Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks W Sun, Y Song, C Chen, J Huang, AC Kot IEEE Transactions on Information Forensics and Security, 2020 | 98 | 2020 |
DRL-FAS: A novel framework based on deep reinforcement learning for face anti-spoofing R Cai, H Li, S Wang, C Chen, AC Kot IEEE Transactions on Information Forensics and Security 16, 937-951, 2020 | 83 | 2020 |
PiCode: A New Picture-Embedding 2D Barcode C Chen, W Huang, B Zhou, C Liu, WH Mow IEEE Transactions on Image Processing 25 (8), 2016 | 60 | 2016 |
Changes in sea ice and future accessibility along the Arctic Northeast Passage J Chen, S Kang, C Chen, Q You, W Du, M Xu, X Zhong, W Zhang, J Chen Global and Planetary Change 195, 103319, 2020 | 53 | 2020 |
2D finite rate of innovation reconstruction method for step edge and polygon signals in the presence of noise C Chen, P Marziliano, AC Kot IEEE Transactions on Signal Processing 60 (6), 2851-2859, 2012 | 47 | 2012 |
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels N Xie, C Chen, M Zhong IEEE Transactions on Dependable and Secure Computing, 2018 | 42 | 2018 |
A two-stage quality measure for mobile phone captured 2D barcode images C Chen, AC Kot, H Yang Pattern Recognition 46 (9), 2588-2598, 2013 | 39 | 2013 |
Slope Authentication at the Physical Layer N Xie, C Chen IEEE Transactions on Information Forensics and Security, 2018 | 34 | 2018 |
Deep Learning-based Forgery Attack on Document Images L Zhao, C Chen, J Huang IEEE Transactions on Image Processing, 2021 | 33 | 2021 |
Model study of nutrient and phytoplankton dynamics in the Gulf of Maine: patterns and drivers for seasonal and interannual variability R Tian, C Chen, J Qi, R Ji, RC Beardsley, C Davis ICES Journal of Marine Science 72 (2), 388-402, 2015 | 33 | 2015 |
QR Code Authentication with Embedded Message Authentication Code C Chen Mobile Networks and Applications, 1-12, 2016 | 30 | 2016 |
Dispersal and survival of chub mackerel (Scomber Japonicus) larvae in the East China Sea Y Li, X Chen, C Chen, J Ge, R Ji, R Tian, P Xue, L Xu Ecological Modelling 283, 70-84, 2014 | 29 | 2014 |
Robust and Unobtrusive Display-to-Camera Communications via Blue Channel Embedding C Chen, W Huang, L Zhang, WH Mow IEEE Transactions on Image Processing, 2018 | 27 | 2018 |
A Copy-Proof Scheme based on the Spectral and Spatial Barcoding Channel Models C Chen, M Li, A Ferreira, J Huang, R Cai IEEE Transactions on Information Forensics and Security, 2019 | 26 | 2019 |
RA code: A robust and aesthetic code for resolution-constrained applications C Chen, B Zhou, WH Mow IEEE Transactions on Circuits and Systems for Video Technology 28 (11), 3300 …, 2017 | 25 | 2017 |
Domain-agnostic document authentication against practical recapturing attacks C Chen, S Zhang, F Lan, J Huang IEEE Transactions on Information Forensics and Security 17, 2890-2905, 2022 | 23* | 2022 |
MPPCANet: A feedforward learning strategy for few-shot image classification Y Song, C Chen Pattern Recognition 113, 107792, 2021 | 18 | 2021 |
Learning deep forest with multi-scale local binary pattern features for face anti-spoofing R Cai, C Chen arXiv preprint arXiv:1910.03850, 2019 | 16 | 2019 |
Partitioning of absorbed light energy differed between the sun-exposed side and the shaded side of apple fruits under high light conditions C Chen, D Zhang, P Li, F Ma Plant physiology and biochemistry 60, 12-17, 2012 | 15 | 2012 |
Accurate Modelling and Efficient Estimation of the Print-Capture Channel with Application in Barcoding L Zhang, C Chen, WH Mow IEEE Transactions on Image Processing, 2018 | 14 | 2018 |