Reversible data hiding in encrypted images by reserving room before encryption K Ma, W Zhang, X Zhao, N Yu, F Li IEEE Transactions on information forensics and security 8 (3), 553-562, 2013 | 558 | 2013 |
Dual learning for machine translation Y Xia, D He, T Qin, L Wang, N Yu, TY Liu, WY Ma arXiv preprint arXiv:1611.00179, 2016 | 512 | 2016 |
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability Z Hao, S Zhong, N Yu IEEE transactions on Knowledge and Data Engineering 23 (9), 1432-1437, 2011 | 314 | 2011 |
Non-negative low rank and sparse graph for semi-supervised learning L Zhuang, H Gao, Z Lin, Y Ma, X Zhang, N Yu 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2328-2335, 2012 | 287 | 2012 |
Reversibility improved data hiding in encrypted images W Zhang, K Ma, N Yu Signal Processing 94, 118-127, 2014 | 283 | 2014 |
Stylebank: An explicit representation for neural image style transfer D Chen, L Yuan, J Liao, N Yu, G Hua Proceedings of the IEEE conference on computer vision and pattern …, 2017 | 248 | 2017 |
Learning to tag L Wu, L Yang, N Yu, XS Hua Proceedings of the 18th international conference on World wide web, 361-370, 2009 | 246 | 2009 |
Flickr distance L Wu, XS Hua, N Yu, WY Ma, S Li Proceedings of the 16th ACM international conference on Multimedia, 31-40, 2008 | 208 | 2008 |
Semantics-preserving bag-of-words models and applications L Wu, SCH Hoi, N Yu IEEE Transactions on Image Processing 19 (7), 1908-1920, 2010 | 205 | 2010 |
Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression W Zhang, X Hu, X Li, N Yu IEEE transactions on image processing 22 (7), 2775-2785, 2013 | 195 | 2013 |
Online multi-object tracking using CNN-based single object tracker with spatial-temporal attention mechanism Q Chu, W Ouyang, H Li, X Wang, B Liu, N Yu Proceedings of the IEEE International Conference on Computer Vision, 4836-4845, 2017 | 169 | 2017 |
Complementary hashing for approximate nearest neighbor search H Xu, J Wang, Z Li, G Zeng, S Li, N Yu 2011 International Conference on Computer Vision, 1631-1638, 2011 | 163 | 2011 |
Improving various reversible data hiding schemes via optimal codes for binary covers W Zhang, B Chen, N Yu IEEE transactions on image processing 21 (6), 2991-3003, 2012 | 160 | 2012 |
Learning spatial regularization with image-level supervisions for multi-label image classification F Zhu, H Li, W Ouyang, N Yu, X Wang Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017 | 153 | 2017 |
Passive detection of doctored JPEG image via block artifact grid extraction W Li, Y Yuan, N Yu Signal Processing 89 (9), 1821-1829, 2009 | 142 | 2009 |
Coherent online video style transfer D Chen, J Liao, L Yuan, N Yu, G Hua Proceedings of the IEEE International Conference on Computer Vision, 1105-1114, 2017 | 137 | 2017 |
Order preserving hashing for approximate nearest neighbor search J Wang, J Wang, N Yu, S Li Proceedings of the 21st ACM international conference on Multimedia, 133-142, 2013 | 113 | 2013 |
Deliberation networks: Sequence generation beyond one-pass decoding Y Xia, F Tian, L Wu, J Lin, T Qin, N Yu, TY Liu Proceedings of the 31st International Conference on Neural Information …, 2017 | 112 | 2017 |
Neighborhood preserving projections (NPP): a novel linear dimension reduction method Y Pang, L Zhang, Z Liu, N Yu, H Li International conference on intelligent computing, 117-125, 2005 | 109 | 2005 |
A multiple-replica remote data possession checking protocol with public verifiability Z Hao, N Yu 2010 second international symposium on data, privacy, and E-commerce, 84-89, 2010 | 101 | 2010 |