


default search action
Yan Ke
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Yan Ke, Jia Liu, Yiliang Han:
Two-stage reversible data hiding in encrypted domain with public key embedding mechanism. Signal Process. 233: 109918 (2025) - 2024
- [j28]Siyuan Huang, Minqing Zhang, Yan Ke, Fuqiang Di, Yongjun Kong:
SASRNet: Slimming-Assisted Deep Residual Network for Image Steganalysis. Comput. Informatics 43(2): 295-316 (2024) - [j27]Cong Yang
, Bipin Indurkhya, John See
, Bo Gao, Yan Ke, Zeyd Boukhers
, Zhenyu Yang, Marcin Grzegorzek:
Skeleton Ground Truth Extraction: Methodology, Annotation Tool and Benchmarks. Int. J. Comput. Vis. 132(4): 1219-1241 (2024) - [j26]Yan Ke, Hongtao Chen, Zhiyuan Liu, Zhiyong Yang:
Perception and early warning technology of power substation safety construction operation based on multi-dimensional information fusion. Int. J. Wirel. Mob. Comput. 26(4): 408-415 (2024) - [j25]Yan Ke, Hongtao Chen, Zhiyuan Liu, Zhiyong Yang, Lin Song:
Research on three-dimensional perception and protection technology for power construction safety operations. Int. J. Wirel. Mob. Comput. 27(2): 133-140 (2024) - [j24]Weina Dong, Jia Liu, Lifeng Chen, Wenquan Sun, Xiaozhong Pan, Yan Ke:
StegaINR4MIH: steganography by implicit neural representation for multi-image hiding. J. Electronic Imaging 33(6) (2024) - [j23]Yangjie Zhong, Yan Ke, Meiqi Liu, Jia Liu:
Image steganography based on generative implicit neural representation. J. Electronic Imaging 33(6) (2024) - [j22]Hongli Wan, Minqing Zhang
, Yan Ke, Zongbao Jiang, Fuqiang Di:
General secure encryption algorithm for separable reversible data hiding in encrypted domain. J. King Saud Univ. Comput. Inf. Sci. 36(1): 102217 (2024) - [j21]Xuegang Hu, Yan Ke:
EMFANet: a lightweight network with efficient multi-scale feature aggregation for real-time semantic segmentation. J. Real Time Image Process. 21(2): 40 (2024) - [j20]Weina Dong, Jia Liu, Lifeng Chen, Wenquan Sun, Xiaozhong Pan, Yan Ke:
Implicit neural representation steganography by neuron pruning. Multim. Syst. 30(5): 266 (2024) - [j19]Yiwen Luo, Xiaoheng Deng
, Wendong Zhang
, Yan Ke, Shaohua Wan
, Yurong Qian
:
Collaborative Intelligent Delivery With One Truck and Multiple Heterogeneous Drones in COVID-19 Pandemic Environment. IEEE Trans. Intell. Transp. Syst. 25(7): 7907-7920 (2024) - [c32]Zhaojun Yu, Haining Luo, Tingting Su, Yan Ke, Yangjie Zhong, Haofeng Li:
High-Capacity Reversible Data Hiding Algorithm for Medical Images. ICCVIT 2024: 1-6 - [c31]Feng Sun, Yan Ke, Yue-Jiao Gong, Yun Li:
Transforming GP-CNN Tree Search Into Trainable Architectures for Image Classification. SMC 2024: 1919-1926 - [i21]Yangjie Zhong, Jia Liu, Yan Ke, Meiqi Liu:
Image steganography based on generative implicit neural representation. CoRR abs/2406.01918 (2024) - [i20]Yangping Lin, Yan Ke, Ke Niu, Jia Liu, Xiaoyuan Yang:
NeR-VCP: A Video Content Protection Method Based on Implicit Neural Representation. CoRR abs/2408.15281 (2024) - [i19]Weina Dong, Jia Liu, Lifeng Chen, Wenquan Sun, Xiaozhong Pan, Yan Ke:
StegaINR4MIH: steganography by implicit neural representation for multi-image hiding. CoRR abs/2410.10117 (2024) - [i18]Yangjie Zhong, Jia Liu, Meiqi Liu, Yan Ke, Minqing Zhang:
Generative Image Steganography Based on Point Cloud. CoRR abs/2410.11673 (2024) - 2023
- [j18]Wanghao Mo
, Wendong Zhang
, Hongyang Wei
, Ruyi Cao
, Yan Ke
, Yiwen Luo:
PVDet: Towards pedestrian and vehicle detection on gigapixel-level images. Eng. Appl. Artif. Intell. 118: 105705 (2023) - [j17]Cong Yang
, Zhenyu Yang, Yan Ke, Tao Chen, Marcin Grzegorzek, John See
:
Doing More With Moiré Pattern Detection in Digital Photos. IEEE Trans. Image Process. 32: 694-708 (2023) - [c30]Yan Ke, Wanghao Mo, Zhe Li, Ruyi Cao, Wendong Zhang:
MDCN: Multi-scale Dilated Convolutional Enhanced Residual Network for Traffic Sign Detection. ADMA (1) 2023: 584-597 - [c29]Yan Ke, Shui Yu, Zhonglai Wang, Yun Li:
ECSFF: Exploring Efficient Cross-Scale Feature Fusion for Medical Image Segmentation. ICAC 2023: 1-6 - [i17]Yan Ke, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
The Realizations of Steganography in Encrypted Domain. CoRR abs/2304.02614 (2023) - [i16]Weina Dong, Jia Liu, Yan Ke, Lifeng Chen, Wenquan Sun, Xiaozhong Pan:
Steganography for Neural Radiance Fields by Backdooring. CoRR abs/2309.10503 (2023) - [i15]Lifeng Chen, Jia Liu, Yan Ke, Wenquan Sun, Weina Dong, Xiaozhong Pan:
MarkNerf: Watermarking for Neural Radiance Field. CoRR abs/2309.11747 (2023) - [i14]Cong Yang, Bipin Indurkhya, John See, Bo Gao, Yan Ke, Zeyd Boukhers
, Zhenyu Yang, Marcin Grzegorzek:
Skeleton Ground Truth Extraction: Methodology, Annotation Tool and Benchmarks. CoRR abs/2310.06437 (2023) - [i13]Jia Liu, Peng Luo, Yan Ke:
Hiding Functions within Functions: Steganography by Implicit Neural Representations. CoRR abs/2312.04743 (2023) - 2022
- [j16]Minqing Zhang, Yu Ge, Yan Ke, Xuguang Wu
, Bo Du:
High capacity reversible data hiding for encrypted images based on full bit-plane compression. J. Electronic Imaging 31(4) (2022) - [j15]Siyuan Huang, Minqing Zhang, Yan Ke, Xinliang Bi, Yongjun Kong:
Image steganalysis based on attention augmented convolution. Multim. Tools Appl. 81(14): 19471-19490 (2022) - [j14]Yan Ke
, Minqing Zhang, Xinpeng Zhang, Jia Liu
, Tingting Su, Xiaoyuan Yang:
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem. IEEE Trans. Circuits Syst. Video Technol. 32(4): 2469-2481 (2022) - [c28]Wanghao Mo, Yan Ke, Qingao Huo, Ruyi Cao, Guochang Song, Wendong Zhang:
ADN: ATSS-based Deep Network for Pedestrian Detection on High-Resolution Images. NaNA 2022: 454-458 - [i12]Yan Ke, Minqing Zhang, Xinpeng Zhang, Yiliang Han, Jia Liu:
Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism. CoRR abs/2208.14510 (2022) - 2021
- [j13]Tingting Su, Yan Ke
, Yi Ding, Jia Liu:
Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching. Int. J. Digit. Crime Forensics 13(4): 71-89 (2021) - 2020
- [j12]Jia Liu
, Yan Ke
, Zhuo Zhang, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Recent Advances of Image Steganography With Generative Adversarial Networks. IEEE Access 8: 60575-60597 (2020) - [j11]Neng Zhou
, Minqing Zhang, Han Wang
, Yan Ke
, Fuqiang Di:
Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU. IEEE Access 8: 81412-81424 (2020) - [j10]Yan Ke
, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2353-2365 (2020) - [c27]Zhiming Chen, Kean Chen
, Weiyao Lin
, John See
, Hui Yu, Yan Ke, Cong Yang:
PIoU Loss: Towards Accurate Oriented Object Detection in Complex Environments. ECCV (5) 2020: 195-211 - [c26]Yuxi Li, Weiyao Lin
, John See
, Ning Xu, Shugong Xu
, Yan Ke, Cong Yang:
CFAD: Coarse-to-Fine Action Detector for Spatiotemporal Action Localization. ECCV (16) 2020: 510-527 - [i11]Zhiming Chen, Kean Chen, Weiyao Lin, John See, Hui Yu, Yan Ke, Cong Yang:
PIoU Loss: Towards Accurate Oriented Object Detection in Complex Environments. CoRR abs/2007.09584 (2020) - [i10]Yuxi Li, Weiyao Lin, John See, Ning Xu, Shugong Xu, Yan Ke, Cong Yang:
CFAD: Coarse-to-Fine Action Detector for Spatiotemporal Action Localization. CoRR abs/2008.08332 (2020) - [i9]Yan Ke, Minqing Zhang, Xinpeng Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem. CoRR abs/2010.08502 (2020)
2010 – 2019
- 2019
- [j9]Zhuo Zhang, Jia Liu
, Yan Ke
, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Generative Steganography by Sampling. IEEE Access 7: 118586-118597 (2019) - [j8]Tianxue Li, Yan Ke, Minqing Zhang, Yu Lei, Yi Ding:
High-fidelity reversible data hiding using dynamic prediction and expansion. J. Electronic Imaging 28(1): 013013 (2019) - [j7]Yan Ke, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Generative steganography with Kerckhoffs' principle. Multim. Tools Appl. 78(10): 13805-13818 (2019) - [c25]Yan Ke, Bo Fan, Tianlin Niu:
Three-Phase Inverters Open-Circuit Fault Diagnostic Based on Voltage Residual. ICITEE 2019: 46:1-46:5 - [c24]Neng Zhou
, Han Wang, Mengmeng Liu, Yan Ke, Minqing Zhang:
Reversible Data Hiding Algorithm in Homomorphic Encrypted Domain Based on EC-EG. INCoS 2019: 269-277 - [i8]Yan Ke, Min-Qing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain. CoRR abs/1904.12792 (2019) - [i7]Jia Liu, Yan Ke, Yu Lei, Zhuo Zhang, Jun Li, Peng Luo, Minqing Zhang, Xiaoyuan Yang:
Recent Advances of Image Steganography with Generative Adversarial Networks. CoRR abs/1907.01886 (2019) - 2018
- [j6]Yan Ke
, Jia Liu, Min-Qing Zhang, Tingting Su, Xiaoyuan Yang:
Steganography Security: Principle and Practice. IEEE Access 6: 73009-73022 (2018) - [j5]Yan Ke, Minqing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang:
A multilevel reversible data hiding scheme in encrypted domain based on LWE. J. Vis. Commun. Image Represent. 54: 133-144 (2018) - [c23]Jia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang:
Digital Cardan Grille: A Modern Approach for Information Hiding. CSAI/ICIMT 2018: 441-446 - [i6]Jia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang, Xiaoyuan Yang:
Digital Cardan Grille: A Modern Approach for Information Hiding. CoRR abs/1803.09219 (2018) - [i5]Jia Liu, Yan Ke, Yu Lei, Yaojie Wang, Yiliang Han, Minqing Zhang, Xiaoyuan Yang:
The Reincarnation of Grille Cipher. CoRR abs/1804.06514 (2018) - [i4]Jia Liu, Yu Lei, Yan Ke, Jun Li, Minqing Zhang, Xiaoyuan Yang:
Generative Steganography by Sampling. CoRR abs/1804.10531 (2018) - [i3]Yan Ke, Jia Liu, Minqing Zhang, Tingting Su, Xiaoyuan Yang:
Steganography Security: Principle and Practice. CoRR abs/1806.03618 (2018) - 2017
- [i2]Yan Ke, Minqing Zhang, Jia Liu, Tingting Su:
Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks. CoRR abs/1711.04916 (2017) - [i1]Ming-ming Liu, Minqing Zhang, Jia Liu, Ying-Nan Zhang, Yan Ke:
Coverless Information Hiding Based on Generative adversarial networks. CoRR abs/1712.06951 (2017) - 2016
- [c22]Yan Ke, Minqing Zhang, Jia Liu:
Separable Multiple Bits Reversible Data Hiding in Encrypted Domain. IWDW 2016: 470-484 - [c21]Xi Lin, Yiliang Han, Yan Ke, Xiaoyuan Yang:
Location Privacy Preserving Scheme Based on Attribute Encryption. SpaCCS 2016: 164-177 - 2015
- [c20]Hao Ma, Yan Ke:
An Introduction to Entity Recommendation and Understanding. WWW (Companion Volume) 2015: 1521-1522 - 2010
- [j4]Yan Ke, Rahul Sukthankar, Martial Hebert:
Volumetric Features for Video Event Detection. Int. J. Comput. Vis. 88(3): 339-362 (2010) - [c19]Tao Lei, Rui Cai, Jiang-Ming Yang, Yan Ke, Xiaodong Fan, Lei Zhang:
A pattern tree-based approach to learning URL normalization rules. WWW 2010: 611-620
2000 – 2009
- 2008
- [c18]Pyry Matikainen, Rahul Sukthankar, Martial Hebert, Yan Ke:
Fast Motion Consistency through Matrix Quantization. BMVC 2008: 1-10 - 2007
- [c17]Yan Ke, Rahul Sukthankar, Martial Hebert:
Spatio-temporal Shape and Flow Correlation for Action Recognition. CVPR 2007 - [c16]Yan Ke, Rahul Sukthankar, Martial Hebert:
Event Detection in Crowded Videos. ICCV 2007: 1-8 - 2006
- [c15]Rahul Sukthankar, Yan Ke, Derek Hoiem:
Semantic Learning for Audio Applications: A Computer Vision Approach. CVPR Workshops 2006: 112 - [c14]Yan Ke, Xiaoou Tang, Feng Jing:
The Design of High-Level Features for Photo Quality Assessment. CVPR (1) 2006: 419-426 - 2005
- [c13]Yan Ke, Derek Hoiem, Rahul Sukthankar:
Computer Vision for Music Identification. CVPR (1) 2005: 597-604 - [c12]Yan Ke, Derek Hoiem, Rahul Sukthankar:
Computer Vision for Music Identification: Video Demonstration. CVPR (2) 2005: 1184 - [c11]Derek Hoiem, Yan Ke, Rahul Sukthankar:
SOLAR: sound object localization and retrieval in complex audio environments. ICASSP (5) 2005: 429-432 - [c10]Yan Ke, Rahul Sukthankar, Martial Hebert:
Efficient Visual Event Detection Using Volumetric Features. ICCV 2005: 166-173 - [c9]Larry Huston, Rahul Sukthankar, Yan Ke:
Evaluating keypoint methods for content-based copyright protection of digital images. ICME 2005: 1086-1089 - 2004
- [c8]Yan Ke, Rahul Sukthankar:
PCA-SIFT: A More Distinctive Representation for Local Image Descriptors. CVPR (2) 2004: 506-513 - [c7]Padmanabhan Pillai, Yan Ke, Jason Campbell:
Multi-fidelity storage. VSSN@MM 2004: 72-79 - [c6]Yan Ke, Rahul Sukthankar, Larry Huston:
An efficient parts-based near-duplicate and sub-image retrieval system. ACM Multimedia 2004: 869-876 - 2003
- [j3]Phillip B. Gibbons, Brad Karp, Yan Ke, Suman Nath
, Srinivasan Seshan:
IrisNet: An Architecture for a Worldwide Sensor Web. IEEE Pervasive Comput. 2(4): 22-33 (2003) - [c5]Suman Nath, Amol Deshpande, Yan Ke, Phillip B. Gibbons, Brad Karp, Srinivasan Seshan:
IrisNet: An Architecture for Internet-scale Sensing Services. VLDB 2003: 1137-1140 - 2002
- [j2]Katharina Probst, Yan Ke, Maxine Eskénazi:
Enhancing foreign language tutors - In search of the golden speaker. Speech Commun. 37(3-4): 161-173 (2002)
1990 – 1999
- 1990
- [c4]Yan Ke, E. S. Panduranga:
A Journey into the Fourth Dimension. IEEE Visualization 1990: 219-229
1980 – 1989
- 1989
- [c3]Yan Ke:
An Efficient Algorithm for Link-Distance Problems. SCG 1989: 69-78 - [c2]Yan Ke, Joseph O'Rourke:
Computing the Kernel of a Point Set in a Polygon (Extended Abstract). WADS 1989: 135-146 - 1988
- [j1]Yan Ke, Joseph O'Rourke:
Lower Bounds on Moving a Ladder in Two and Three Dimensions. Discret. Comput. Geom. 3: 197-217 (1988) - 1987
- [c1]Yan Ke, Joseph O'Rourke:
Moving a Ladder in Three Dimensions: Upper and Lower Bounds. SCG 1987: 136-146
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-24 00:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint