![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Guorui Feng
Person information
Refine list
![note](https://dblp.dagstuhl.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j137]Yalan Qin, Xinpeng Zhang, Shui Yu, Guorui Feng:
A survey on representation learning for multi-view data. Neural Networks 181: 106842 (2025) - [j136]Jinwei Lv, Yanli Ren, Guorui Feng
:
Joint utilization of positive and negative pseudo-labels in semi-supervised facial expression recognition. Pattern Recognit. 159: 111147 (2025) - 2024
- [j135]Yi Luo, Sheng Li, Xinpeng Zhang, Guorui Feng:
Controlling the performance of deep neural networks using a single parameter. Evol. Intell. 17(5): 4303-4313 (2024) - [j134]Mingyun Bian
, Guanghui He, Guorui Feng
, Xinpeng Zhang
, Yanli Ren
:
Verifiable Privacy-Preserving Heart Rate Estimation Based on LSTM. IEEE Internet Things J. 11(1): 1719-1731 (2024) - [j133]Yanli Ren
, Cien Chen
, Mingqi Hu, Guorui Feng
, Xinpeng Zhang
:
BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks. IEEE Internet Things J. 11(2): 3510-3523 (2024) - [j132]Yanli Ren
, Mingqi Hu
, Zhe Yang, Guorui Feng
, Xinpeng Zhang:
BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack. Inf. Sci. 665: 120377 (2024) - [j131]Mingyun Bian
, Yanli Ren
, Gang He
, Guorui Feng
, Xinpeng Zhang:
VMMP: Verifiable privacy-preserving multi-modal multi-task prediction. Inf. Sci. 669: 120547 (2024) - [j130]Jiayi Wu
, Chuan Qin
, Guorui Feng
:
SMDC-Net: Saliency-Guided Multihead Distribution Calibration Network for Few-Shot Object Detection on Remote Sensing Images. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j129]Zhicheng Ye, Xinpeng Zhang, Guorui Feng:
Deep neural networks watermark via universal deep hiding and metric learning. Neural Comput. Appl. 36(13): 7421-7438 (2024) - [j128]Yiwen Wang, Yue Wang, Guorui Feng:
Sample selection of adversarial attacks against traffic signs. Neural Networks 180: 106698 (2024) - [j127]Yue Wang, Minjie Liu, Yanli Ren
, Xinpeng Zhang, Guorui Feng
:
Traffic sign attack via pinpoint region probability estimation network. Pattern Recognit. 146: 110035 (2024) - [j126]Guorui Feng, Sheng Li, Jian Zhao, Zheng Wang:
Recent Advances in Deep Learning Model Security. Pattern Recognit. Lett. 185: 262-263 (2024) - [j125]Jinbo Qu, Cheng Song, Jinwen Bai
, Guorui Feng, Xudong Shi, Junbiao Ma:
A Machine-Learning-Based Method for Identifying the Failure Risk State of Fissured Sandstone under Water-Rock Interaction. Sensors 24(17): 5752 (2024) - [j124]Jianjun Luo
, Menghao Chen
, Lingyan Fan
, Hailuan Liu
, Lijuan Gao, Guorui Feng
:
Clustering-Based Dual-Population Co-Evolutionary Algorithm for 2D Segmentation Coding in NAND Flash Memory. IEEE Trans. Circuits Syst. II Express Briefs 71(7): 3603-3607 (2024) - [j123]Chongye Guo
, Hongbo Wang, Yingjie Xia
, Guorui Feng
:
Learning Appearance-Motion Synergy via Memory-Guided Event Prediction for Video Anomaly Detection. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1519-1531 (2024) - [j122]Deyang Wu
, Xinpeng Zhang
, Jiayan Wang
, Li Li
, Guorui Feng
:
Novel Robust Video Watermarking Scheme Based on Concentric Ring Subband and Visual Cryptography With Piecewise Linear Chaotic Mapping. IEEE Trans. Circuits Syst. Video Technol. 34(10): 10281-10298 (2024) - [j121]Tianyu Yang
, Hanzhou Wu
, Biao Yi
, Guorui Feng
, Xinpeng Zhang
:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. IEEE Trans. Dependable Secur. Comput. 21(1): 139-152 (2024) - [j120]Yalan Qin
, Chuan Qin
, Xinpeng Zhang
, Guorui Feng
:
Dual Consensus Anchor Learning for Fast Multi-View Clustering. IEEE Trans. Image Process. 33: 5298-5311 (2024) - [j119]Yalan Qin
, Zhenjun Tang
, Hanzhou Wu
, Guorui Feng
:
Flexible Tensor Learning for Multi-View Clustering With Markov Chain. IEEE Trans. Knowl. Data Eng. 36(4): 1552-1565 (2024) - [j118]Quan Wang, Sheng Li
, Zichi Wang
, Xinpeng Zhang
, Guorui Feng
:
Multi-Source Style Transfer via Style Disentanglement Network. IEEE Trans. Multim. 26: 1373-1383 (2024) - [j117]Chuan Qin
, Xiaomeng Li, Zhenyi Zhang, Fengyong Li
, Xinpeng Zhang
, Guorui Feng
:
Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning. IEEE Trans. Multim. 26: 2164-2177 (2024) - [j116]Quan Wang, Zichi Wang
, Xinpeng Zhang
, Guorui Feng
:
Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network. IEEE Trans. Multim. 26: 8026-8037 (2024) - [j115]Xinran Li
, Zichi Wang
, Guorui Feng
, Xinpeng Zhang
, Chuan Qin
:
Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments. IEEE Trans. Multim. 26: 10041-10054 (2024) - [j114]Guanghui He
, Yanli Ren
, Gang He
, Guorui Feng
, Xinpeng Zhang
:
PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack. IEEE Trans. Serv. Comput. 17(6): 4083-4096 (2024) - [i7]Miaomiao Wang, Guang Hua, Sheng Li, Guorui Feng:
A Key-Driven Framework for Identity-Preserving Face Anonymization. CoRR abs/2409.03434 (2024) - 2023
- [j113]Chuan Qin
, Shengyan Gao
, Xinpeng Zhang
, Guorui Feng
:
CADW: CGAN-Based Attack on Deep Robust Image Watermarking. IEEE Multim. 30(1): 28-35 (2023) - [j112]Junhao Tang, Guorui Feng:
A Fusion Deraining Network Based on Swin Transformer and Convolutional Neural Network. IEICE Trans. Inf. Syst. 106(7): 1254-1257 (2023) - [j111]Zichi Wang, Guorui Feng, Hanzhou Wu
, Xinpeng Zhang:
Data hiding during image processing using capsule networks. Neurocomputing 537: 49-60 (2023) - [j110]Gang He
, Yanli Ren
, Mingyun Bian, Guorui Feng
, Xinpeng Zhang:
Privacy-enhanced and non-interactive linear regression with dropout-resilience. Inf. Sci. 632: 69-86 (2023) - [j109]Jiayi Wu
, Chuan Qin
, Yanli Ren
, Guorui Feng
:
EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j108]Haiyan Zhang, Quan Wang, Guorui Feng:
Artistic image adversarial attack via style perturbation. Multim. Syst. 29(6): 3745-3755 (2023) - [j107]Yalan Qin
, Xinpeng Zhang
, Liquan Shen
, Guorui Feng
:
Maximum Block Energy Guided Robust Subspace Clustering. IEEE Trans. Pattern Anal. Mach. Intell. 45(2): 2652-2659 (2023) - [j106]Junhao Tang, Guorui Feng:
Background-detail restoration image deraining network based on convolutional dictionary network. Signal Process. Image Commun. 119: 117057 (2023) - [j105]Xuanbo Zhang
, Xinpeng Zhang
, Guorui Feng
:
Image Steganalysis Network Based on Dual-Attention Mechanism. IEEE Signal Process. Lett. 30: 1287-1291 (2023) - [j104]Liyun Dou
, Guorui Feng, Zhenxing Qian
:
Image Inpainting Anti-Forensics Network via Attention-Guided Hierarchical Reconstruction. Symmetry 15(2): 393 (2023) - [j103]Haiyan Zhang
, Guorui Feng:
Enhanced Example Diffusion Model via Style Perturbation. Symmetry 15(5): 1074 (2023) - [j102]Shiyi Chen, Asad Malik, Xinpeng Zhang
, Guorui Feng
, Hanzhou Wu
:
A Fast Method for Robust Video Watermarking Based on Zernike Moments. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7342-7353 (2023) - [j101]Yalan Qin
, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Consistency-Induced Multiview Subspace Clustering. IEEE Trans. Cybern. 53(2): 832-844 (2023) - [j100]Zichi Wang
, Guorui Feng
, Zhenxing Qian
, Xinpeng Zhang
:
JPEG Steganography With Content Similarity Evaluation. IEEE Trans. Cybern. 53(8): 5082-5093 (2023) - [j99]Yanli Ren
, Zhuhuan Song
, Shifeng Sun
, Joseph K. Liu
, Guorui Feng
:
Outsourcing LDA-Based Face Recognition to an Untrusted Cloud. IEEE Trans. Dependable Secur. Comput. 20(3): 2058-2070 (2023) - [j98]Zichi Wang
, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
Cover Selection for Steganography Using Image Similarity. IEEE Trans. Dependable Secur. Comput. 20(3): 2328-2340 (2023) - [j97]Zichi Wang
, Sheng Li
, Xinpeng Zhang
, Guorui Feng
:
Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 250-260 (2023) - [j96]Yalan Qin
, Chuan Qin
, Xinpeng Zhang
, Donglian Qi
, Guorui Feng
:
NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks. IEEE Trans. Image Process. 32: 175-189 (2023) - [j95]Yalan Qin
, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization. IEEE Trans. Knowl. Data Eng. 35(3): 2313-2325 (2023) - [j94]Yu Zhou, Yanli Ren
, Mengtian Xu, Guorui Feng
:
An Improved NSGA-III Algorithm Based on Deep Q-Networks for Cloud Storage Optimization of Blockchain. IEEE Trans. Parallel Distributed Syst. 34(5): 1406-1419 (2023) - [c29]Mengyao Li
, Liquan Shen, Peng Ye, Guorui Feng, Zheyin Wang:
RFD-ECNet: Extreme Underwater Image Compression with Reference to Feature Dictionary. ICCV 2023: 12934-12943 - [c28]Cheng Xiong
, Chuan Qin
, Guorui Feng
, Xinpeng Zhang
:
Flexible and Secure Watermarking for Latent Diffusion Model. ACM Multimedia 2023: 1668-1676 - [c27]Quan Wang
, Yanli Ren
, Xinpeng Zhang
, Guorui Feng
:
Interactive Image Style Transfer Guided by Graffiti. ACM Multimedia 2023: 6685-6694 - [c26]Quan Wang
, Sheng Li
, Xinpeng Zhang
, Guorui Feng
:
Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images. ACM Multimedia 2023: 6928-6937 - [i6]Mengyao Li, Liquan Shen, Peng Ye, Guorui Feng, Zheyin Wang:
RFD-ECNet: Extreme Underwater Image Compression with Reference to Feature Dictionar. CoRR abs/2308.08721 (2023) - 2022
- [j93]Yuxue Zhang, Guorui Feng:
Efficient Multi-Scale Feature Fusion for Image Manipulation Detection. IEICE Trans. Inf. Syst. 105-D(5): 1107-1111 (2022) - [j92]Chao Xu, Yunfeng Yan, Lehangyu Yang, Sheng Li, Guorui Feng:
Altered Fingerprints Detection Based on Deep Feature Fusion. IEICE Trans. Inf. Syst. 105-D(9): 1647-1651 (2022) - [j91]Yanli Ren
, Yerong Li
, Guorui Feng
, Xinpeng Zhang
:
Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning. IEEE Internet Things J. 9(24): 24933-24948 (2022) - [j90]Qianqian Zhang, Guorui Feng
, Hanzhou Wu
:
Surveillance video anomaly detection via non-local U-Net frame prediction. Multim. Tools Appl. 81(19): 27073-27088 (2022) - [j89]Yalan Qin
, Hanzhou Wu
, Jian Zhao, Guorui Feng
:
Enforced block diagonal subspace clustering with closed form solution. Pattern Recognit. 130: 108791 (2022) - [j88]Yuxue Zhang, Yunfeng Yan, Guorui Feng:
Feature compensation network based on non-uniform quantization of channels for digital image global manipulation forensics. Signal Process. Image Commun. 107: 116795 (2022) - [j87]Biao Yi
, Hanzhou Wu
, Guorui Feng
, Xinpeng Zhang
:
ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling. IEEE Signal Process. Lett. 29: 687-691 (2022) - [j86]Yu Zhou, Sheng Li, Witold Pedrycz, Guorui Feng
:
ACDB-EA: Adaptive convergence-diversity balanced evolutionary algorithm for many-objective optimization. Swarm Evol. Comput. 75: 101145 (2022) - [j85]Zichi Wang
, Guorui Feng
, Xinpeng Zhang
:
Repeatable Data Hiding: Towards the Reusability of Digital Images. IEEE Trans. Circuits Syst. Video Technol. 32(1): 135-146 (2022) - [j84]Yalan Qin
, Hanzhou Wu
, Xinpeng Zhang
, Guorui Feng
:
Semi-Supervised Structured Subspace Learning for Multi-View Clustering. IEEE Trans. Image Process. 31: 1-14 (2022) - [j83]Quan Wang
, Sheng Li, Xinpeng Zhang, Guorui Feng
:
Multi-granularity Brushstrokes Network for Universal Style Transfer. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 107:1-107:17 (2022) - [c25]Baogen Zhang, Sheng Li, Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Patch Diffusion: A General Module for Face Manipulation Detection. AAAI 2022: 3243-3251 - [c24]Biao Yi
, Hanzhou Wu
, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model For Efficient Linguistic Steganalysis. ICASSP 2022: 3074-3078 - [c23]Cheng Xiong
, Guorui Feng, Xinran Li, Xinpeng Zhang, Chuan Qin:
Neural Network Model Protection with Piracy Identification and Tampering Localization Capability. ACM Multimedia 2022: 2881-2889 - [c22]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Model Hashing: Towards Neural Network Model Authentication. MMSP 2022: 1-5 - [c21]Qingyu Wang, Guorui Feng, Zhaoxia Yin, Bin Luo:
Universal adversarial perturbation for remote sensing images. MMSP 2022: 1-6 - [i5]Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. CoRR abs/2203.03795 (2022) - 2021
- [j82]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021) - [j81]Zichi Wang, Guorui Feng, Hanzhou Wu
, Xinpeng Zhang:
Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]. IEEE Comput. Intell. Mag. 16(4): 70-84 (2021) - [j80]Yanli Ren
, Xiao Xu, Guorui Feng
, Xinpeng Zhang:
Non-Interactive and secure outsourcing of PCA-Based face recognition. Comput. Secur. 110: 102416 (2021) - [j79]Zichi Wang
, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Multichannel Steganography in Digital Images for Multiple Receivers. IEEE Multim. 28(1): 65-73 (2021) - [j78]Hailuan Liu, Lingyan Fan, Jianjun Luo, Guorui Feng:
Embedded multiport data buffer for a solid-state drive controller. IEICE Electron. Express 18(9): 20210132 (2021) - [j77]Guorui Feng, Sheng Li, Haoliang Li
, Shujun Li:
Special issue on low complexity methods for multimedia security. Multim. Syst. 27(3): 301-302 (2021) - [j76]Liyun Dou
, Zichi Wang
, Zhenxing Qian
, Guorui Feng
:
Reversible Privacy Protection with the Capability of Antiforensics. Secur. Commun. Networks 2021: 5558873:1-5558873:12 (2021) - [j75]Lingzan Yu
, Yanli Ren
, Guorui Feng
, Xinpeng Zhang
:
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations. Secur. Commun. Networks 2021: 6184920:1-6184920:14 (2021) - [j74]Yalan Qin
, Hanzhou Wu
, Guorui Feng:
Structured subspace learning-induced symmetric nonnegative matrix factorization. Signal Process. 186: 108115 (2021) - [j73]Xuhao Jiang, Liquan Shen, Guorui Feng, Liangwei Yu, Ping An:
An optimized CNN-based quality assessment model for screen content image. Signal Process. Image Commun. 94: 116181 (2021) - [j72]Hanzhou Wu
, Biao Yi
, Feng Ding
, Guorui Feng
, Xinpeng Zhang
:
Linguistic Steganalysis With Graph Neural Networks. IEEE Signal Process. Lett. 28: 558-562 (2021) - [j71]Qiangjie Li, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
Embedding Probability Guided Network for Image Steganalysis. IEEE Signal Process. Lett. 28: 1095-1099 (2021) - [j70]Yi Luo, Guorui Feng
, Xinpeng Zhang
:
Hierarchical Authorization of Convolutional Neural Networks for Multi-User. IEEE Signal Process. Lett. 28: 1560-1564 (2021) - [j69]Chuan Qin
, Liang Wu, Xinpeng Zhang
, Guorui Feng
:
Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval. IEEE Signal Process. Lett. 28: 1893-1897 (2021) - [j68]Yanli Ren
, Min Dong, Zhenxing Qian
, Xinpeng Zhang
, Guorui Feng
:
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. IEEE Trans. Cloud Comput. 9(1): 145-154 (2021) - [j67]Chuan Qin
, Enli Liu, Guorui Feng
, Xinpeng Zhang
:
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4523-4537 (2021) - [c20]Quan Wang, Guorui Feng:
Image Style Recognition Using Graph Network and Perception Layer. CICAI 2021: 565-574 - [c19]Sheng Li, Xun Zhu, Guorui Feng, Xinpeng Zhang, Zhenxing Qian:
Diffusing the Liveness Cues for Face Anti-spoofing. ACM Multimedia 2021: 1636-1644 - [i4]Yalan Qin, Guorui Feng, Hanzhou Wu, Yanli Ren, Xinpeng Zhang:
Orientation Convolutional Networks for Image Recognition. CoRR abs/2102.01523 (2021) - [i3]Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model for Efficient Linguistic Steganalysis: An Empirical Study. CoRR abs/2107.12168 (2021) - 2020
- [j66]Hongen Jia
, Yang Li, Guorui Feng, Kaitai Li:
An efficient two-grid method for the Cahn-Hilliard equation with the concentration-dependent mobility and the logarithmic Flory-Huggins bulk potential. Appl. Math. Comput. 387: 124548 (2020) - [j65]Kangli Hao, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Iris Segmentation Using Feature Channel Optimization for Noisy Environments. Cogn. Comput. 12(6): 1205-1216 (2020) - [j64]Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Semi-structured data protection scheme based on robust watermarking. EURASIP J. Image Video Process. 2020(1): 12 (2020) - [j63]Huaqi Wang, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Defeating data hiding in social networks using generative adversarial network. EURASIP J. Image Video Process. 2020(1): 30 (2020) - [j62]Xuhao Jiang, Liquan Shen
, Liangwei Yu, Mingxing Jiang, Guorui Feng:
No-reference screen content image quality assessment based on multi-region features. Neurocomputing 386: 30-41 (2020) - [j61]Mengtian Xu, Guorui Feng
, Yanli Ren
, Xinpeng Zhang
:
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm. IEEE Internet Things J. 7(9): 8547-8558 (2020) - [j60]Liyun Dou, Zhenxing Qian, Chuan Qin, Guorui Feng, Xinpeng Zhang:
Anti-forensics of diffusion-based image inpainting. J. Electronic Imaging 29(4): 043026 (2020) - [j59]Zhiyang Jin
, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Feature extraction optimization of JPEG steganalysis based on residual images. Signal Process. 170: 107455 (2020) - [j58]Lingchen Zhou
, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
On Security Enhancement of Steganography via Generative Adversarial Image. IEEE Signal Process. Lett. 27: 166-170 (2020) - [j57]Yanli Ren
, Xinpeng Zhang
, Guorui Feng
, Zhenxing Qian
, Fengyong Li
:
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing. IEEE Trans. Cloud Comput. 8(1): 207-219 (2020) - [j56]Guorui Feng
, Xinpeng Zhang
, Yanli Ren
, Zhenxing Qian
, Sheng Li
:
Diversity-Based Cascade Filters for JPEG Steganalysis. IEEE Trans. Circuits Syst. Video Technol. 30(2): 376-386 (2020) - [j55]Sheng Li
, Xinpeng Zhang
, Zhenxing Qian
, Guorui Feng
, Yanli Ren
:
Key Based Artificial Fingerprint Generation for Privacy Protection. IEEE Trans. Dependable Secur. Comput. 17(4): 828-840 (2020) - [j54]Jingzhi Lin
, Zhenxing Qian
, Zichi Wang, Xinpeng Zhang, Guorui Feng:
A New Steganography Method for Dynamic GIF Images Based on Palette Sort. Wirel. Commun. Mob. Comput. 2020: 8812087:1-8812087:13 (2020) - [c18]Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu:
A Deep Learning Approach to Detection of Warping Forgery in Images. ICAIS (2) 2020: 109-118 - [c17]Guorui Feng, Jian Wu:
Image Forgery Detection Based on the Convolutional Neural Network. ICMLC 2020: 266-270 - [c16]Zichi Wang, Guorui Feng, Xinpeng Zhang:
Steganographic Distortion Function for Enhanced Images. IWDW 2020: 31-40
2010 – 2019
- 2019
- [j53]Yimin Wang
, Lingsheng Kong
, Zhenxing Qian
, Guorui Feng
, Xinpeng Zhang
, Jianmin Zheng
:
Breaking Permutation-Based Mesh Steganography and Security Improvement. IEEE Access 7: 183300-183310 (2019) - [j52]Yan Sun, Guorui Feng, Yanli Ren:
JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering. IEICE Trans. Inf. Syst. 102-D(1): 198-201 (2019) - [j51]Chunhui Gao, Guorui Feng, Yanli Ren, Lizhuang Liu:
Iris Segmentation Based on Improved U-Net Network Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(8): 982-985 (2019) - [j50]Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Breaking Steganography: Slight Modification with Distortion Minimization. Int. J. Digit. Crime Forensics 11(1): 114-125 (2019) - [j49]Chuan Qin
, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Special issue on real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(3): 559-563 (2019) - [j48]Chuan Qin
, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Additional articles of special issue on Real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(4): 811-812 (2019) - [j47]Lingyan Fan, Wuyi Sun, Guorui Feng:
Image Steganalysis via Random Subspace Fisher Linear Discriminant Vector Functional Link Network and Feature Mapping. Mob. Networks Appl. 24(4): 1269-1278 (2019) - [j46]Ximei Zeng, Guorui Feng, Xinpeng Zhang:
Detection of double JPEG compression using modified DenseNet model. Multim. Tools Appl. 78(7): 8183-8196 (2019) - [j45]Danni Ni, Guorui Feng
, Liquan Shen
, Xinpeng Zhang
:
Selective Ensemble Classification of Image Steganalysis Via Deep Q Network. IEEE Signal Process. Lett. 26(7): 1065-1069 (2019) - [j44]Liquan Shen
, Guorui Feng, Ping An
:
SHVC CU Processing Aided by a Feedforward Neural Network. IEEE Trans. Ind. Informatics 15(11): 5803-5815 (2019) - [j43]Liquan Shen
, Guorui Feng:
Content-Based Adaptive SHVC Mode Decision Algorithm. IEEE Trans. Multim. 21(11): 2714-2725 (2019) - [j42]Liquan Shen, Ping An, Guorui Feng:
Low-Complexity Scalable Extension of the High-Efficiency Video Coding (SHVC) Encoding System. ACM Trans. Multim. Comput. Commun. Appl. 15(2): 44:1-44:23 (2019) - [c15]Xu Chang, Fanchang Hao, Jian Wu, Guorui Feng:
File Recovery of High-Order Clearing First Cluster Based on FAT32. CSS (1) 2019: 467-476 - [c14]Qiangjie Li, Guorui Feng, Hanzhou Wu
, Xinpeng Zhang:
Ensemble Steganalysis Based on Deep Residual Network. IWDW 2019: 84-95 - [c13]Mengtian Xu, Hanzhou Wu
, Guorui Feng, Xinpeng Zhang, Feng Ding:
Broadcasting Steganography in the Blockchain. IWDW 2019: 256-267 - [i2]Xuhao Jiang, Liquan Shen, Guorui Feng, Liangwei Yu, Ping An:
Deep Optimization model for Screen Content Image Quality Assessment using Neural Networks. CoRR abs/1903.00705 (2019) - 2018
- [j41]Kai Zhong, Guorui Feng, Liquan Shen, Jun Luo:
Deep learning for steganalysis based on filter diversity selection. Sci. China Inf. Sci. 61(12): 129105:1-129105:3 (2018) - [j40]Min Dong, Yanli Ren, Guorui Feng:
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(3): 608-611 (2018) - [j39]Liquan Shen
, Kai Li, Guorui Feng, Ping An, Zhi Liu
:
Efficient Intra Mode Selection for Depth-Map Coding Utilizing Spatiotemporal, Inter-Component and Inter-View Correlations in 3D-HEVC. IEEE Trans. Image Process. 27(9): 4195-4206 (2018) - 2017
- [j38]Zi-wen Wang, Guorui Feng, Lingyan Fan, Jin-wei Wang:
Sparse Representation for Color Image Super-Resolution with Image Quality Difference Evaluation. IEICE Trans. Inf. Syst. 100-D(1): 150-159 (2017) - [j37]Bing Cao, Guorui Feng, Zhaoxia Yin, Lingyan Fan:
Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering. IEICE Trans. Inf. Syst. 100-D(5): 1144-1147 (2017) - [j36]Jia Fu, Guorui Feng, Yanli Ren:
JPEG Image Steganalysis from Imbalanced Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(11): 2518-2521 (2017) - [c12]Yi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel:
An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images. ICCCS (1) 2017: 49-60 - [i1]Sheng Li, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, Xinpeng Zhang:
Data hiding in Fingerprint Minutiae Template for Privacy Protection. CoRR abs/1710.00516 (2017) - 2016
- [j35]Anxin Wu, Guorui Feng, Xinpeng Zhang, Yanli Ren:
Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent. 34: 103-107 (2016) - [j34]Zhenxing Qian, Xinpeng Zhang, Yanli Ren, Guorui Feng:
Block cipher based separable reversible data hiding in encrypted images. Multim. Tools Appl. 75(21): 13749-13763 (2016) - [j33]Zhenxing Qian
, Xinpeng Zhang, Guorui Feng:
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery. IEEE Signal Process. Lett. 23(11): 1672-1676 (2016) - [c11]Bing Cao, Guorui Feng, Zhaoxia Yin:
Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices. ICCCS (1) 2016: 84-93 - [c10]Kejiang Chen
, Weiming Zhang, Hang Zhou, Nenghai Yu, Guorui Feng:
Defining cost functions for adaptive steganography at the microscale. WIFS 2016: 1-6 - 2015
- [j32]Xue-xia Zhong, Guorui Feng, Jian Wang, Wenfei Wang, Wen Si:
A novel adaptive image zooming scheme via weighted least-squares estimation. Frontiers Comput. Sci. 9(5): 703-712 (2015) - [j31]Guorui Feng, Yuan Lan, Xinpeng Zhang, Zhenxing Qian:
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine. IEEE Trans. Cybern. 45(2): 279-288 (2015) - 2014
- [j30]Xiyu Han, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images Based on Image Interpolation. Int. J. Digit. Crime Forensics 6(3): 16-29 (2014) - [j29]Guorui Feng, Haiyan Zhang, Xinpeng Zhang:
Effective feature selection for image steganalysis using extreme learning machine. J. Electronic Imaging 23(6): 063020 (2014) - [j28]Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2): 322-328 (2014) - [j27]Bin Chen, Guorui Feng, Xinpeng Zhang, Fengyong Li:
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier. Signal Image Video Process. 8(8): 1475-1482 (2014) - [j26]Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, Guorui Feng:
Compressing Encrypted Images With Auxiliary Information. IEEE Trans. Multim. 16(5): 1327-1336 (2014) - 2013
- [j25]Fengyong Li, Xinpeng Zhang, Bin Chen, Guorui Feng:
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier. IEEE Signal Process. Lett. 20(3): 233-236 (2013) - 2012
- [j24]Guorui Feng, Zhenxing Qian, Ningjie Dai:
Reversible watermarking via extreme learning machine prediction. Neurocomputing 82: 62-68 (2012) - [j23]Guorui Feng, Lingyan Fan:
Reversible data hiding of high payload using local edge sensing prediction. J. Syst. Softw. 85(2): 392-399 (2012) - [j22]Duyao Wang, Sujuan Huang, Guorui Feng, Shuozhong Wang:
Perceptual differential energy watermarking for H.264/AVC. Multim. Tools Appl. 60(3): 537-550 (2012) - [j21]Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Evolutionary selection extreme learning machine optimization for regression. Soft Comput. 16(9): 1485-1491 (2012) - [j20]Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Spectrum-estimation based lossless information recovery for sparse array patterns. Telecommun. Syst. 49(2): 163-169 (2012) - [j19]Xinpeng Zhang, Guorui Feng, Yanli Ren, Zhenxing Qian:
Scalable Coding of Encrypted Images. IEEE Trans. Image Process. 21(6): 3108-3114 (2012) - [c9]Bin Chen, Guorui Feng, Fengyong Li:
Steganalysis in High-Dimensional Feature Space Using Selective Ensemble Classifiers. IFTC 2012: 9-14 - 2011
- [j18]Zhenxing Qian, Guorui Feng, Xinpeng Zhang, Shuozhong Wang:
Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2): 278-286 (2011) - [j17]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift. Intell. Autom. Soft Comput. 17(2): 233-243 (2011) - [j16]Ningjie Dai, Guorui Feng, Qian Zeng:
Reversible Watermarking Using Adaptive Edge-Guided Interpolation. KSII Trans. Internet Inf. Syst. 5(4): 856-873 (2011) - [j15]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Self-embedding watermark with flexible restoration quality. Multim. Tools Appl. 54(2): 385-395 (2011) - [j14]Xinpeng Zhang, Zhenxing Qian, Yanli Ren, Guorui Feng:
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4): 1223-1232 (2011) - [j13]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. Image Process. 20(2): 485-495 (2011) - [c8]Qian Zeng, Guorui Feng:
Differential Energy Watermarking Based on Macro-block Prediction. CIS 2011: 930-933 - [c7]Xinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian:
Compressing Encrypted Image Using Compressive Sensing. IIH-MSP 2011: 222-225 - 2010
- [j12]Zhenxing Qian, Xinpeng Zhang, Guorui Feng, Yanli Ren:
Colour filter array interpolation based self recovery with anti-cropping capability. Int. J. Multim. Intell. Secur. 1(2): 191-203 (2010) - [j11]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12): 3026-3036 (2010) - [j10]Zhenxing Qian, Guorui Feng:
Inpainting Assisted Self Recovery With Decreased Embedding Data. IEEE Signal Process. Lett. 17(11): 929-932 (2010) - [c6]Zhenxing Qian, Guorui Feng, Yanli Ren:
Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation. WAIM 2010: 537-543
2000 – 2009
- 2009
- [j9]Liquan Shen, Guorui Feng, Zhi Liu
, Zhaoyang Zhang, Ping An:
Macroblock-level adaptive search range algorithm for motion estimation in multiview video coding. J. Electronic Imaging 18(3): 033003 (2009) - [j8]Guorui Feng, Guang-Bin Huang
, Qingping Lin, Robert Kheng Leng Gay:
Error Minimized Extreme Learning Machine With Growth of Hidden Nodes and Incremental Learning. IEEE Trans. Neural Networks 20(8): 1352-1357 (2009) - [c5]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Fragile Watermarking Scheme with Extensive Content Restoration Capability. IWDW 2009: 268-278 - 2008
- [j7]Qingping Lin, Liang Zhang, Sun Ding, Guorui Feng, Guangbin Huang:
Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment. Int. J. Virtual Real. 7(2): 63-72 (2008) - 2007
- [j6]Lingyan Fan, Chen He, Guorui Feng:
Optimal bit allocation adaptive modulation algorithm for MIMO system. J. Commun. Networks 9(2): 136-140 (2007) - 2006
- [j5]Guorui Feng, Ling-ge Jiang, Dong-Jian Wang, Chen He:
Erratum to: Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transformation [Pattern Recognition 38 (12) 2530]. Pattern Recognit. 39(4): 736 (2006) - 2005
- [j4]Guorui Feng, Ling-ge Jiang, Chen He:
Permutation-Based Semi-Fragile Watermark Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 374-377 (2005) - [j3]Guorui Feng, Ling-ge Jiang, Dong-Jian Wang, Chen He:
Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transform. Pattern Recognit. 38(12): 2530-2536 (2005) - [j2]Wei Wu, Guorui Feng, Zhengxue Li, Yuesheng Xu:
Deterministic convergence of an online gradient method for BP neural networks. IEEE Trans. Neural Networks 16(3): 533-540 (2005) - [c4]Zhengxue Li, Wei Wu, Guorui Feng, Huifang Lu:
Convergence of an Online Gradient Method for BP Neural Networks with Stochastic Inputs. ICNC (1) 2005: 720-729 - 2004
- [c3]Dong-Jian Wang, Ling-ge Jiang, Guorui Feng:
Novel blind non-additive robust watermarking using 1-D chaotic map. ICASSP (3) 2004: 417-420 - [c2]Wei Wu, Zhengxue Li, Guorui Feng, Naimin Zhang, Dong Nan, Zhiqiong Shao, Jie Yang, Liqing Zhang, Yuesheng Xu:
Recent Developments on Convergence of Online Gradient Methods for Neural Network Training. ISNN (1) 2004: 235-238 - 2003
- [c1]Guorui Feng, Ling-ge Jiang, Chen He, Dong-Jian Wang:
A novel algorithm for embedding and detecting digital watermarks. ICASSP (3) 2003: 549-552 - 2002
- [j1]Wei Wu, Guorui Feng, Xin Li:
Training Multilayer Perceptrons Via Minimization of Sum of Ridge Functions. Adv. Comput. Math. 17(4): 331-347 (2002)
Coauthor Index
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint