Остановите войну!
for scientists:
default search action
Xiangwei Kong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Zhunan Shen, Xiangwei Kong, Liu Cheng, Rengen Wang, Yunpeng Zhu:
Fault Diagnosis of the Rolling Bearing by a Multi-Task Deep Learning Method Based on a Classifier Generative Adversarial Network. Sensors 24(4): 1290 (2024) - [j64]Haochen Qi, Liu Cheng, Xiangwei Kong, Jiqiang Zhang, Jianyi Gu:
WDLS: Deep Level Set Learning for Weakly Supervised Aeroengine Defect Segmentation. IEEE Trans. Ind. Informatics 20(1): 303-313 (2024) - 2023
- [j63]Hongwei Zhang, Xiangwei Kong, Yujia Zhang:
Cross-domain recommendation with Multi-Auxiliary Domains via Consistent and Selective Cluster-Level Knowledge Transfer. Expert Syst. Appl. 223: 119861 (2023) - [j62]Liu Cheng, Rengen Wang, Haochen Qi, Xiangwei Kong, Jiqiang Zhang, Mingzhu Yu:
S3M: Two-Stage-Based Semi-Self-Supervised Method for Intelligent Bearing Fault Diagnosis. IEEE Trans. Instrum. Meas. 72: 1-15 (2023) - [j61]Haochen Qi, Xiangwei Kong, Zhunan Shen, Zhitong Liu, Jianyi Gu:
Progressively Learning Dynamic Level Set for Weakly Supervised Industrial Defect Segmentation. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - [c81]Xiangwei Kong, Haidong Wu, Huiyang Hu:
Deep Learning-based Test Data Augmentation Technology. CISP-BMEI 2023: 1-6 - [c80]Haidong Wu, Xiangwei Kong, Wanyue Cao:
Abnormality Recognition Technology For Experimental Data Based On Deep Learning. CISP-BMEI 2023: 1-5 - [c79]Longting Chen, Hanbin Zhou, Jinyuan Tang, Danni Li, Xiangwei Kong, Jiejie Li:
Pantograph-catenary Arc Fault Detection Based on Lightweight and Single-stage Deep Detector. SAFEPROCESS 2023: 1-6 - [c78]Weikuo Guo, Xiangwei Kong:
Embrace Smaller Attention: Efficient Cross-Modal Matching with Dual Gated Attention Fusion. ICASSP 2023: 1-5 - 2022
- [j60]Hongwei Zhang, Xiangwei Kong, Yujia Zhang:
Cross-domain collaborative recommendation without overlapping entities based on domain adaptation. Multim. Syst. 28(5): 1621-1637 (2022) - [j59]Liu Cheng, Xiangwei Kong, Jiqiang Zhang, Mingzhu Yu:
A Novel Adversarial One-Shot Cross-Domain Network for Machinery Fault Diagnosis With Limited Source Data. IEEE Trans. Instrum. Meas. 71: 1-17 (2022) - [c77]Haochen Qi, Huiyan Ji, Jiqiang Zhang, Liu Cheng, Xiangwei Kong:
Defect Classification Method of X-ray Images Based on Improved U-Net. AISS 2022: 38:1-38:7 - [c76]Weikuo Guo, Huaibo Huang, Xiangwei Kong, Ran He:
Fine-Grained Cross-Modal Retrieval with Triple-Streamed Memory Fusion Transformer Encoder. ICME 2022: 1-6 - 2021
- [j58]Xueyi Li, Xiangwei Kong, Zhendong Liu, Zhiyong Hu, Cheng Shi:
A Novel Framework for Early Pitting Fault Diagnosis of Rotating Machinery Based on Dilated CNN Combined With Spatial Dropout. IEEE Access 9: 29243-29252 (2021) - [j57]Hongwei Zhang, Xiangwei Kong, Yujia Zhang:
Selective Knowledge Transfer for Cross-Domain Collaborative Recommendation. IEEE Access 9: 48039-48051 (2021) - [j56]Pengda Wang, Xiangwei Kong, Weikuo Guo, Xunpeng Zhang:
Exclusive Feature Constrained Class Activation Mapping for Better Visual Explanation. IEEE Access 9: 61417-61428 (2021) - [j55]Hongwei Zhang, Xiangwei Kong, Yujia Zhang:
Enhanced knowledge transfer for collaborative filtering with multi-source heterogeneous feedbacks. Multim. Tools Appl. 80(16): 24245-24270 (2021) - [j54]Xiangwei Kong, Xueyi Li, Qingzhao Zhou, Zhiyong Hu, Cheng Shi:
Attention Recurrent Autoencoder Hybrid Model for Early Fault Diagnosis of Rotating Machinery. IEEE Trans. Instrum. Meas. 70: 1-10 (2021) - [c75]Qianqian Song, Xiangwei Kong, Ziming Wang:
Fooling Neural Network Interpretations: Adversarial Noise to Attack Images. CICAI (2) 2021: 39-51 - [c74]Mingzhu Yu, Heli Liu, Rengen Wang, Xiangwei Kong, Zhiyong Hu, Xueyi Li:
An improved CNN based on attention mechanism with multi-domain feature fusion for bearing fault diagnosis. ICPHM 2021: 1-7 - 2020
- [j53]Tao Yao, Yaru Han, Ruxin Wang, Xiangwei Kong, Lianshan Yan, Haiyan Fu, Qi Tian:
Efficient discrete supervised hashing for large-scale cross-modal retrieval. Neurocomputing 385: 358-367 (2020) - [j52]Ying Li, Xiangwei Kong, Haiyan Fu, Qi Tian:
Node-Sensitive Graph Fusion via Topo-Correlation for Image Retrieval. IEEE Trans. Circuits Syst. Video Technol. 30(10): 3777-3787 (2020) - [j51]Tao Yao, Xiangwei Kong, Haiyan Fu, Qi Tian:
Discrete Semantic Alignment Hashing for Cross-Media Retrieval. IEEE Trans. Cybern. 50(12): 4896-4907 (2020) - [c73]Xiangwei Kong:
Evaluation of Flight Test Data Quality Based on Rough Set Theory. CISP-BMEI 2020: 1053-1057
2010 – 2019
- 2019
- [j50]Ying Li, Xiangwei Kong, Haiyan Fu, Qi Tian:
Contextual modeling on auxiliary points for robust image reranking. Frontiers Comput. Sci. 13(5): 1010-1022 (2019) - [j49]Yong Yang, Xiangwei Kong, Bo Wang, Ke Ren, Yanqing Guo:
Steganalysis on Internet images via domain adaptive classifier. Neurocomputing 351: 205-216 (2019) - [j48]Fen Zhang, Xiangwei Kong, Ze Jia:
Grouped attribute strength-based image retrieval. J. Electronic Imaging 28(1): 013048 (2019) - [j47]Ying Li, Xiangwei Kong, Haiyan Fu:
Exploring geometric information in CNN for image retrieval. Multim. Tools Appl. 78(21): 30585-30598 (2019) - [j46]Xin Zheng, Yanqing Guo, Jun Guo, Xiangwei Kong:
$$\hbox {U}^2\hbox {F}^2\hbox {S}^2$$ U 2 F 2 S 2 : Uncovering Feature-level Similarities for Unsupervised Feature Selection. Neural Process. Lett. 49(3): 1071-1091 (2019) - [j45]Tao Yao, Gang Wang, Lianshan Yan, Xiangwei Kong, Qingtang Su, Caiming Zhang, Qi Tian:
Online latent semantic hashing for cross-media retrieval. Pattern Recognit. 89: 1-11 (2019) - [j44]Fei Wang, Changhao Men, Xiangwei Kong, Lingxiang Meng:
Optimum Design and Application Research of Eddy Current Sensor for Measurement of TBM Disc Cutter Wear. Sensors 19(19): 4230 (2019) - [j43]Yi Li, Yanqing Guo, Jun Guo, Zhuang Ma, Xiangwei Kong, Qian Liu:
Joint CRF and Locality-Consistent Dictionary Learning for Semantic Segmentation. IEEE Trans. Multim. 21(4): 875-886 (2019) - [c72]Peng Wang, Xiangwei Kong, Xiaoya Li, Huiyang Hu, Zhongjie Wang, Hong Li, Wei Liu:
Fault Diagnosis Method of Aeroengine Bearing Based on Convolution Self-Coded Neural Network. CISP-BMEI 2019: 1-6 - [c71]Mingyang Li, Xiangwei Kong, Tao Yao, Yujia Zhang:
Discrete Similarity Preserving Hashing for Cross-modal Retrieval. ICAIS (2) 2019: 202-213 - [c70]Xiangwei Kong, Peng Wang, Xiaoya Li, Wei Liu, Huiyang Hu, Zhongjie Wang, Hong Li:
Prediction Method of Aeroengine Residual Life Based on Stacked Sparse Automatic Encoder. ICSAI 2019: 1497-1502 - [c69]Xunpeng Zhang, Xiangwei Kong, Pengda Wang, Bo Wang:
Cover-Source Mismatch in Deep Spatial Steganalysis. IWDW 2019: 71-83 - [c68]Weikuo Guo, Huaibo Huang, Xiangwei Kong, Ran He:
Learning Disentangled Representation for Cross-Modal Retrieval with Deep Mutual Information Estimation. ACM Multimedia 2019: 1712-1720 - [e6]Yao Zhao, Nick Barnes, Baoquan Chen, Rüdiger Westermann, Xiangwei Kong, Chunyu Lin:
Image and Graphics - 10th International Conference, ICIG 2019, Beijing, China, August 23-25, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11901, Springer 2019, ISBN 978-3-030-34119-0 [contents] - [e5]Yao Zhao, Nick Barnes, Baoquan Chen, Rüdiger Westermann, Xiangwei Kong, Chunyu Lin:
Image and Graphics - 10th International Conference, ICIG 2019, Beijing, China, August 23-25, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11902, Springer 2019, ISBN 978-3-030-34109-1 [contents] - [e4]Yao Zhao, Nick Barnes, Baoquan Chen, Rüdiger Westermann, Xiangwei Kong, Chunyu Lin:
Image and Graphics - 10th International Conference, ICIG 2019, Beijing, China, August 23-25, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11903, Springer 2019, ISBN 978-3-030-34112-1 [contents] - [i4]Tao Yao, Xiangwei Kong, Lianshan Yan, Wenjing Tang, Qi Tian:
Efficient Discrete Supervised Hashing for Large-scale Cross-modal Retrieval. CoRR abs/1905.01304 (2019) - 2018
- [j42]Qianyu Wang, Yanqing Guo, Jiujun Wang, Xiangyang Luo, Xiangwei Kong:
Multi-View Analysis Dictionary Learning for Image Classification. IEEE Access 6: 20174-20183 (2018) - [j41]Ying Li, Xiangwei Kong, Haiyan Fu, Qi Tian:
Aggregating hierarchical binary activations for image retrieval. Neurocomputing 314: 65-77 (2018) - [j40]Fen Zhang, Xiangwei Kong, Ze Jia:
Attribute-correlated local regions for deep relative attributes learning. J. Electronic Imaging 27(04): 043021 (2018) - [j39]Fuqing Zhu, Xiangwei Kong, Haiyan Fu, Qi Tian:
Pseudo-positive regularization for deep person re-identification. Multim. Syst. 24(4): 477-489 (2018) - [j38]Fuqing Zhu, Xiangwei Kong, Haiyan Fu, Qi Tian:
A novel two-stream saliency image fusion CNN architecture for person re-identification. Multim. Syst. 24(5): 569-582 (2018) - [j37]Fuqing Zhu, Xiangwei Kong, Qun Wu, Haiyan Fu, Ming Li:
A loss combination based deep model for person re-identification. Multim. Tools Appl. 77(3): 3049-3069 (2018) - [j36]Qianyu Wang, Yanqing Guo, Jun Guo, Xiangwei Kong:
Synthesis K-SVD based analysis dictionary learning for pattern classification. Multim. Tools Appl. 77(13): 17023-17041 (2018) - [j35]Yong Yang, Xiangwei Kong, Chaoyu Feng:
Double-compressed JPEG images steganalysis with transferring feature. Multim. Tools Appl. 77(14): 17993-18005 (2018) - [j34]Qiang Li, Haiyan Fu, Xiangwei Kong, Qi Tian:
Deep hashing with top similarity preserving for image retrieval. Multim. Tools Appl. 77(18): 24121-24141 (2018) - [c67]Weikuo Guo, Jian Liang, Xiangwei Kong, Lingxiao Song, Ran He:
X-GACMN: An X-Shaped Generative Adversarial Cross-Modal Network with Hypersphere Embedding. ACCV (5) 2018: 513-529 - [c66]Xiangwei Kong, Guojin Peng, Xiaoya Li, Zhongjie Wang, Xiao Na:
Aeroengine Fault Diagnosis Method Based on Stack Denoising Auto-Encoders Network. CISP-BMEI 2018: 1-9 - 2017
- [j33]Tao Yao, Xiangwei Kong, Haiyan Fu, Qi Tian:
Supervised Coarse-to-Fine Semantic Hashing for cross-media retrieval. Digit. Signal Process. 63: 135-144 (2017) - [j32]Dekui Ma, Jian Liang, Ran He, Xiangwei Kong:
Nonlinear Discrete Cross-Modal Hashing for Visual-Textual Data. IEEE Multim. 24(2): 56-65 (2017) - [j31]Jiujun Wang, Yanqing Guo, Jun Guo, Ming Li, Xiangwei Kong:
Synthesis linear classifier based analysis dictionary learning for pattern classification. Neurocomputing 238: 103-113 (2017) - [j30]Miao Li, Yanqing Guo, Ming Li, Guoqi Luo, Xiangwei Kong:
Coupled Dictionary Learning for Target Recognition in SAR Images. IEEE Geosci. Remote. Sens. Lett. 14(6): 791-795 (2017) - [j29]Wang Cai-yin, Xiang-Wei Kong, Li Chao:
Process color watermarking: the use of visual masking and dot gain correction. Multim. Tools Appl. 76(15): 16291-16314 (2017) - [j28]Jiujun Wang, Yanqing Guo, Jun Guo, Xiangyang Luo, Xiangwei Kong:
Class-Aware Analysis Dictionary Learning for Pattern Classification. IEEE Signal Process. Lett. 24(12): 1822-1826 (2017) - [j27]Fuqing Zhu, Xiangwei Kong, Liang Zheng, Haiyan Fu, Qi Tian:
Part-Based Deep Hashing for Large-Scale Person Re-Identification. IEEE Trans. Image Process. 26(10): 4806-4817 (2017) - [c65]Wei Zhong, Xingang You, Xiangwei Kong, Bo Wang:
Electric network frequency estimation based on linear canonical transform for audio signal authentication. EUSIPCO 2017: 286-290 - [c64]Qiang Li, Haiyan Fu, Xiangwei Kong:
Deep Top Similarity Preserving Hashing for Image Retrieval. ICIG (2) 2017: 206-215 - [c63]Chaoyu Feng, Xiangwei Kong, Ming Li, Yong Yang, Yanqing Guo:
Contribution-based feature transfer for JPEG mismatched steganalysis. ICIP 2017: 500-504 - [c62]Nan Xu, Yanqing Guo, Xiangwei Kong:
Saliency detection via local single Gaussian model. ICIP 2017: 2289-2293 - [c61]Jun Guo, Yanqing Guo, Xiangwei Kong, Ran He:
Unsupervised feature selection with ordinal locality. ICME 2017: 1213-1218 - [e3]Yao Zhao, Xiangwei Kong, David Taubman:
Image and Graphics - 9th International Conference, ICIG 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10666, Springer 2017, ISBN 978-3-319-71606-0 [contents] - [e2]Yao Zhao, Xiangwei Kong, David Taubman:
Image and Graphics - 9th International Conference, ICIG 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10667, Springer 2017, ISBN 978-3-319-71588-9 [contents] - [e1]Yao Zhao, Xiangwei Kong, David Taubman:
Image and Graphics - 9th International Conference, ICIG 2017, Shanghai, China, September 13-15, 2017, Revised Selected Papers, Part III. Lecture Notes in Computer Science 10668, Springer 2017, ISBN 978-3-319-71597-1 [contents] - [i3]Fuqing Zhu, Xiangwei Kong, Liang Zheng, Haiyan Fu, Qi Tian:
Part-based Deep Hashing for Large-scale Person Re-identification. CoRR abs/1705.02145 (2017) - [i2]Fuqing Zhu, Xiangwei Kong, Haiyan Fu, Qi Tian:
Pseudo-positive regularization for deep person re-identification. CoRR abs/1711.06500 (2017) - 2016
- [j26]Ming Li, Qian Liu, Yanqing Guo, Bo Wang, Xiangwei Kong:
Amplitude-adaptive spread-spectrum data embedding. IET Image Process. 10(2): 138-148 (2016) - [j25]Tao Yao, Xiangwei Kong, Haiyan Fu, Qi Tian:
Semantic consistency hashing for cross-modal retrieval. Neurocomputing 193: 250-259 (2016) - [j24]Xiangwei Kong, Chaoyu Feng, Ming Li, Yanqing Guo:
Iterative multi-order feature alignment for JPEG mismatched steganalysis. Neurocomputing 214: 458-470 (2016) - [j23]Yanqing Guo, Rui Zhao, Xiangwei Kong, Haiyan Fu, Jinping Jiang:
基于事件要素加权的新闻摘要提取方法 (News-summarization Extraction Method Based on Weighted Event Elements Strategy). 计算机科学 43(1): 237-241 (2016) - [j22]Haiyan Fu, Hanguang Zhao, Xiangwei Kong, Xianbo Zhang:
BHoG: binary descriptor for sketch-based image retrieval. Multim. Syst. 22(1): 127-136 (2016) - [j21]Haiyan Fu, Xiangwei Kong, Zhenfan Wang:
Binary code reranking method with weighted hamming distance. Multim. Tools Appl. 75(3): 1391-1408 (2016) - [c60]Jun Guo, Yanqing Guo, Xiangwei Kong, Man Zhang, Ran He:
Discriminative Analysis Dictionary Learning. AAAI 2016: 1617-1623 - [c59]Na Xiao, Dan Liu, Ailing Luo, Xiangwei Kong, Tianshe Yang, Nan Xing, Fangzheng Li:
Adaptive feature extraction based on Stacked Denoising Auto-encoders for asynchronous motor fault diagnosis. CISP-BMEI 2016: 854-859 - [c58]Jun Guo, Yanqing Guo, Bo Wang, Xiangwei Kong, Ran He:
Topology preserving dictionary learning for pattern classification. IJCNN 2016: 1709-1715 - [c57]Dekui Ma, Jian Liang, Xiangwei Kong, Ran He, Ying Li:
Discrete Cross-Modal Hashing for Efficient Multimedia Retrieval. ISM 2016: 38-43 - [c56]Han Wu, Xiangwei Kong, Hongxue Yang, Ying Li:
Sparse Feature Preservation for Relative Attribute Learning. ISM 2016: 385-390 - [c55]Ying Li, Xiangwei Kong, Liang Zheng, Qi Tian:
Exploiting Hierarchical Activations of Neural Network for Image Retrieval. ACM Multimedia 2016: 132-136 - [c54]Dekui Ma, Jian Liang, Xiangwei Kong, Ran He:
Frustratingly Easy Cross-Modal Hashing. ACM Multimedia 2016: 237-241 - 2015
- [j20]Bo Wang, Yue Tan, Meijuan Zhao, Yanqing Guo, Xiangwei Kong:
Classifier Combination Based Source Identification for Cell Phone Images. KSII Trans. Internet Inf. Syst. 9(12): 5087-5102 (2015) - [j19]Shize Shang, Xiangwei Kong, Xingang You:
Document forgery detection using distortion mutation of geometric parameters in characters. J. Electronic Imaging 24(2): 023008 (2015) - [j18]Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:
DMAM: distributed mobility and authentication mechanism in next generation networks. Secur. Commun. Networks 8(5): 845-863 (2015) - [j17]Ming Li, Yanqing Guo, Bo Wang, Xiangwei Kong:
Secure spread-spectrum data embedding with PN-sequence masking. Signal Process. Image Commun. 39: 17-25 (2015) - [j16]Qian Liu, Ming Li, Xiangwei Kong, Nan Zhao:
Disrupting MIMO Communications With Optimal Jamming Signal Design. IEEE Trans. Wirel. Commun. 14(10): 5313-5325 (2015) - [c53]Yi Li, Yanqing Guo, Jun Guo, Ming Li, Xiangwei Kong:
CRF with locality-consistent dictionary learning for semantic segmentation. ACPR 2015: 509-513 - [c52]Zhihao Xu, Yanqing Guo, Jun Guo, Xiangwei Kong:
Hybrid dictionary learning for JPEG steganalysis. APSIPA 2015: 711-714 - [c51]Ming Li, Lingyun Li, Yanqing Guo, Bo Wang, Xiangwei Kong:
Security analysis of optimal multi-carrier spread-spectrum embedding. ChinaSIP 2015: 851-855 - [c50]Jianyuan Hao, Xiangwei Kong, Shize Shang:
Printer identification using page geometric distortion on text lines. ChinaSIP 2015: 856-860 - [c49]Han Wu, Xiangwei Kong, Shize Shang:
A printer forensics method using halftone dot arrangement model. ChinaSIP 2015: 861-865 - [c48]Yue Tan, Bo Wang, Meijuan Zhao, Xiangwei Kong, Ming Li:
Patch-based sensor pattern noise for camera source identification. ChinaSIP 2015: 866-870 - [c47]Ming Li, Qian Liu, Bo Wang, Yanqing Guo, Xiangwei Kong:
PN-sequence masked spread-spectrum data embedding. ICCC 2015: 1-6 - [c46]Lingyun Li, Yanqing Guo, Lingxi Xie, Xiangwei Kong, Qi Tian:
Fine-grained visual categorization with fine-tuned segmentation. ICIP 2015: 2025-2029 - [c45]Zhenfan Wang, Xiangwei Kong, Haiyan Fu, Ming Li, Yujia Zhang:
Feature extraction via multi-view non-negative matrix factorization with local graph regularization. ICIP 2015: 3500-3504 - [c44]Hongxue Yang, Xiangwei Kong, Haiyan Fu, Ming Li, Genping Zhao:
Semi-supervised learning based on group sparse for relative attributes. ICIP 2015: 3931-3935 - [c43]Hanguang Zhao, Xiangwei Kong, Haiyan Fu, Yujia Zhang:
RST-invariant sketch retrieval based on circular description. ICIP 2015: 4977-4981 - [c42]Yue Tan, Bo Wang, Ming Li, Yanqing Guo, Xiangwei Kong, Yunqing Shi:
Camera Source Identification with Limited Labeled Training Set. IWDW 2015: 18-27 - [c41]Likai Zeng, Xiangwei Kong, Ming Li, Yanqing Guo:
JPEG quantization table mismatched steganalysis via robust discriminative feature transformation. Media Watermarking, Security, and Forensics 2015: 94090U - 2014
- [j15]Shize Shang, Nasir D. Memon, Xiangwei Kong:
Detecting documents forged by printing and copying. EURASIP J. Adv. Signal Process. 2014: 140 (2014) - [j14]Xiangwei Kong, Yuanhua Lin, Yijie Qiu:
A New Method for Predicting the Position of Gas Influx Based on PRP in Drilling Operations. J. Appl. Math. 2014: 969465:1-969465:12 (2014) - [j13]Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:
CLAM: Cross-layer Localized Authentication Mechanism based on Proxy MIPv6 and SIP in Next Generation Networks. J. Commun. 9(2): 144-156 (2014) - [j12]Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:
Cross-layer Localized Mobility Management Based on SIP and HMIPv6 in Next Generation Networks. J. Commun. 9(3): 217-225 (2014) - [j11]Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:
Secure Session Mobility using Hierarchical Authentication Key Management in Next Generation Networks. J. Networks 9(5): 1121-1131 (2014) - [c40]Tianzhuo Wang, Xiangwei Kong, Yanqing Guo, Bo Wang:
Exposing the double compression in MP3 audio by frequency vibration. ChinaSIP 2014: 450-454 - [c39]Shize Shang, Husrev T. Sencar, Nasir D. Memon, Xiangwei Kong:
A semi-automatic deshredding method based on curve matching. ICIP 2014: 5537-5541 - [c38]Ye Liu, Xiangwei Kong, Haiyan Fu, Xingang You, Yunbiao Guo:
Model Semantic Relations with Extended Attributes. ICPR 2014: 2549-2554 - [c37]Haiyan Fu, Xiangwei Kong, Yanqing Guo, Xingang You, Linna Zhou:
Binary Code Reranking Method Based on Bit Importance. ICPR 2014: 2679-2684 - 2013
- [j10]Yanqing Guo, Ran He, Wei-Shi Zheng, Xiangwei Kong, Zhaofeng He:
Robust spectral regression for face recognition. Neurocomputing 118: 33-40 (2013) - [j9]Haiyan Fu, Xiangwei Kong, Jiayin Lu:
Large-scale image retrieval based on boosting iterative quantization hashing with query-adaptive reranking. Neurocomputing 122: 480-489 (2013) - [j8]Hang Liu, Eun Kyung Lee, Dario Pompili, Xiangwei Kong:
Thermal camera networks for large datacenters using real-time thermal monitoring mechanism. J. Supercomput. 64(2): 383-408 (2013) - [j7]Ran He, Wei-Shi Zheng, Bao-Gang Hu, Xiangwei Kong:
Two-Stage Nonnegative Sparse Representation for Large-Scale Face Recognition. IEEE Trans. Neural Networks Learn. Syst. 24(1): 35-46 (2013) - [c36]Xiaofeng Li, Xiangwei Kong, Bo Wang, Yanqing Guo, Xingang You:
Generalized transfer component analysis for mismatched JPEG steganalysis. ICIP 2013: 4432-4436 - [c35]Muhammad Zubair, Xiangwei Kong, Irum Jamshed, Muhammad Ali:
Integrating SIP with F-HMIPv6 to Enhance End-to-End QoS in Next Generation Networks. ICSS 2013: 715-725 - [c34]Changyou Wang, Xiangwei Kong, Shize Shang, Xingang You:
Photocopier forensics based on arbitrary text characters. Media Watermarking, Security, and Forensics 2013: 86650G - [c33]Lanying Wu, Xiangwei Kong, Bo Wang, Shize Shang:
Image tampering localization via estimating the non-aligned double JPEG compression. Media Watermarking, Security, and Forensics 2013: 86650R - [c32]Haiyan Fu, Xiangwei Kong, Yanqing Guo, Jiayin Lu:
Weakly Principal Component Hashing with Multiple Tables. MMM (2) 2013: 293-304 - 2012
- [c31]Yanqing Guo, Ran He, Wei-Shi Zheng, Xiangwei Kong:
Active Shape Model Based on Sparse Representation. CCBR 2012: 94-103 - [c30]Shuhan Luan, Xiangwei Kong, Bo Wang, Yanqing Guo, Xingang You:
Silhouette coefficient based approach on cell-phone classification for unknown source images. ICC 2012: 6744-6747 - [c29]Yanqing Guo, Xiangwei Kong, Bo Wang, Qian Xiao:
Steganalysis of LSB Matching Based on the Sum Features of Average Co-occurrence Matrix Using Image Estimation. IWDW 2012: 34-43 - 2011
- [j6]Lin Yao, Xiangwei Kong, Guowei Wu, Chi Lin, Qingna Fan:
Tree-based Multicast Key Management in ubiquitous computing environment. Int. J. Ad Hoc Ubiquitous Comput. 8(1/2): 27-35 (2011) - [j5]Ran He, Wei-Shi Zheng, Bao-Gang Hu, Xiangwei Kong:
A Regularized Correntropy Framework for Robust Pattern Recognition. Neural Comput. 23(8): 2074-2100 (2011) - [j4]Ran He, Bao-Gang Hu, Wei-Shi Zheng, Xiangwei Kong:
Robust Principal Component Analysis Based on Maximum Correntropy Criterion. IEEE Trans. Image Process. 20(6): 1485-1494 (2011) - [c28]Ran He, Wei-Shi Zheng, Bao-Gang Hu, Xiangwei Kong:
Nonnegative sparse coding for discriminative semi-supervised learning. CVPR 2011: 2849-2856 - [c27]Lisha Dong, Xiangwei Kong, Bo Wang, Xingang You:
Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients. ICIG 2011: 234-237 - [c26]Jianhui Zhou, Haiyan Fu, Xiangwei Kong:
A balanced semi-supervised hashing method for CBIR. ICIP 2011: 2481-2484 - 2010
- [j3]Lin Yao, Lei Wang, Xiangwei Kong, Guowei Wu, Feng Xia:
An inter-domain authentication scheme for pervasive computing environment. Comput. Math. Appl. 60(2): 234-244 (2010) - [c25]Xiangwei Kong, Xingang You, Bo Wang, Shize Shang, Linjie Shen:
Laser Printer Source Forensics for Arbitrary Chinese Characters. Security and Management 2010: 356-360 - [c24]Lin Yao, Chi Lin, Xiangwei Kong, Feng Xia, Guowei Wu:
A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing. GreenCom/CPSCom 2010: 719-726 - [c23]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino, Xiangwei Kong, Weike Zhang:
Biometrics-based identifiers for digital identity management. IDtrust 2010: 84-96 - [c22]Xuehui Sun, Lisha Dong, Bo Wang, Xiangwei Kong, Xingang You:
Source Cell-phone Identification Based on Multi-feature Fusion. IPCV 2010: 590-596 - [i1]Lin Yao, Chi Lin, Xiangwei Kong, Feng Xia, Guowei Wu:
A Clustering-based Location Privacy Protection Scheme for Pervasive Computing. CoRR abs/1011.3098 (2010)
2000 – 2009
- 2009
- [c21]Pin Zhang, Xiangwei Kong:
Detecting Image Tampering Using Feature Fusion. ARES 2009: 335-340 - [c20]Yubao Wu, Xiangwei Kong, Xingang You, Yiping Guo:
Printer forensics based on page document's geometric distortion. ICIP 2009: 2909-2912 - [c19]Bo Wang, Xiangwei Kong, Xingang You:
Source Camera Identification Using Support Vector Machines. IFIP Int. Conf. Digital Forensics 2009: 107-118 - [c18]Haiyan Fu, Xiangwei Kong, Shijie Jia, Yanqing Guo:
Visual Search Based on Contour Salient. IIH-MSP 2009: 694-697 - [c17]Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng:
Source Camera Identification Forensics Based on Wavelet Features. IIH-MSP 2009: 702-705 - [c16]Bin Li, Xiangwei Kong, Zhe Wang, Haiyan Fu:
SIFT-Based Image Retrieval Combining the Distance Measure of Global Image and Sub-Image. IIH-MSP 2009: 706-709 - 2008
- [c15]Hang Liu, Dan Yu, Xiangwei Kong:
A New Approach to Improve Signal Classification in Low SNR Environment in Spectrum Sensing. CrownCom 2008: 1-5 - [c14]Fanjie Meng, Xiangwei Kong, Xingang You:
A New Feature-Based Method for Source Camera Identification. IFIP Int. Conf. Digital Forensics 2008: 207-218 - [c13]Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Game Analysis with Penalty Parameter. ISECS 2008: 453-456 - [c12]Wei Sun, Xiangwei Kong, Dequan He, Xingang You:
Information Security Problem Research Based on Game Theory. ISECS 2008: 554-557 - [c11]Lin Yao, Xiangwei Kong, Zichuan Xu:
A Task-Role Based Access Control Model with Multi-Constraints. NCM (1) 2008: 137-143 - 2006
- [c10]Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong:
Effects on Statistical Features for Image by Quantization. IIH-MSP 2006: 631-634 - 2005
- [c9]Yong Tian, Xiangwei Kong:
An Improved Shape-Based Arbitrary Shape ROI Coding Method with SA-DWT in JPEG2000. ICASSP (2) 2005: 373-376 - [c8]Xiang-Wei Kong, Wen-Feng Liu, Xin-Gang You:
Secret Message Location Steganalysis Based on Local Coherences of Hue. PCM (2) 2005: 301-311 - 2004
- [j2]Xiangwei Kong, Yu Liu, Huajian Liu, Deli Yang:
Object watermarks for digital images and video. Image Vis. Comput. 22(8): 583-595 (2004) - [c7]Rufeng Chu, Xingang You, Xiangwei Kong, Xiaohui Ba:
A DCT-based image steganographic method resisting statistical attacks. ICASSP (5) 2004: 953-956 - [c6]Wei Ding, Xiang-Wei Kong, Xin-Gang You, Zi-Ren Wang:
A Secure Steganographic Method on Wavelet Domain of Palette-Based Images. PCM (3) 2004: 426-432 - 2003
- [c5]Xiangwei Kong, Rufeng Chu, Xiaohui Ba, Ting Zhang, Deli Yang:
A Perception Evaluation Scheme for Steganography. IDEAL 2003: 426-430 - [c4]Xiangwei Kong, Feishi Chen, Zhiyuan Liu, Shaoxiang Zong:
Estimation of Sea Ice Movement Using Locally Parallel Matching Model. KES 2003: 638-645 - 2002
- [j1]Xiangwei Kong, Renying Wang, Guoping Li:
Fuzzy clustering algorithms based on resolution and their application in image compression. Pattern Recognit. 35(11): 2439-2444 (2002) - [c3]Xiangwei Kong, Ting Zhang, Xingang You, Deli Yang:
A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter. IEEE Pacific Rim Conference on Multimedia 2002: 434-441 - 2001
- [c2]Huajian Liu, Xiangwei Kong, Xiangdong Kong, Yu Liu:
Content based color image adaptive watermarking scheme. ISCAS (2) 2001: 41-44 - [c1]Xiangwei Kong, Yu Liu, Huajian Liu:
Adaptive Video Watermarking Scheme. IEEE Pacific Rim Conference on Multimedia 2001: 933-938
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-06 10:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint