng, Xinpeng Zhang:
Detection of double JPEG compression using modified DenseNet model. Multim. Tools Appl. 78(7): 8183-8196 (2019) - [j45]Danni Ni, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
Selective Ensemble Classification of Image Steganalysis Via Deep Q Network. IEEE Signal Process. Lett. 26(7): 1065-1069 (2019) - [j44]Liquan Shen
, Guorui Feng, Ping An
:
SHVC CU Processing Aided by a Feedforward Neural Network. IEEE Trans. Ind. Informatics 15(11): 5803-5815 (2019) - [j43]Liquan Shen
, Guorui Feng:
Content-Based Adaptive SHVC Mode Decision Algorithm. IEEE Trans. Multim. 21(11): 2714-2725 (2019) - [j42]Liquan Shen, Ping An, Guorui Feng:
Low-Complexity Scalable Extension of the High-Efficiency Video Coding (SHVC) Encoding System. ACM Trans. Multim. Comput. Commun. Appl. 15(2): 44:1-44:23 (2019) - [c15]Xu Chang, Fanchang Hao, Jian Wu, Guorui Feng:
File Recovery of High-Order Clearing First Cluster Based on FAT32. CSS (1) 2019: 467-476 - [c14]Qiangjie Li, Guorui Feng, Hanzhou Wu
, Xinpeng Zhang:
Ensemble Steganalysis Based on Deep Residual Network. IWDW 2019: 84-95 - [c13]Mengtian Xu, Hanzhou Wu
, Guorui Feng, Xinpeng Zhang, Feng Ding:
Broadcasting Steganography in the Blockchain. IWDW 2019: 256-267 - [i2]Xuhao Jiang, Liquan Shen, Guorui Feng, Liangwei Yu, Ping An:
Deep Optimization model for Screen Content Image Quality Assessment using Neural Networks. CoRR abs/1903.00705 (2019) - 2018
- [j41]Kai Zhong, Guorui Feng, Liquan Shen, Jun Luo:
Deep learning for steganalysis based on filter diversity selection. Sci. China Inf. Sci. 61(12): 129105:1-129105:3 (2018) - [j40]Min Dong, Yanli Ren, Guorui Feng:
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(3): 608-611 (2018) - [j39]Liquan Shen
, Kai Li, Guorui Feng, Ping An, Zhi Liu
:
Efficient Intra Mode Selection for Depth-Map Coding Utilizing Spatiotemporal, Inter-Component and Inter-View Correlations in 3D-HEVC. IEEE Trans. Image Process. 27(9): 4195-4206 (2018) - 2017
- [j38]Zi-wen Wang, Guorui Feng, Lingyan Fan, Jin-wei Wang:
Sparse Representation for Color Image Super-Resolution with Image Quality Difference Evaluation. IEICE Trans. Inf. Syst. 100-D(1): 150-159 (2017) - [j37]Bing Cao, Guorui Feng, Zhaoxia Yin, Lingyan Fan:
Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering. IEICE Trans. Inf. Syst. 100-D(5): 1144-1147 (2017) - [j36]Jia Fu, Guorui Feng, Yanli Ren:
JPEG Image Steganalysis from Imbalanced Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(11): 2518-2521 (2017) - [c12]Yi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel:
An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images. ICCCS (1) 2017: 49-60 - [i1]Sheng Li, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, Xinpeng Zhang:
Data hiding in Fingerprint Minutiae Template for Privacy Protection. CoRR abs/1710.00516 (2017) - 2016
- [j35]Anxin Wu, Guorui Feng, Xinpeng Zhang, Yanli Ren:
Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent. 34: 103-107 (2016) - [j34]Zhenxing Qian, Xinpeng Zhang, Yanli Ren, Guorui Feng:
Block cipher based separable reversible data hiding in encrypted images. Multim. Tools Appl. 75(21): 13749-13763 (2016) - [j33]Zhenxing Qian
, Xinpeng Zhang, Guorui Feng:
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery. IEEE Signal Process. Lett. 23(11): 1672-1676 (2016) - [c11]Bing Cao, Guorui Feng, Zhaoxia Yin:
Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices. ICCCS (1) 2016: 84-93 - [c10]Kejiang Chen, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng:
Defining cost functions for adaptive steganography at the microscale. WIFS 2016: 1-6 - 2015
- [j32]Xue-xia Zhong, Guorui Feng, Jian Wang, Wenfei Wang, Wen Si:
A novel adaptive image zooming scheme via weighted least-squares estimation. Frontiers Comput. Sci. 9(5): 703-712 (2015) - [j31]Guorui Feng, Yuan Lan, Xinpeng Zhang, Zhenxing Qian:
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine. IEEE Trans. Cybern. 45(2): 279-288 (2015) - 2014
- [j30]Xiyu Han, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images Based on Image Interpolation. Int. J. Digit. Crime Forensics 6(3): 16-29 (2014) - [j29]Guorui Feng, Haiyan Zhang, Xinpeng Zhang:
Effective feature selection for image steganalysis using extreme learning machine. J. Electronic Imaging 23(6): 063020 (2014) - [j28]Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2): 322-328 (2014) - [j27]Bin Chen, Guorui Feng, Xinpeng Zhang, Fengyong Li:
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier. Signal Image Video Process. 8(8): 1475-1482 (2014) - [j26]Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, Guorui Feng:
Compressing Encrypted Images With Auxiliary Information. IEEE Trans. Multim. 16(5): 1327-1336 (2014) - 2013
- [j25]Fengyong Li, Xinpeng Zhang, Bin Chen, Guorui Feng:
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier. IEEE Signal Process. Lett. 20(3): 233-236 (2013) - 2012
- [j24]Guorui Feng, Zhenxing Qian, Ningjie Dai:
Reversible watermarking via extreme learning machine prediction. Neurocomputing 82: 62-68 (2012) - [j23]Guorui Feng, Lingyan Fan:
Reversible data hiding of high payload using local edge sensing prediction. J. Syst. Softw. 85(2): 392-399 (2012) - [j22]Duyao Wang, Sujuan Huang, Guorui Feng, Shuozhong Wang:
Perceptual differential energy watermarking for H.264/AVC. Multim. Tools Appl. 60(3): 537-550 (2012) - [j21]Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Evolutionary selection extreme learning machine optimization for regression. Soft Comput. 16(9): 1485-1491 (2012) - [j20]Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Spectrum-estimation based lossless information recovery for sparse array patterns. Telecommun. Syst. 49(2): 163-169 (2012) - [j19]Xinpeng Zhang, Guorui Feng, Yanli Ren, Zhenxing Qian:
Scalable Coding of Encrypted Images. IEEE Trans. Image Process. 21(6): 3108-3114 (2012) - [c9]Bin Chen, Guorui Feng, Fengyong Li:
Steganalysis in High-Dimensional Feature Space Using Selective Ensemble Classifiers. IFTC 2012: 9-14 - 2011
- [j18]Zhenxing Qian, Guorui Feng, Xinpeng Zhang, Shuozhong Wang:
Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2): 278-286 (2011) - [j17]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift. Intell. Autom. Soft Comput. 17(2): 233-243 (2011) - [j16]Ningjie Dai, Guorui Feng, Qian Zeng:
Reversible Watermarking Using Adaptive Edge-Guided Interpolation. KSII Trans. Internet Inf. Syst. 5(4): 856-873 (2011) - [j15]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Self-embedding watermark with flexible restoration quality. Multim. Tools Appl. 54(2): 385-395 (2011) - [j14]Xinpeng Zhang, Zhenxing Qian, Yanli Ren, Guorui Feng:
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4): 1223-1232 (2011) - [j13]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. Image Process. 20(2): 485-495 (2011) - [c8]Qian Zeng, Guorui Feng:
Differential Energy Watermarking Based on Macro-block Prediction. CIS 2011: 930-933 - [c7]Xinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian:
Compressing Encrypted Image Using Compressive Sensing. IIH-MSP 2011: 222-225 - 2010
- [j12]Zhenxing Qian, Xinpeng Zhang, Guorui Feng, Yanli Ren:
Colour filter array interpolation based self recovery with anti-cropping capability. Int. J. Multim. Intell. Secur. 1(2): 191-203 (2010) - [j11]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12): 3026-3036 (2010) - [j10]Zhenxing Qian, Guorui Feng:
Inpainting Assisted Self Recovery With Decreased Embedding Data. IEEE Signal Process. Lett. 17(11): 929-932 (2010) - [c6]Zhenxing Qian, Guorui Feng, Yanli Ren:
Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation. WAIM 2010: 537-543
2000 – 2009
- 2009
- [j9]Liquan Shen, Guorui Feng, Zhi Liu, Zhaoyang Zhang, Ping An:
Macroblock-level adaptive search range algorithm for motion estimation in multiview video coding. J. Electronic Imaging 18(3): 033003 (2009) - [j8]Guorui Feng, Guang-Bin Huang, Qingping Lin, Robert Kheng Leng Gay:
Error Minimized Extreme Learning Machine With Growth of Hidden Nodes and Incremental Learning. IEEE Trans. Neural Networks 20(8): 1352-1357 (2009) - [c5]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Fragile Watermarking Scheme with Extensive Content Restoration Capability. IWDW 2009: 268-278 - 2008
- [j7]Qingping Lin, Liang Zhang, Sun Ding, Guorui Feng, Guangbin Huang:
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment. Int. J. Virtual Real. 7(2): 63-72 (2008) - 2007
- [j6]Lingyan Fan, Chen He, Guorui Feng:
Optimal bit allocation adaptive modulation algorithm for MIMO system. J. Commun. Networks 9(2): 136-140 (2007) - 2006
- [j5]Guorui Feng, Ling-ge Jiang, Dong-Jian Wang, Chen He:
Erratum to: Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transformation [Pattern Recognition 38 (12) 2530]. Pattern Recognit. 39(4): 736 (2006) - 2005
- [j4]Guorui Feng, Ling-ge Jiang, Chen He:
Permutation-Based Semi-Fragile Watermark Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 374-377 (2005) - [j3]Guorui Feng, Ling-ge Jiang, Dong-Jian Wang, Chen He:
Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform. Pattern Recognit. 38(12): 2530-2536 (2005) - [j2]Wei Wu, Guorui Feng, Zhengxue Li, Yuesheng Xu:
Deterministic convergence of an online gradient method for BP neural networks. IEEE Trans. Neural Networks 16(3): 533-540 (2005) - [c4]Zhengxue Li, Wei Wu, Guorui Feng, Huifang Lu:
Convergence of an Online Gradient Method for BP Neural Networks with Stochastic Inputs. ICNC (1) 2005: 720-729 - 2004
- [c3]Dong-Jian Wang, Ling-ge Jiang, Guorui Feng:
Novel blind non-additive robust watermarking using 1-D chaotic map. ICASSP (3) 2004: 417-420 - [c2]Wei Wu, Zhengxue Li, Guorui Feng, Naimin Zhang, Dong Nan, Zhiqiong Shao, Jie Yang, Liqing Zhang, Yuesheng Xu:
Recent Developments on Convergence of Online Gradient Methods for Neural Network Training. ISNN (1) 2004: 235-238 - 2003
- [c1]Guorui Feng, Ling-ge Jiang, Chen He, Dong-Jian Wang:
A novel algorithm for embedding and detecting digital watermarks. ICASSP (3) 2003: 549-552 - 2002
- [j1]Wei Wu, Guorui Feng, Xin Li:
Training Multilayer Perceptrons Via Minimization of Sum of Ridge Functions. Adv. Comput. Math. 17(4): 331-347 (2002)