Ching-Yung Lin
Ching-Yung Lin
IBM Chief Scientist, Graph Computing
Email verificata su - Home page
Citata da
Citata da
Rotation, scale, and translation resilient watermarking for images
CY Lin, M Wu, JA Bloom, IJ Cox, ML Miller, YM Lui
IEEE Transactions on image processing 10 (5), 767-782, 2001
A robust image authentication method distinguishing JPEG compression from malicious manipulation
CY Lin, SF Chang
IEEE Transactions on Circuits and Systems for Video Technology 11 (2), 153-168, 2001
Nisp: Pruning networks using neuron importance score propagation
R Yu, A Li, CF Chen, JH Lai, VI Morariu, X Han, M Gao, CY Lin, LS Davis
Proceedings of the IEEE conference on computer vision and pattern …, 2018
Semifragile watermarking for authenticating JPEG visual content
CY Lin, SF Chang
Security and watermarking of multimedia contents II 3971, 140-151, 2000
IBM Research TRECVID-2003 Video Retrieval System.
A Amir, J Argillander, M Campbell, A Haubold, G Iyengar, S Ebadollahi, ...
Robust image authentication method surviving JPEG lossy compression
CY Lin, SF Chang
Storage and Retrieval for Image and Video Databases VI 3312, 296-307, 1997
Searching for experts in the enterprise: combining text and social network analysis
K Ehrlich, CY Lin, V Griffiths-Fisher
Proceedings of the 2007 international ACM conference on Supporting group …, 2007
Generating robust digital signature for image/video authentication
CY Lin, SF Chang
Multimedia and Security Workshop at ACM Multimedia 98, 49-54, 1998
Semantic indexing of multimedia content using visual, audio, and text cues
WH Adams, G Iyengar, CY Lin, MR Naphade, C Neti, HJ Nock, JR Smith
EURASIP Journal on Advances in Signal Processing 2003, 1-16, 2003
Personalized recommendation driven by information flow
X Song, BL Tseng, CY Lin, MT Sun
Proceedings of the 29th annual international ACM SIGIR conference on …, 2006
Using MPEG-7 and MPEG-21 for personalizing video
BL Tseng, CY Lin, JR Smith
iEEE Multimedia 11 (1), 42-52, 2004
Multimedia security technologies for digital rights management
W Zeng, H Yu, CY Lin
Elsevier, 2011
Issues and solutions for authenticating MPEG video
CY Lin, SF Chang
Security and watermarking of multimedia contents 3657, 54-65, 1999
Distortion modeling and invariant extraction for digital image print-and-scan process
CY Lin, SF Chang
Int. Symp. Multimedia Information Processing 16, 207-218, 1999
Method and apparatus for image authentication
SF Chang, CY Lin
US Patent 6,532,541, 2003
Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform
JA Bloom, IJ Cox, ML Miller, M Wu, CY Lin, YM Lui
US Patent 6,282,300, 2001
Non-negative residual matrix factorization with application to graph anomaly detection
H Tong, CY Lin
Proceedings of the 2011 SIAM International Conference on Data Mining, 143-153, 2011
GraphBIG: understanding graph computing in the context of industrial solutions
L Nai, Y Xia, IG Tanase, H Kim, CY Lin
Proceedings of the International Conference for High Performance Computing …, 2015
Information spreading in context
D Wang, Z Wen, H Tong, CY Lin, C Song, AL Barabási
Proceedings of the 20th international conference on World wide web, 735-744, 2011
Gbase: a scalable and general graph management system
U Kang, H Tong, J Sun, CY Lin, C Faloutsos
Proceedings of the 17th ACM SIGKDD international conference on Knowledge …, 2011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20