default search action
Edward K. Wong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j17]Xuan Nie, Haoxuan Ding, Manhua Qi, Yifei Wang, Edward K. Wong:
URCA-GAN: UpSample Residual Channel-wise Attention Generative Adversarial Network for image-to-image translation. Neurocomputing 443: 75-84 (2021) - [j16]Xuan Nie, Jianchao Jia, Haoxuan Ding, Edward K. Wong:
GiGAN: Gate in GAN, could gate mechanism filter the features in image-to-image translation? Neurocomputing 462: 376-388 (2021) - 2020
- [j15]Xuan Nie, Mengyang Duan, Haoxuan Ding, Bingliang Hu, Edward K. Wong:
Attention Mask R-CNN for Ship Detection and Segmentation From Remote Sensing Images. IEEE Access 8: 9325-9334 (2020)
2010 – 2019
- 2019
- [j14]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
JPEG steganalysis with combined dense connected CNNs and SCA-GFR. Multim. Tools Appl. 78(7): 8481-8495 (2019) - 2018
- [c31]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Deep Learning with Feature Reuse for JPEG Image Steganalysis. APSIPA 2018: 533-538 - [i2]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Spatial Image Steganography Based on Generative Adversarial Network. CoRR abs/1804.07939 (2018) - 2017
- [j13]Jin Xie, Guoxian Dai, Fan Zhu, Edward K. Wong, Yi Fang:
DeepShape: Deep-Learned Shape Descriptor for 3D Shape Retrieval. IEEE Trans. Pattern Anal. Mach. Intell. 39(7): 1335-1345 (2017) - [c30]Tiantian Xu, Edward K. Wong:
Learning temporal structures for human activity recognition. BMVC 2017 - [c29]Liang Niu, Cheng Qian, John-Ross Rizzo, Todd E. Hudson, Zichen Li, Shane Enright, Eliot Sperling, Kyle Conti, Edward K. Wong, Yi Fang:
A Wearable Assistive Technology for the Visually Impaired with Door Knob Detection and Real-Time Feedback for Hand-to-Handle Manipulation. ICCV Workshops 2017: 1500-1508 - [c28]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yunqing Shi:
Steganalysis Based on Awareness of Selection-Channel and Deep Learning. IWDW 2017: 263-272 - [i1]Jianhua Yang, Yun-Qing Shi, Edward K. Wong, Xiangui Kang:
JPEG Steganalysis Based on DenseNet. CoRR abs/1711.09335 (2017) - 2016
- [j12]Tiantian Xu, Fan Zhu, Edward K. Wong, Yi Fang:
Dual many-to-one-encoder-based transfer learning for cross-dataset human action recognition. Image Vis. Comput. 55: 127-137 (2016) - 2015
- [c27]Jin Xie, Yi Fang, Fan Zhu, Edward K. Wong:
Deepshape: Deep learned shape descriptor for 3D shape matching and retrieval. CVPR 2015: 1275-1283 - [c26]Yi Fang, Jin Xie, Guoxian Dai, Meng Wang, Fan Zhu, Tiantian Xu, Edward K. Wong:
3D deep shape descriptor. CVPR 2015: 2319-2328 - [c25]Zhengjian Kang, Edward K. Wong:
Parts-based multi-task sparse learning for visual tracking. ICIP 2015: 4022-4026 - [c24]Jing Zhu, Fan Zhu, Edward K. Wong, Yi Fang:
Learning Pairwise Neural Network Encoder for Depth Image-based 3D Model Retrieval. ACM Multimedia 2015: 1227-1230 - 2014
- [c23]Zhengjian Kang, Edward K. Wong:
Learning multi-scale sparse representation for visual tracking. ICIP 2014: 4897-4901 - 2013
- [c22]Yizhe Zhang, Ming Shao, Edward K. Wong, Yun Fu:
Random Faces Guided Sparse Many-to-One Encoder for Pose-Invariant Face Recognition. ICCV 2013: 2416-2423 - [c21]Zhengjian Kang, Edward K. Wong:
A novel method for object tracking and segmentation using online Hough forests and convex relaxation. ICIP 2013: 3870-3874
2000 – 2009
- 2008
- [j11]Seungji Yang, Yong Man Ro, Edward K. Wong, Jin-Hak Lee:
Quantification and Standardized Description of Color Vision Deficiency Caused by Anomalous Trichromats - Part I: Simulation and Measurement. EURASIP J. Image Video Process. 2008 (2008) - [j10]Seungji Yang, Yong Man Ro, Edward K. Wong, Jin-Hak Lee:
Quantification and Standardized Description of Color Vision Deficiency Caused by Anomalous Trichromats - Part II: Modeling and Color Compensation. EURASIP J. Image Video Process. 2008 (2008) - 2007
- [j9]Truong Cong Thang, Seungji Yang, Yong Man Ro, Edward K. Wong:
Media Accessibility for Low-Vision Users in the MPEG-21 Multimedia Framework. IEICE Trans. Inf. Syst. 90-D(8): 1271-1278 (2007) - [c20]Ming Jiang, Edward K. Wong, Nasir D. Memon:
Robust Document Image Authentication. ICME 2007: 1131-1134 - 2005
- [c19]Ming Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu:
Steganalysis of halftone images. ICASSP (2) 2005: 793-796 - [c18]Ming Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu:
Steganalysis of Degraded Document Images. MMSP 2005: 1-4 - 2004
- [c17]Ming Jiang, Edward K. Wong, Nasir D. Memon, Xiaolin Wu:
A simple technique for estimating message lengths for additive noise steganography. ICARCV 2004: 983-986 - [c16]Ming Jiang, Nasir D. Memon, Edward K. Wong, Xiaolin Wu:
Quantitative steganalysis of binary images. ICIP 2004: 29-32 - [c15]Ming Jiang, Xiaolin Wu, Edward K. Wong, Nasir D. Memon:
Steganalysis of boundary-based steganography using autoregressive model of digital boundaries. ICME 2004: 883-886 - 2003
- [j8]Edward K. Wong, Minya Chen:
A new robust algorithm for video text extraction. Pattern Recognit. 36(6): 1397-1406 (2003) - 2002
- [c14]Minya Chen, Edward K. Wong:
Text Extraction in Color Video Using Multi-frame Edge Information. JCIS 2002: 898-902 - 2001
- [c13]Yu Chen, Edward K. Wong:
Knowledge-based approach to video content classification. Storage and Retrieval for Media Databases 2001: 292-300 - [c12]Qian G. Mei, Edward K. Wong, Nasir D. Memon:
Data hiding in binary text documents. Security and Watermarking of Multimedia Contents 2001: 369-375 - 2000
- [c11]Edward K. Wong, Minya Chen:
A Robust Algorithm for Text Extraction in Color Video. IEEE International Conference on Multimedia and Expo (II) 2000: 797-799 - [c10]Mark E. Hoffman, Edward K. Wong:
Content-based image retrieval by scale-space object boundary shape representation. Storage and Retrieval for Media Databases 2000: 86-97
1990 – 1999
- 1999
- [c9]Jincheng Huang, Zhu Liu, Yao Wang, Yu Chen, Edward K. Wong:
Integration of multimodal features for video scene classification based on HMM. MMSP 1999: 53-58 - [c8]Yu Chen, Edward K. Wong:
Augmented image histogram for image and video similarity search. Storage and Retrieval for Image and Video Databases (SPIE) 1999: 523-533 - [c7]Yong Liu, Jonathon Mant, Edward K. Wong, Steven H. Low:
Marking and detection of text documents using transform-domain techniques. Security and Watermarking of Multimedia Contents 1999: 317-328 - 1998
- [j7]Mark E. Hoffman, Edward K. Wong:
A Ridge-Following Algorithm for Finding the Skeleton of a Fuzzy Image. Inf. Sci. 105(1-4): 227-238 (1998) - [j6]Jincheng Huang, Yao Wang, Edward K. Wong:
Check image compression using a layered coding method. J. Electronic Imaging 7(3): 426-442 (1998) - [c6]Hwayong Joung, Edward K. Wong, Seung P. Kim:
Block Contex Modeling Approach for Binary Image Coding. Data Compression Conference 1998: 552 - [c5]Mark E. Hoffman, Edward K. Wong:
Scale-space approach to image thinning using the most prominent ridge line in the image pyramid data structure. Document Recognition 1998: 242-252 - [c4]Hwayong Joung, Edward K. Wong, Yu Chen, Seung P. Kim:
Document Image Compression using Straight Line Extraction and Block Context Model. ICIP (1) 1998: 530-534 - 1997
- [c3]Jincheng Huang, Yao Wang, Edward K. Wong:
Check image compression: a comparison of JPEG, wavelet and layered coding method. ICIP (3) 1997: 694-697 - 1996
- [j5]Mark E. Hoffman, Larry M. Manevitz, Edward K. Wong:
Fuzzy Independence and Extended Conditional Probability. Inf. Sci. 90(1-4): 137-156 (1996) - [c2]Reitseng Lin, Edward K. Wong:
Morphological operations on images represented by quadtrees. ICASSP 1996: 2203-2206 - 1994
- [c1]Syng-Yup Ohn, Edward K. Wong:
Morphological Decomposition of Convex Polytopes and its Application in Discrete Image Space. ICIP (2) 1994: 560-564 - 1993
- [j4]Robert I. Chou, Aaron Kershenbaum, Edward K. Wong:
Representation and recognition of handprinted Chinese characters by string-matching. Inf. Sci. 67(1-2): 1-34 (1993) - [j3]En-Hui Liang, Edward K. Wong:
Hierarchical algorithms for morphological image processing. Pattern Recognit. 26(4): 511-529 (1993) - [j2]En-Hui Liang, Edward K. Wong:
An efficient method for obtaining morphological skeletons. Pattern Recognit. Lett. 14(8): 689-695 (1993) - 1992
- [j1]Reitseng Lin, Edward K. Wong:
Logic gate implementation for gray-scale morphology. Pattern Recognit. Lett. 13(7): 481-487 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint