Error minimized extreme learning machine with growth of hidden nodes and incremental learning G Feng, GB Huang, Q Lin, R Gay IEEE transactions on neural networks 20 (8), 1352-1357, 2009 | 776 | 2009 |
Reference Sharing Mechanism for Watermark Self-Embedding X Zhang, S Wang, Z Qian, G Feng Image Processing, IEEE Transactions on 20 (2), 485-495, 2011 | 205 | 2011 |
Deterministic convergence of an online gradient method for bp neural network W Wei, F Guorui, L Zhengxue, X Yuesheng IEEE Trans. Neural Netw 16 (3), 533-540, 2005 | 188 | 2005 |
Efficient reversible data hiding in encrypted images X Zhang, Z Qian, G Feng, Y Ren Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014 | 184 | 2014 |
Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction X Zhang, Z Qian, Y Ren, G Feng Information Forensics and Security, IEEE Transactions on, 1-1, 2011 | 181 | 2011 |
Scalable coding of encrypted images X Zhang, G Feng, Y Ren, Z Qian IEEE transactions on image processing 21 (6), 3108-3114, 2012 | 123 | 2012 |
Image self-embedding with high-quality restoration capability Z Qian, G Feng, X Zhang, S Wang Digital Signal Processing, 2010 | 119 | 2010 |
Reversible data hiding in encrypted images based on progressive recovery Z Qian, X Zhang, G Feng IEEE Signal Processing Letters 23 (11), 1672-1676, 2016 | 96 | 2016 |
Fragile watermarking scheme with extensive content restoration capability X Zhang, S Wang, G Feng Digital Watermarking, 268-278, 2009 | 88 | 2009 |
Reversible fragile watermarking for locating tampered blocks in JPEG images X Zhang, S Wang, Z Qian, G Feng Signal Processing 90 (12), 3026-3036, 2010 | 80 | 2010 |
Training multilayer perceptrons via minimization of sum of ridge functions W Wu, G Feng, X Li Advances in Computational Mathematics 17 (4), 331-347, 2002 | 75 | 2002 |
Compressing encrypted images with auxiliary information X Zhang, Y Ren, L Shen, Z Qian, G Feng IEEE transactions on multimedia 16 (5), 1327-1336, 2014 | 74 | 2014 |
Compressing encrypted image using compressive sensing X Zhang, Y Ren, G Feng, Z Qian 2011 seventh international conference on intelligent information hiding and …, 2011 | 74 | 2011 |
Perceptual image hashing for content authentication based on convolutional neural network with multiple constraints C Qin, E Liu, G Feng, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 31 (11), 4523 …, 2020 | 67 | 2020 |
On cloud storage optimization of blockchain with a clustering-based genetic algorithm M Xu, G Feng, Y Ren, X Zhang IEEE Internet of Things Journal 7 (9), 8547-8558, 2020 | 63 | 2020 |
Self-embedding watermark with flexible restoration quality X Zhang, S Wang, Z Qian, G Feng Multimedia Tools and Applications 54 (2), 385-395, 2011 | 63 | 2011 |
Semi-supervised structured subspace learning for multi-view clustering Y Qin, H Wu, X Zhang, G Feng IEEE Transactions on Image Processing 31, 1-14, 2021 | 54 | 2021 |
Diversity-based cascade filters for JPEG steganalysis G Feng, X Zhang, Y Ren, Z Qian, S Li IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019 | 54 | 2019 |
Dynamic adjustment of hidden node parameters for extreme learning machine G Feng, Y Lan, X Zhang, Z Qian IEEE Transactions on Cybernetics 45 (2), 279-288, 2014 | 50 | 2014 |
JPEG steganalysis with high-dimensional features and Bayesian ensemble classifier F Li, X Zhang, B Chen, G Feng IEEE signal processing letters 20 (3), 233-236, 2013 | 49 | 2013 |