


default search action
Huiyun Jing
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Yingshui Tan, Boren Zheng, Baihui Zheng, Kerui Cao, Huiyun Jing, Jincheng Wei, Jiaheng Liu, Yancheng He, Wenbo Su, Xiangyong Zhu, Bo Zheng, Kaifu Zhang:
Chinese SafetyQA: A Safety Short-form Factuality Benchmark for Large Language Models. CoRR abs/2412.15265 (2024) - 2022
- [c10]Luopu Liang, Bowen Guo, Zhichao Lian, Qianmu Li, Huiyun Jing:
IMPGA: An Effective and Imperceptible Black-Box Attack Against Automatic Speech Recognition Systems. APWeb/WAIM (3) 2022: 349-363 - [c9]Tengfei Li, Shuo Wang, Huiyun Jing, Zhichao Lian, Shunmei Meng, Qianmu Li:
Fused Pruning based Robust Deep Neural Network Watermark Embedding. ICPR 2022: 2475-2481 - 2021
- [c8]Chuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen, Duohe Ma:
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models. ICICS (1) 2021: 119-135
2010 – 2019
- 2015
- [j7]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Co-saliency Detection Linearly Combining Single-View Saliency and Foreground Correspondence. IEICE Trans. Inf. Syst. 98-D(4): 985-988 (2015) - 2014
- [j6]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Background contrast based salient region detection. Neurocomputing 124: 57-62 (2014) - [j5]Huiyun Jing, Xin He, Qi Han, Ahmed A. Abd El-Latif
, Xiamu Niu:
Saliency detection based on integrated features. Neurocomputing 129: 114-121 (2014) - [c7]Xin He, Huiyun Jing:
Security Risk Assessment of Rich Communication Services Over LTE. ISCTCS 2014: 122-128 - 2013
- [j4]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
Region Diversity Based Saliency Density Maximization for Salient Object Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 394-397 (2013) - [j3]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
CBRISK: Colored Binary Robust Invariant Scalable Keypoints. IEICE Trans. Inf. Syst. 96-D(2): 392-395 (2013) - [j2]Huiyun Jing, Qi Han, Xin He, Xiamu Niu:
Saliency Density and Edge Response Based Salient Object Detection. IEICE Trans. Inf. Syst. 96-D(5): 1243-1246 (2013) - 2012
- [c6]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Novel Nonparametric Approach for Saliency Detection Using Multiple Features. ACIIDS (2) 2012: 83-90 - [c5]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Motion Vector Based Information Hiding Algorithm for H.264/AVC against Motion Vector Steganalysis. ACIIDS (2) 2012: 91-98 - [c4]Xin He, Huiyun Jing, Xuefeng Bai, Li Li, Qi Han, Xiamu Niu:
Saliency based SIFT keypoints filtration. ICDIP 2012: 833415 - [c3]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
Saliency-Based Region Log Covariance Feature for Image Copy Detection. IWDW 2012: 327-335 - 2011
- [j1]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Novel Bayes' Theorem-Based Saliency Detection Model. IEICE Trans. Inf. Syst. 94-D(12): 2545-2548 (2011) - [c2]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
A Saliency Detection Model Based on Local and Global Kernel Density Estimation. ICONIP (1) 2011: 164-171 - [c1]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Saliency Detection Approach to Combine LSK and Color for Color Image. IIH-MSP 2011: 129-132
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-24 18:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint