-
1
-
-
84990855313
-
Efficient algorithm for K-barrier coverage based on integer linear programming
-
Zhang Y, Sun X, Wang B., Efficient algorithm for K-barrier coverage based on integer linear programming. China Commun 2016; 13 (7): 16-23.
-
(2016)
China Commun
, vol.13
, Issue.7
, pp. 16-23
-
-
Zhang, Y.1
Sun, X.2
Wang, B.3
-
2
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
Ma T, Zhou J, Tang M,. Social network and tag sources based augmenting collaborative recommender system. IEICE T Inf Syst 2015; E98.D (4): 902-910.
-
(2015)
IEICE T Inf Syst
, vol.98
, Issue.4
, pp. 902-910
-
-
Ma, T.1
Zhou, J.2
Tang, M.3
-
3
-
-
84986631527
-
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Xia Z, Zhang L, Qin Z,. A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE T Inf Foren Sec 2016; 11 (11): 2594-2608.
-
(2016)
IEEE T Inf Foren Sec
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Zhang, L.2
Qin, Z.3
-
4
-
-
84991088919
-
Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Fu Z, Guan C, Sun X,. Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE T Inf Foren Sec 2016; 11 (12): 2706-2716.
-
(2016)
IEEE T Inf Foren Sec
, vol.11
, Issue.12
, pp. 2706-2716
-
-
Fu, Z.1
Guan, C.2
Sun, X.3
-
5
-
-
85008868162
-
Structural balance theory-based e-commerce recommendation over big rating data
-
Epub ahead of print 16 September
-
Qi L, Xu X, Zhang X,. Structural balance theory-based e-commerce recommendation over big rating data. IEEE T Big Data. Epub ahead of print 16 September 2016. DOI: 10.1109/TBDATA.2016.2602849.
-
(2016)
IEEE T Big Data
-
-
Qi, L.1
Xu, X.2
Zhang, X.3
-
6
-
-
84982135416
-
Enabling personalized search over encrypted outsourced data with efficiency improvement
-
Fu Z, Shu J, Sun X,. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE T Parall Distr 2016; 27: 2546-2559. DOI: 10.1109/TPDS.2015.2506573.
-
(2016)
IEEE T Parall Distr
, vol.27
, pp. 2546-2559
-
-
Fu, Z.1
Shu, J.2
Sun, X.3
-
7
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia Z, Wang X, Sun X,. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE T Parall Distr 2016; 27: 340-352.
-
(2016)
IEEE T Parall Distr
, vol.27
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
-
8
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Fu Z, Sun X, Liu Q,. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE T Commun 2015; 98 (1): 190-200.
-
(2015)
IEICE T Commun
, vol.98
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
-
9
-
-
85086762991
-
A context-Aware service evaluation approach over big data for cloud applications
-
Epub ahead of print 23 December
-
Qi L, Dou W, Hu C,. A context-Aware service evaluation approach over big data for cloud applications. IEEE Transactions on Cloud Computing. Epub ahead of print 23 December 2015. DOI: 10.1109/TCC.2015.2511764.
-
(2015)
IEEE Transactions on Cloud Computing
-
-
Qi, L.1
Dou, W.2
Hu, C.3
-
10
-
-
84995871772
-
A belief propagation-based method for task allocation in open and dynamic cloud environments
-
Kong Y, Zhang M, Ye D., A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl: Based Syst 2017; 115 (1): 123-132.
-
(2017)
Knowl: Based Syst
, vol.115
, Issue.1
, pp. 123-132
-
-
Kong, Y.1
Zhang, M.2
Ye, D.3
-
11
-
-
84981328411
-
A speculative approach to spatial-Temporal efficiency with multi-objective optimization in a heterogeneous cloud environment
-
Liu Q, Cai W, Shen J,. A speculative approach to spatial-Temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 2016; 9 (17): 4002-4012.
-
(2016)
Secur Commun Netw
, vol.9
, Issue.17
, pp. 4002-4012
-
-
Liu, Q.1
Cai, W.2
Shen, J.3
-
12
-
-
84953347638
-
Weighted PCA-based service selection method for multimedia services in cloud environment
-
Qi L, Dou W, Chen J., Weighted PCA-based service selection method for multimedia services in cloud environment. Computing 2016; 98 (1): 195-214.
-
(2016)
Computing
, vol.98
, Issue.1
, pp. 195-214
-
-
Qi, L.1
Dou, W.2
Chen, J.3
-
13
-
-
85008929937
-
Effective and efficient image copy detection with resistance to arbitrary rotation
-
Zhou Z, Yang C, Chen B,. Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE T Inf Syst 2016; E99D (6): 1531-1540.
-
(2016)
IEICE T Inf Syst
, vol.99
, Issue.6
, pp. 1531-1540
-
-
Zhou, Z.1
Yang, C.2
Chen, B.3
-
14
-
-
84922280902
-
Segmentation-based image copy-move forgery detection scheme
-
Li J, Li XL, Yang B,. Segmentation-based image copy-move forgery detection scheme. IEEE T Inf Foren Sec 2015; 10 (3): 507-518.
-
(2015)
IEEE T Inf Foren Sec
, vol.10
, Issue.3
, pp. 507-518
-
-
Li, J.1
Li, X.L.2
Yang, B.3
-
15
-
-
85011659317
-
Effective and efficient global context verification for image copy detection
-
Zhou Z, Wu QMJ, Yang C,. Effective and efficient global context verification for image copy detection. IEEE T Inf Foren Sec 2017; 12 (1): 48-63.
-
(2017)
IEEE T Inf Foren Sec
, vol.12
, Issue.1
, pp. 48-63
-
-
Zhou, Z.1
Wu, Q.M.J.2
Yang, C.3
-
16
-
-
84922000532
-
Mining near duplicate image groups
-
Li J, Qian X, Li Q,. Mining near duplicate image groups. Multimed Tools Appl 2015; 74 (2): 655-669.
-
(2015)
Multimed Tools Appl
, vol.74
, Issue.2
, pp. 655-669
-
-
Li, J.1
Qian, X.2
Li, Q.3
-
17
-
-
84959136299
-
Steganalysis of LSB matching using differences between nonadjacent pixels
-
Xia Z, Wang X, Sun X,. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 2016; 75 (4): 1947-1962.
-
(2016)
Multimed Tools Appl
, vol.75
, Issue.4
, pp. 1947-1962
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
-
18
-
-
84904903882
-
Steganalysis of least significant bit matching using multi-order differences
-
Xia Z, Wang X, Sun X,. Steganalysis of least significant bit matching using multi-order differences. Secur Commun Netw 2014; 7 (8): 1283-1291.
-
(2014)
Secur Commun Netw
, vol.7
, Issue.8
, pp. 1283-1291
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
-
19
-
-
0037372152
-
Content-based image copy detection
-
Kim C., Content-based image copy detection. Signal Process: Image 2003; 18 (3): 169-184.
-
(2003)
Signal Process: Image
, vol.18
, Issue.3
, pp. 169-184
-
-
Kim, C.1
-
20
-
-
48349143997
-
An edge-based image copy detection scheme
-
Lin C, Wang S., An edge-based image copy detection scheme. Fundam Inform 2008; 83 (3): 299-318.
-
(2008)
Fundam Inform
, vol.83
, Issue.3
, pp. 299-318
-
-
Lin, C.1
Wang, S.2
-
21
-
-
79956093190
-
Content-based image retrieval using color and texture fused features
-
Yue J, Li Z, Liu L,. Content-based image retrieval using color and texture fused features. Math Comput Model 2011; 54 (3-4): 1121-1127.
-
(2011)
Math Comput Model
, vol.54
, Issue.3-4
, pp. 1121-1127
-
-
Yue, J.1
Li, Z.2
Liu, L.3
-
22
-
-
62449218032
-
Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection
-
Wan-Lei Z, Chong-Wah N., Scale-rotation invariant pattern entropy for keypoint-based near-duplicate detection. IEEE Trans Image Process 2009; 18: 412-423.
-
(2009)
IEEE Trans Image Process
, vol.18
, pp. 412-423
-
-
Wan-Lei, Z.1
Chong-Wah, N.2
-
23
-
-
77955649345
-
Near duplicate identification with spatially aligned pyramid matching
-
Xu D, Cham TJ, Yan S,. Near duplicate identification with spatially aligned pyramid matching. IEEE T Circ Syst Vid 2010; 20 (8): 1068-1079.
-
(2010)
IEEE T Circ Syst Vid
, vol.20
, Issue.8
, pp. 1068-1079
-
-
Xu, D.1
Cham, T.J.2
Yan, S.3
-
24
-
-
84874848071
-
SIFT match verification by geometric coding for large-scale partial-duplicate web image search
-
Zhou W, Li H, Lu Y,. SIFT match verification by geometric coding for large-scale partial-duplicate web image search. ACM T Multim Comput 2013; 9 (1): 4.
-
(2013)
ACM T Multim Comput
, vol.9
, Issue.1
, pp. 4
-
-
Zhou, W.1
Li, H.2
Lu, Y.3
-
25
-
-
84924666889
-
Near-duplicate image retrieval based on contextual descriptor
-
Yao J, Yang B, Zhu Q., Near-duplicate image retrieval based on contextual descriptor. IEEE Signal Proc Let 2015; 22 (9): 1404-1408.
-
(2015)
IEEE Signal Proc Let
, vol.22
, Issue.9
, pp. 1404-1408
-
-
Yao, J.1
Yang, B.2
Zhu, Q.3
-
26
-
-
5044233274
-
PCA-sift: A more distinctive representation for local image descriptors
-
Washington, DC, 27 June-2 July, Washington, DC: IEEE
-
Ke Y, Sukthankar R,. PCA-SIFT: A more distinctive representation for local image descriptors. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition, Washington, DC, 27 June-2 July 2004, pp. 506-513. Washington, DC: IEEE.
-
(2004)
Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, pp. 506-513
-
-
Ke, Y.1
Sukthankar, R.2
-
27
-
-
84921701101
-
Color image analysis by quaternion-Type moments
-
Chen B, Shu H, Coatrieux G,. Color image analysis by quaternion-Type moments. J Math Imaging Vis 2014; 51 (1): 124-144.
-
(2014)
J Math Imaging Vis
, vol.51
, Issue.1
, pp. 124-144
-
-
Chen, B.1
Shu, H.2
Coatrieux, G.3
-
28
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
Lowe D., Distinctive image features from scale-invariant keypoints. Int J Comput Vision 2004; 60 (2): 91-110.
-
(2004)
Int J Comput Vision
, vol.60
, Issue.2
, pp. 91-110
-
-
Lowe, D.1
-
29
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
Dallas, TX, 24-26 May 1998, New York, NY: ACM
-
Indyk P, Motwani R,. Approximate nearest neighbors: Towards removing the curse of dimensionality. In: Proceedings of ACM symposium on theory of computing, Dallas, TX, 24-26 May 1998, pp. 604-613. New York, NY: ACM.
-
Proceedings of ACM Symposium on Theory of Computing
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
30
-
-
84874686317
-
FAIDA: A fast and accurate image deduplication approach
-
Chen M, Wang S, Yun X,. FAIDA: A fast and accurate image deduplication approach. J Comput Res Dev 2013; 50 (1): 101-110.
-
(2013)
J Comput Res Dev
, vol.50
, Issue.1
, pp. 101-110
-
-
Chen, M.1
Wang, S.2
Yun, X.3
-
31
-
-
84881332970
-
Presenting diverse location views with real-Time near-duplicate photo elimination
-
Brisbane, QLD, Australia, 8-12 April 2013, New York: IEEE
-
Liu J, Huang Z, Cheng H,. Presenting diverse location views with real-Time near-duplicate photo elimination. In: Proceedings of the IEEE international conference on data engineering, Brisbane, QLD, Australia, 8-12 April 2013, pp. 505-516. New York: IEEE.
-
Proceedings of the IEEE International Conference on Data Engineering
, pp. 505-516
-
-
Liu, J.1
Huang, Z.2
Cheng, H.3
-
32
-
-
84901981576
-
Integrating bilingual search results for automatic junk image filtering
-
Yang C, Peng J, Feng X,. Integrating bilingual search results for automatic junk image filtering. Multimed Tools Appl 2014; 70 (2): 661-688.
-
(2014)
Multimed Tools Appl
, vol.70
, Issue.2
, pp. 661-688
-
-
Yang, C.1
Peng, J.2
Feng, X.3
-
33
-
-
84901924464
-
Fast and accurate near-duplicate image search with affinity propagation on the ImageWeb
-
Xie LX, Tian Q, Zhou WA,. Fast and accurate near-duplicate image search with affinity propagation on the ImageWeb. Comput Vis Image Und 2014; 124: 31-41.
-
(2014)
Comput Vis Image und
, vol.124
, pp. 31-41
-
-
Xie, L.X.1
Tian, Q.2
Zhou, W.A.3
-
34
-
-
54849392900
-
VisualRank: Applying PageRank to large-scale image search
-
Jing Y, Baluja S., VisualRank: Applying PageRank to large-scale image search. IEEE T Pattern Anal 2008; 30 (11): 1877-1890.
-
(2008)
IEEE T Pattern Anal
, vol.30
, Issue.11
, pp. 1877-1890
-
-
Jing, Y.1
Baluja, S.2
-
37
-
-
85011664287
-
-
Copydays. http://lear.inrialpes.fr/jegou/data.php, 2008.
-
(2008)
Copydays
-
-
|