Publications
2009. ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
2003. Data hiding in image and video .I. Fundamental issues and solutions. Image Processing, IEEE Transactions on. 12(6):685-695.
2002. A recognition algorithm for Chinese characters in diverse fonts. Image Processing. 2002. Proceedings. 2002 International Conference on. 3:981-984vol.3-981-984vol.3.
2003. Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
2006. New DNS results of shockwave/turbulent boundary layer interaction. 3rd AIAA Flow Control Conference.
2005. Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
2009. Recognition of quantized still face images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
2003. Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
2007. A Signal Processing and Randomization Perspective of Robust and Secure Image Hashing. Statistical Signal Processing, 2007. SSP '07. IEEE/SP 14th Workshop on. :166-170.
2006. Analysis and comparison of geometric and algebraic multigrid for convection-diffusion equations. ANALYSIS. 28(6):2208-2228.
2010. Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
2012. Making Recommendations in a Microblog to Improve the Impact of a Focal User. 6th ACM Conference on Recommender Systems (RecSys).
1998. Watermarking for image authentication. Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on. 2:437-441vol.2-437-441vol.2.
2000. Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
2003. Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
2001. Analysis of attacks on SDMI audio watermarks. Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. 3:1369-1372vol.3-1369-1372vol.3.
2007. Taking Advantage of Collective Operation Semantics for Loosely Coupled Simulations. Parallel and Distributed Processing Symposium, International. :128-128.
2004. Data hiding in binary image for authentication and annotation. Multimedia, IEEE Transactions on. 6(4):528-538.
2007. Community response grids for older adults: Motivations, usability, and sociability. Proceedings of the 13th Americas Conference on Information Systems.
2010. Deliberate Interactions: Characterizing Technology Use in Nairobi, Kenya. SIGCHI '10. :2593-2602.
1996. Dynamic view-dependent simplification for polygonal models. Visualization '96. Proceedings.. :327-334.