default search action
Yan Wo
Person information
Other persons with a similar name
- Yang Woo Ko (aka: Yangwoo Ko)
- Yang-Won Lee
- Yang Woo Shin
- Ka Yan Wong
- Yan Chiew Wong
- Yan Tat Wong — Monash University, Australia
- Won-Hyuk Yang
- WonSeok Yang
- Wonsuk Yang
- Woosung Yang
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Caiyu Li, Yan Wo:
Towards generalized face forgery detection with domain-robust representation learning. Digit. Signal Process. 156: 104792 (2025) - 2024
- [j18]Bicheng Wu, Yan Wo:
Unbinding tensor product representations for image captioning with semantic alignment and complementation. Multim. Syst. 30(3): 117 (2024) - [j17]Bicheng Wu, Yan Wo:
Incorporating semantic consistency for improved semi-supervised image captioning. Multim. Tools Appl. 83(17): 52931-52955 (2024) - 2023
- [j16]Lianyi Yu, Yan Wo:
A general framework for secure biometric hashing against reconstruction attacks. Appl. Intell. 53(10): 12811-12830 (2023) - [j15]Yuanlu Wu, Yan Wo, Caiyu Li, Guoqiang Han:
Learning domain-invariant representation for generalizing face forgery detection. Comput. Secur. 130: 103280 (2023) - [j14]Ke Meng, Yan Wo:
An image compression and encryption scheme for similarity retrieval. Signal Process. Image Commun. 119: 117044 (2023) - 2022
- [j13]Lianyi Yu, Qiangjiang Wang, Yan Wo, Guoqiang Han:
Secure biometric hashing against relation-based attacks via maximizing min-entropy. Comput. Secur. 118: 102750 (2022) - [j12]Yuanlu Wu, Yan Wo, Guoqiang Han:
Joint manipulation trace attention network and adaptive fusion mechanism for image splicing forgery localization. Multim. Tools Appl. 81(27): 38757-38780 (2022) - [j11]Zhangyong Wu, Ke Meng, Yan Wo, Xudong Zhong:
Masquerade attack on biometric hashing via BiohashGAN. Vis. Comput. 38(3): 821-835 (2022) - 2021
- [j10]Hui Lin, Yan Wo, Yuanlu Wu, Ke Meng, Guoqiang Han:
Robust source camera identification against adversarial attacks. Comput. Secur. 100: 102079 (2021) - [j9]Jieting Luo, Yan Wo, Bicheng Wu, Guoqiang Han:
Learning sufficient scene representation for unsupervised cross-modal retrieval. Neurocomputing 461: 404-418 (2021) - [j8]Yuanlu Wu, Minghao Chen, Yan Wo, Guoqiang Han:
Video smoke detection base on dense optical flow and convolutional neural network. Multim. Tools Appl. 80(28-29): 35887-35901 (2021) - 2020
- [j7]Chudan Wu, Yan Wo, Guoqing Han, Zhangyong Wu, Jiyun Liang:
Non-uniform image blind deblurring by two-stage fully convolution network. IET Image Process. 14(11): 2588-2596 (2020)
2010 – 2019
- 2019
- [j6]Wu Tang, Yan Wo, Guoqiang Han:
Geometrically robust video hashing based on ST-PCT for video copy detection. Multim. Tools Appl. 78(15): 21999-22022 (2019) - [j5]Yanzhi Chen, Yan Wo, Renjie Xie, Chudan Wu, Guoqiang Han:
Deep Secure Quantization: On secure biometric hashing against similarity-based attacks. Signal Process. 154: 314-323 (2019) - [j4]Yingri Su, Yan Wo, Guoqiang Han:
Reversible cellular automata image encryption for similarity search. Signal Process. Image Commun. 72: 134-147 (2019) - [i1]Renjie Xie, Yanzhi Chen, Yan Wo, Qiao Wang:
A Deep, Information-theoretic Framework for Robust Biometric Recognition. CoRR abs/1902.08785 (2019) - 2018
- [j3]Haichao Chen, Yan Wo, Guoqiang Han:
Multi-granularity geometrically robust video hashing for tampering detection. Multim. Tools Appl. 77(5): 5303-5321 (2018) - 2017
- [j2]Yan Wo, Kemin Yang, Guoqiang Han, Haichao Chen, Wenbo Wu:
Copy-move forgery detection based on multi-radius PCET. IET Image Process. 11(2): 99-108 (2017) - 2015
- [j1]Yan Wo, Xi Chen, Guoqiang Han:
A saliency detection model using aggregation degree of color and texture. Signal Process. Image Commun. 30: 121-136 (2015) - 2013
- [c5]Yong Zhang, Yan Wo:
A fusion iris feature extraction method based on fisher linear discriminant. ICMLC 2013: 5-9 - [c4]Yan Wo, Bo Zhang:
License plate binarization method based on fuzzy classification. ICMLC 2013: 194-198 - [c3]Xiang Li, Yan Wo:
A fast and accurate iris localization method based on gray level statistics and region properties. ICMLC 2013: 855-860 - 2012
- [c2]Yan Wo, Bo Zhang:
Geometrically robust image hashing scheme for image authentication. ICMLC 2012: 1152-1157
2000 – 2009
- 2009
- [c1]Su Xiao, Guoqiang Han, Yan Wo, Zhan Li, Xiangji Chen:
Fast Parameter Estimation in Image Restoration Based on Hierarchical Bayesian Framework. CIS (1) 2009: 372-375
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint