Ching-Yung Lin
Ching-Yung Lin
IBM Chief Scientist, Graph Computing
Verified email at - Homepage
Cited by
Cited by
Rotation, scale, and translation resilient watermarking for images
CY Lin, M Wu, JA Bloom, IJ Cox, ML Miller, YM Lui
IEEE Transactions on image processing 10 (5), 767-782, 2001
Nisp: Pruning networks using neuron importance score propagation
R Yu, A Li, CF Chen, JH Lai, VI Morariu, X Han, M Gao, CY Lin, LS Davis
Proceedings of the IEEE conference on computer vision and pattern …, 2018
A robust image authentication method distinguishing JPEG compression from malicious manipulation
CY Lin, SF Chang
IEEE Transactions on Circuits and Systems for Video Technology 11 (2), 153-168, 2001
Semifragile watermarking for authenticating JPEG visual content
CY Lin, SF Chang
Security and watermarking of multimedia contents II 3971, 140-151, 2000
IBM Research TRECVID-2003 Video Retrieval System.
A Amir, J Argillander, M Campbell, A Haubold, G Iyengar, S Ebadollahi, ...
Robust image authentication method surviving JPEG lossy compression
CY Lin, SF Chang
Storage and Retrieval for Image and Video Databases VI 3312, 296-307, 1997
Searching for experts in the enterprise: combining text and social network analysis
K Ehrlich, CY Lin, V Griffiths-Fisher
Proceedings of the 2007 ACM International Conference on Supporting Group …, 2007
Generating robust digital signature for image/video authentication
CY Lin, SF Chang
Multimedia and Security Workshop at ACM Multimedia 98, 49-54, 1998
Personalized recommendation driven by information flow
X Song, BL Tseng, CY Lin, MT Sun
Proceedings of the 29th annual international ACM SIGIR conference on …, 2006
Semantic indexing of multimedia content using visual, audio, and text cues
WH Adams, G Iyengar, CY Lin, MR Naphade, C Neti, HJ Nock, JR Smith
EURASIP Journal on Advances in Signal Processing 2003, 1-16, 2003
Using MPEG-7 and MPEG-21 for personalizing video
BL Tseng, CY Lin, JR Smith
iEEE Multimedia 11 (1), 42-52, 2004
Multimedia security technologies for digital rights management
W Zeng, H Yu, CY Lin
Elsevier, 2011
GraphBIG: understanding graph computing in the context of industrial solutions
L Nai, Y Xia, IG Tanase, H Kim, CY Lin
Proceedings of the International Conference for High Performance Computing …, 2015
Non-negative residual matrix factorization with application to graph anomaly detection
H Tong, CY Lin
Proceedings of the 2011 SIAM International Conference on Data Mining, 143-153, 2011
Method and apparatus for image authentication
SF Chang, CY Lin
US Patent 6,532,541, 2003
Multi-modal fusion in content-based retrieval
CY Lin, A Natsev, MR Naphade, JR Smith, BL Tseng
US Patent 7,610,306, 2009
Issues and solutions for authenticating MPEG video
CY Lin, SF Chang
Security and watermarking of multimedia contents 3657, 54-65, 1999
Distortion modeling and invariant extraction for digital image print-and-scan process
CY Lin, SF Chang
Int. Symp. Multimedia Information Processing, 1999
Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform
JA Bloom, IJ Cox, ML Miller, M Wu, CY Lin, YM Lui
US Patent 6,282,300, 2001
Targetvue: Visual analysis of anomalous user behaviors in online communication systems
N Cao, C Shi, S Lin, J Lu, YR Lin, CY Lin
IEEE transactions on visualization and computer graphics 22 (1), 280-289, 2015
The system can't perform the operation now. Try again later.
Articles 1–20