2D finite rate of innovation reconstruction method for step edge and polygon signals in the presence of noise C Chen, P Marziliano, AC Kot IEEE Transactions on Signal Processing 60 (6), 2851-2859, 2012 | 48 | 2012 |
PiCode: A New Picture-Embedding 2D Barcode C Chen, W Huang, B Zhou, C Liu, WH Mow IEEE Transactions on Image Processing 25 (8), 2016 | 45 | 2016 |
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks W Sun, Y Song, C Chen, J Huang, AC Kot IEEE Transactions on Information Forensics and Security, 2020 | 37 | 2020 |
A two-stage quality measure for mobile phone captured 2D barcode images C Chen, AC Kot, H Yang Pattern Recognition 46 (9), 2588-2598, 2013 | 36 | 2013 |
DRL-FAS: A novel framework based on deep reinforcement learning for face anti-spoofing R Cai, H Li, S Wang, C Chen, AC Kot IEEE Transactions on Information Forensics and Security 16, 937-951, 2020 | 23 | 2020 |
Slope Authentication at the Physical Layer N Xie, C Chen IEEE Transactions on Information Forensics and Security, 2018 | 20 | 2018 |
QR Code Authentication with Embedded Message Authentication Code C Chen Mobile Networks and Applications, 1-12, 2016 | 19 | 2016 |
RA code: A robust and aesthetic code for resolution-constrained applications C Chen, B Zhou, WH Mow IEEE Transactions on Circuits and Systems for Video Technology 28 (11), 3300 …, 2017 | 17 | 2017 |
Multiple objects tracking with improved sparse representation and rank based dynamic estimation H Yang, S Qu, C Chen, B Yang IEEE Access 6, 42264-42278, 2018 | 13 | 2018 |
Robust and Unobtrusive Display-to-Camera Communications via Blue Channel Embedding C Chen, W Huang, L Zhang, WH Mow IEEE Transactions on Image Processing, 2018 | 12 | 2018 |
Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels N Xie, C Chen, M Zhong IEEE Transactions on Dependable and Secure Computing, 2018 | 12 | 2018 |
A quality measure of mobile phone captured 2D barcode images C Chen, AC Kot, H Yang 2010 IEEE International Conference on Image Processing, 329-332, 2010 | 11 | 2010 |
Accurate Modelling and Efficient Estimation of the Print-Capture Channel with Application in Barcoding L Zhang, C Chen, WH Mow IEEE Transactions on Image Processing, 2018 | 9 | 2018 |
A Copy-Proof Scheme based on the Spectral and Spatial Barcoding Channel Models C Chen, M Li, A Ferreira, J Huang, R Cai IEEE Transactions on Information Forensics and Security, 2019 | 8 | 2019 |
MPPCANet: A feedforward learning strategy for few-shot image classification Y Song, C Chen Pattern Recognition 113, 107792, 2021 | 7 | 2021 |
Novel intersymbol interference cancellation scheme to enable parallel computational and high-performance faster-than-Nyquist signaling B Qian, X Wang, J Wen, S Zhang, C Chen IEEE Access 5, 24758-24765, 2017 | 7 | 2017 |
Deep Learning-based Forgery Attack on Document Images L Zhao, C Chen, J Huang IEEE Transactions on Image Processing, 2021 | 5 | 2021 |
Domain Generalization for Document Authentication against Practical Recapturing Attacks C Chen, S Zhang, F Lan, J Huang arXiv preprint arXiv:2101.01404, 2021 | 5* | 2021 |
Systematic scheme for performance measurement in display–camera-based sensing networks C Chen, WH Mow International Journal of Distributed Sensor Networks 13 (10), 1550147717738193, 2017 | 5* | 2017 |
Unsupervised Orthogonal Facial Representation Extraction via Image Reconstruction with Correlation Minimization W Sun, Y Song, Z Jin, H Zhao, C Chen Neurocomputing,, 2019 | 4 | 2019 |