Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
geoffrey e hinton
Luz Santamaria-Granados
Claudia Calabrese
Hao Mao
Peter Malec
Sam Vaziri
Chen Ma
Marco Mandolini
Radu Timofte
Kuanrui Yin
Home
/
Author
/
XIAOFENG WANG
Author Info
Open Visualization
Name
Affiliation
Papers
XIAOFENG WANG
Xian Univ Technol, Sch Sci, Xian 710048, Shaanxi, Peoples R China
23
Collaborators
Citations
PageRank
59
94
9.88
Referers
Referees
References
278
470
224
Search Limit
100
470
Publications (23 rows)
Collaborators (59 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
An enhanced chimp optimization algorithm for optimal degree reduction of Said–Ball curves
0
0.34
2022
Coarse-to-fine-grained method for image splicing region detection
0
0.34
2022
An Efficient Batch Images Encryption Method Based On Dna Encoding And Pwlcm
0
0.34
2021
Median Filtering Detection Using Lbp Encoding Pattern(Star)
0
0.34
2021
Perceptual hash-based coarse-to-fine grained image tampering forensics method
0
0.34
2021
Image alignment based perceptual image hash for content authentication
2
0.37
2020
Low Dose CT Image Reconstruction Based on Structure Tensor Total Variation Using Accelerated Fast Iterative Shrinkage Thresholding Algorithm.
0
0.34
2020
Time Series Prediction Method Based on Variant LSTM Recurrent Neural Network
2
0.37
2020
Image splicing localization using noise distribution characteristic
0
0.34
2019
Super-resolution image reconstruction using surface fitting with hierarchical structure.
1
0.35
2018
Reversible data hiding in encrypted image with separable data extraction from image decryption.
2
0.36
2017
Keypoints-Based Image Passive Forensics Method For Copy-Move Attacks
4
0.45
2016
Source camera identification from image texture features.
11
0.48
2016
Steganography forensics method for detecting least significant bit replacement attack
0
0.34
2015
A Visual Model based Perceptual Image Hash for Content Authentication
30
1.04
2015
A statistical feature based approach to distinguish PRCG from photographs.
7
0.44
2014
A Contourlet-Domain Image Signature for Content Authentication
0
0.34
2013
Image forensic signature for content authenticity analysis
9
0.52
2012
A Novel Image Signature Method for Content Authentication
1
0.34
2012
An Identity-Based Mediated Signature Scheme Without Trusted Pkg
0
0.34
2011
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection
13
0.69
2011
Hash key-based video encryption scheme for H.264/AVC
12
0.73
2010
ID-based authenticated multi-group keys agreement scheme for computing grid
0
0.34
2010
1