近期论文
查看导师最新文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
B. Zhang, G. Zhu*, Z. Zhu, H. Zhang, Y. Zhou, and S. Kwong, “Impulse Noise Image Restoration Using Nonconvex Variational Model and Difference of Convex Functions Algorithm,” IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2022.3225525, in press.
Y. Zhang, G. Zhu*, X. Wang, X. Luo, Y. Zhou, H. Zhang, and L. Wu, “CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/Target Distinguishment,” IEEE Transactions on Circuits and Systems for Video Technology, DOI: 10.1109/TCSVT.2022.3220630, in press.
J. You#, Y.-G. Wang#, G. Zhu*, L. Wu, H. Zhang, and S. Kwong, “Estimating the Secret Key of Spread Spectrum Watermarking Based on Equivalent Keys,” IEEE Transactions on Multimedia, DOI: 10.1109/TMM.2022.3147379, in press.
F. Ding, Z. Shen, G. Zhu*, S. Kwong, Y. Zhou, and S. Lyu, “ExS-GAN: Synthesizing Anti-Forensics Images via Extra Supervised GAN,” IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2022.3210294, in press.
B. Zhang, G. Zhu*, Z. Zhu, and S. Kwong, “Alternating direction method of multipliers for nonconvex log total variation image restoration,” Applied Mathematical Modelling, vol. 114, pp. 338-359, 2023.
S. Wang, Z. Zhang, G. Zhu*, X. Zhang, Y. Zhou, and J. Huang, “Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 351-364, 2022.
J. Chang, G. Zhu*, H. Zhang, Y. Zhou, X. Luo, and L. Wu, “Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 8, pp. 5055-5067, 2022.
Z. Liu, G. Zhu*, F. Ding, X. Luo, S. Kwong, and P. Li, “Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 18, no. 3s, article ID 148, 2022.
Y. Zhang, G. Zhu*, L. Wu, S. Kwong, H. Zhang, and Y. Zhou, “Multi-task SE-Network for Image Splicing Localization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 7, pp. 4828-4840, 2022.
F. Ding, G. Zhu*, Y. Li, X. Zhang, P. K. Atrey, and S. Lyu, “Anti-Forensics for Face Swapping Videos via Adversarial Training,” IEEE Transactions on Multimedia, vol. 24, pp. 3429-3441, 2022.
Y. He, G. Zhu*, C. Gong, P. Shi, “Stability Analysis for Hybrid Time-delay Systems with Double Degrees,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 12, pp. 7444-7456, 2022.
Y. He, X. Zhao, G. Zhu*, and C. Gong, “Stability Analysis of Hybrid Time-Delay Systems Using Homogeneity Property,” ISA Transactions, vol. 129, part A, pp. 128-137, 2022.
F.-Z. Ou, Y.-G. Wang, J. Li, G. Zhu, and S. Kwong, “A Novel Rank Learning Based No-Reference Image Quality Assessment Method,” IEEE Transactions on Multimedia, vol. 24, pp. 4197-4211, 2022.
C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Asynchronous Distributed Finite-time H∞ Filtering in Sensor Networks with Hidden Markovian Switching and Two-channel Stochastic Attacks,” IEEE Transactions on Cybernetics, vol. 52, no. 3 pp. 1502-1514, 2022.
J. Yang, G. Zhu*, Y. Luo, S.Kwong, X. Zhang, and Y. Zhou, “Forensic Analysis of JPEG-domain Enhanced Images via Coefficient Likelihood Modeling,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 3, pp. 1006-1019, 2022.
J. You#, Y-G. Wang#, G. Zhu*, and S. Kwong, “Truncated Robust Natural Watermarking with Hungarian Optimization,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 2, pp. 483-495, 2022.
F. Ding, G. Zhu, M.Alazab, X. Li, and K. Yu, “Deep-Learning-Empowered Digital Forensics for Edge Consumer Electronics in 5G HetNets,” IEEE Consumer Electronics Magazine, vol. 11, no. 2, pp. 42-50, 2022 (Highly Cited Paper).
C. Gong, G. Zhu*, P. Shi, and R. K. Agarwal, “Distributed Fault Detection and Control for Markov Jump Systems Over Sensor Networks With Round-Robin Protocol,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 68, no. 8, pp. 3422-3435, 2021.
C. Gong, G. Zhu*, and P. Shi, “Adaptive event-triggered and double-quantized consensus of leader-follower multi-agent systems with semi-Markovian jump parameters,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51, no. 9, pp. 5867-5879, 2021.
J. Yang, Y. Zhang, G. Zhu*, and S. Kwong, “A Clustering-based Framework for Improving the Performance of JPEG Quantization Step Estimation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 4, pp. 1661-1672, 2021.
Y.-G. Wang, G. Zhu*, J. Li, M. Conti, and J. Huang, “Defeating lattice-based data hiding code via decoding security hole,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 1, pp. 76-87, 2021.
Y. Zhang, F.Ding, S. Kwong, and G. Zhu*, “Feature pyramid network for diffusion-based image inpainting detection,” Information Sciences, vol. 572, pp. 29-42, 2021.
Z. Liu, G. Zhu*, F. Ding, and S.Kwong, “Weighted visual secret sharing for general access structures based on random grids,” Signal Processing: Image Communication, vol. 92, article ID 116129, 2021.
C. Li, R. Cong, S. Kwong, J. Hou, H. Fu, G. Zhu, D. Zhang, and Q. Huang, “ASIF-Net: Attention Steered Interweave Fusion Network for RGB-D Salient Object Detection,” IEEE Transaction on Cybernetics, vol. 51, no. 1, pp. 88-100, 2021 (Highly Cited Paper).
F. Ding, H. Wu, G. Zhu*, and Y.-Q. Shi, “METEOR: Measurable energy map toward the estimation of resampling rate via a convolutional neural network,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 12, pp. 4715-4727, 2020.
Z. Liu, G. Zhu*, Y.-G. Wang, J. Yang, and S. Kwong, “A Novel (t, s, k, n)-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 16, no. 4, article ID 118, 2020.
B. Zhang, G. Zhu*, and Z. Zhu, “A TV-log nonconvex approach for image deblurring with impulsive noise,” Signal Processing, vol. 174, article ID: 107631, 2020.
Y.-G. Wang, G. Zhu*, and Y.-Q. Shi, “Transportation spherical watermarking,” IEEE Transactions on Image Processing, vol. 27, no. 4, pp. 2063-2077, 2018.
Y.-G. Wang, G. Zhu*, S. Kwong, and Y.-Q. Shi, “A study on the security levels of spread-spectrum embedding schemes in the WOA framework,” IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2307-2320, 2018.
C. Gong, G. Zhu*, and P. Shi, “L2-L∞ filtering for stochastic time-varying delay systems based on the Bessel-Legendre stochastic inequality,” Signal Processing, vol. 145, pp. 26-36, 2018.
J. Yang, G. Zhu*, and Y.-Q. Shi, “Analyzing the effect of JPEG compression on local variance of image intensity,” IEEE Transactions on Image Processing, vol. 25, no. 6, pp. 2647-2656, 2016.
Y.-G. Wang and G. Zhu*, “An improved AQIM watermarking method with minimum-distortion angle quantization and amplitude projection strategy,” Information Sciences, vol. 316, pp. 40-53, 2015.
J. Yang, G. Zhu*, J. Huang, and X. Zhao, “Estimating JPEG compression history of bitmaps based on factor histogram,” Digital Signal Processing, vol. 41, pp. 90-97, 2015.
F. Ding, G. Zhu*, J. Yang, J. Xie, and Y.-Q. Shi, “Edge perpendicular binary coding for USM sharpening detection,” IEEE Signal Processing Letters, vol. 22, no. 3, pp. 327-331, 2015.
J. Yang#, J. Xie#, G. Zhu*, S. Kwong, and Y.-Q. Shi, “An effective method for detecting double JPEG compression with the same quantization matrix,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1933-1942, 2014.
Y.-G. Wang, G. Zhu, and J. Huang, “An improved sample projection approach for image watermarking,” Digital Signal Processing, vol. 24, pp. 135-143, 2014.
J. Yang, G. Zhu*, J. Wang, and Y.-Q. Shi, “Detecting non-aligned double JPEG compression based on refined intensity difference and calibration,” in Proc. 12th Int. Workshop on Digital-forensics and Watermarking (IWDW), Auckland, New Zealand, 2013 (Best Paper Award).
G. Zhu, S. Kwong, J. Huang, and J. Yang, “Random Gray code and its performance analysis for image hashing,” Signal Processing, vol. 91, no. 9, pp. 2178-2193, 2011.
G. Zhu, J. Huang, S. Kwong, and J. Yang, “Fragility analysis of adaptive quantization-based image hashing,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 133-147, 2010.
G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Gradient vector flow active contours with prior directional information,” Pattern Recognition Letters, vol. 31, no. 9, pp. 845-856, 2010.
G. Zhu and S. Kwong, “Gbest-guided artificial bee colony algorithm for numerical function optimization,” Applied Mathematics and Computation, vol. 217, no. 7, pp. 3166-3173, 2010 (Over 1,500 citations according to Google scholar).
G. Zhu, J. Huang, S. Kwong, and J. Yang, “A study on the randomness measure of image hashing,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 928-932, 2009.
G. Zhu, S. Zhang, Q. Zeng, and C. Wang, “Anisotropic virtual electric field for active contours,” Pattern Recognition Letters, vol. 29, no. 11, pp. 1659-1666, 2008.
G. Zhu, S. Zhang, X. Chen, and C. Wang “Efficient illumination insensitive object tracking by normalized gradient matching,” IEEE Signal Processing Letters, vol. 14, no. 12, pp. 944-947, 2007.
G. Zhu, Q. Zeng, and C. Wang, “Efficient edge-based object tracking,” Pattern Recognition, vol. 39, no. 11, pp. 2223-2226, 2006.