Ching-Yung Lin
Ching-Yung Lin
IBM Chief Scientist, Graph Computing
Verified email at - Homepage
Cited by
Cited by
Rotation, scale, and translation resilient watermarking for images
CY Lin, M Wu, JA Bloom, IJ Cox, ML Miller, YM Lui
IEEE Transactions on image processing 10 (5), 767-782, 2001
Nisp: Pruning networks using neuron importance score propagation
R Yu, A Li, CF Chen, JH Lai, VI Morariu, X Han, M Gao, CY Lin, LS Davis
Proceedings of the IEEE conference on computer vision and pattern …, 2018
A robust image authentication method distinguishing JPEG compression from malicious manipulation
CY Lin, SF Chang
IEEE Transactions on Circuits and Systems for Video Technology 11 (2), 153-168, 2001
Semifragile watermarking for authenticating JPEG visual content
CY Lin, SF Chang
Security and watermarking of multimedia contents II 3971, 140-151, 2000
IBM Research TRECVID-2003 Video Retrieval System.
A Amir, J Argillander, M Campbell, A Haubold, G Iyengar, S Ebadollahi, ...
Robust image authentication method surviving JPEG lossy compression
CY Lin, SF Chang
Storage and Retrieval for Image and Video Databases VI 3312, 296-307, 1997
Searching for experts in the enterprise: combining text and social network analysis
K Ehrlich, CY Lin, V Griffiths-Fisher
Proceedings of the 2007 ACM International Conference on Supporting Group …, 2007
Generating robust digital signature for image/video authentication
CY Lin, SF Chang
Multimedia and Security Workshop at ACM Multimedia 98, 49-54, 1998
Personalized recommendation driven by information flow
X Song, BL Tseng, CY Lin, MT Sun
Proceedings of the 29th annual international ACM SIGIR conference on …, 2006
Semantic indexing of multimedia content using visual, audio, and text cues
WH Adams, G Iyengar, CY Lin, MR Naphade, C Neti, HJ Nock, JR Smith
EURASIP Journal on Advances in Signal Processing 2003, 1-16, 2003
Using MPEG-7 and MPEG-21 for personalizing video
BL Tseng, CY Lin, JR Smith
iEEE Multimedia 11 (1), 42-52, 2004
Multimedia security technologies for digital rights management
W Zeng, H Yu, CY Lin
Elsevier, 2011
GraphBIG: understanding graph computing in the context of industrial solutions
L Nai, Y Xia, IG Tanase, H Kim, CY Lin
Proceedings of the International Conference for High Performance Computing …, 2015
Non-negative residual matrix factorization with application to graph anomaly detection
H Tong, CY Lin
Proceedings of the 2011 SIAM International Conference on Data Mining, 143-153, 2011
Method and apparatus for image authentication
SF Chang, CY Lin
US Patent 6,532,541, 2003
Issues and solutions for authenticating MPEG video
CY Lin, SF Chang
Security and watermarking of multimedia contents 3657, 54-65, 1999
Multi-modal fusion in content-based retrieval
CY Lin, A Natsev, MR Naphade, JR Smith, BL Tseng
US Patent 7,610,306, 2009
Distortion modeling and invariant extraction for digital image print-and-scan process
CY Lin, SF Chang
Int. Symp. Multimedia Information Processing, 1999
Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform
JA Bloom, IJ Cox, ML Miller, M Wu, CY Lin, YM Lui
US Patent 6,282,300, 2001
Targetvue: Visual analysis of anomalous user behaviors in online communication systems
N Cao, C Shi, S Lin, J Lu, YR Lin, CY Lin
IEEE transactions on visualization and computer graphics 22 (1), 280-289, 2015
The system can't perform the operation now. Try again later.
Articles 1–20