Year |
Citation |
Score |
2019 |
Johnstone PR, Moulin P. Faster subgradient methods for functions with Hölderian growth Mathematical Programming. 180: 417-450. DOI: 10.1007/S10107-018-01361-0 |
0.314 |
|
2017 |
Moulin P. The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within a Few Nats Ieee Transactions On Information Theory. 63: 2278-2313. DOI: 10.1109/Tit.2016.2643681 |
0.33 |
|
2017 |
Johnstone PR, Moulin P. Local and global convergence of a general inertial proximal splitting scheme for minimizing composite functions Computational Optimization and Applications. 67: 259-292. DOI: 10.1007/S10589-017-9896-7 |
0.349 |
|
2016 |
Lu J, Wang G, Moulin P. Localized multifeature metric learning for image-set-based face recognition Ieee Transactions On Circuits and Systems For Video Technology. 26: 529-540. DOI: 10.1109/Tcsvt.2015.2412831 |
0.302 |
|
2015 |
Ni B, Moulin P, Yan S. Order Preserving Sparse Coding. Ieee Transactions On Pattern Analysis and Machine Intelligence. 37: 1615-28. PMID 26352999 DOI: 10.1109/Tpami.2014.2362935 |
0.319 |
|
2015 |
Yu H, Moulin P. SNR maximization hashing Ieee Transactions On Information Forensics and Security. 10: 1927-1938. DOI: 10.1109/Tifs.2015.2436871 |
0.383 |
|
2014 |
Yu H, Moulin P. Regularized Adaboost Learning for Identification of Time-Varying Content Ieee Transactions On Information Forensics and Security. 9: 1606-1616. DOI: 10.1109/Tifs.2014.2347808 |
0.336 |
|
2014 |
Huang YW, Moulin P. On the Fingerprinting Capacity Games for Arbitrary Alphabets and Their Asymptotics Ieee Transactions On Information Forensics and Security. 9: 1477-1490. DOI: 10.1109/Tifs.2014.2338739 |
0.564 |
|
2014 |
Ni B, Moulin P, Yan S. Pose Adaptive Motion Feature Pooling for Human Action Analysis International Journal of Computer Vision. 111: 229-248. DOI: 10.1007/S11263-014-0742-4 |
0.306 |
|
2013 |
Ni B, Pei Y, Moulin P, Yan S. Multilevel depth and image fusion for human activity detection. Ieee Transactions On Cybernetics. 43: 1383-94. PMID 23996589 DOI: 10.1109/Tcyb.2013.2276433 |
0.331 |
|
2012 |
Moulin P. A multiscale relaxation algorithm for SNR maximization in nonorthogonal subband coding. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 4: 1269-81. PMID 18292023 DOI: 10.1109/83.413171 |
0.379 |
|
2012 |
Huang YW, Moulin P. On the saddle-point solution and the large-coalition asymptotics of fingerprinting games Ieee Transactions On Information Forensics and Security. 7: 160-175. DOI: 10.1109/Tifs.2011.2168212 |
0.567 |
|
2011 |
Sadasivam S, Moulin P, Coleman TP. A message-passing approach to combating desynchronization attacks Ieee Transactions On Information Forensics and Security. 6: 894-905. DOI: 10.1109/Tifs.2011.2129511 |
0.655 |
|
2010 |
Sadasivam S, Moulin P, Meyn S. A universal divergence-rate estimator for steganalysis in timing channels 2010 Ieee International Workshop On Information Forensics and Security, Wifs 2010. DOI: 10.1109/WIFS.2010.5711459 |
0.602 |
|
2009 |
El Choubassi M, Moulin P. Joint detection-estimation games for sensitivity analysis attacks Proceedings of Spie - the International Society For Optical Engineering. 7254. DOI: 10.1117/12.806111 |
0.776 |
|
2009 |
Moulin P. A Neyman–Pearson Approach to Universal Erasure and List Decoding Ieee Transactions On Information Theory. 55: 4462-4478. DOI: 10.1109/Tit.2009.2027569 |
0.349 |
|
2009 |
Jourdas J, Moulin P. High-Rate Random-Like Spherical Fingerprinting Codes With Linear Decoding Complexity Ieee Transactions On Information Forensics and Security. 4: 768-780. DOI: 10.1109/Tifs.2009.2034188 |
0.352 |
|
2009 |
Kiyavash N, Moulin P. Performance of orthogonal fingerprinting codes under worst-case noise Ieee Transactions On Information Forensics and Security. 4: 293-301. DOI: 10.1109/Tifs.2009.2026462 |
0.351 |
|
2009 |
Sadasivam S, Moulin P. On estimation accuracy of desynchronization attack channel parameters Ieee Transactions On Information Forensics and Security. 4: 284-292. DOI: 10.1109/Tifs.2009.2025852 |
0.678 |
|
2009 |
El Choubassi M, Moulin P. On reliability and security of randomized detectors against sensitivity analysis attacks Ieee Transactions On Information Forensics and Security. 4: 273-283. DOI: 10.1109/Tifs.2009.2021783 |
0.766 |
|
2009 |
Sadasivam S, Moulin P. Combating desynchronization attacks on blind watermarking systems: A message passing approach Proceedings - International Conference On Image Processing, Icip. 3641-3644. DOI: 10.1109/ICIP.2009.5414272 |
0.638 |
|
2008 |
Jourdas JF, Moulin P. A high-rate fingerprinting code Electronic Imaging. 6819. DOI: 10.1117/12.767850 |
0.343 |
|
2008 |
Jourdas JF, Moulin P. A low-rate fingerprinting code and its application to blind image fingerprinting Electronic Imaging. 6819: 681907. DOI: 10.1117/12.767846 |
0.417 |
|
2008 |
Wang Y, Moulin P. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions Ieee Transactions On Information Theory. 54: 2706-2722. DOI: 10.1109/Tit.2008.921684 |
0.443 |
|
2007 |
Moulin P, Wang Y. Capacity and Random-Coding Exponents for Channel Coding With Side Information Ieee Transactions On Information Theory. 53: 1326-1347. DOI: 10.1109/Tit.2007.892789 |
0.396 |
|
2007 |
El Choubassi M, Moulin P. Noniterative algorithms for sensitivity analysis attacks Ieee Transactions On Information Forensics and Security. 2: 113-126. DOI: 10.1109/Tifs.2007.897276 |
0.78 |
|
2007 |
Wang Y, Moulin P. Optimized Feature Extraction for Learning-Based Image Steganalysis Ieee Transactions On Information Forensics and Security. 2: 31-45. DOI: 10.1109/Tifs.2006.890517 |
0.392 |
|
2007 |
Moulin P. Signal Transmission with Known-Interference Cancellation [Lecture Notes] Ieee Signal Processing Magazine. 24: 134-136. DOI: 10.1109/Msp.2007.273083 |
0.375 |
|
2007 |
El Choubassi M, Moulin P. Sensitivity analysis attacks against randomized detectors Proceedings - International Conference On Image Processing, Icip. 2. DOI: 10.1109/ICIP.2007.4379109 |
0.756 |
|
2006 |
Ye JC, Moulin P, Bresler Y. Asymptotic global confidence regions for 3-D parametric shape estimation in inverse problems. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 15: 2904-19. PMID 17022258 DOI: 10.1109/Tip.2006.877524 |
0.345 |
|
2006 |
El Choubassi M, Moulin P. On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks Proceedings of Spie - the International Society For Optical Engineering. 6072. DOI: 10.1117/12.640659 |
0.748 |
|
2006 |
Jana S, Moulin P. Optimality of KLT for High-Rate Transform Coding of Gaussian Vector-Scale Mixtures: Application to Reconstruction, Estimation, and Classification Ieee Transactions On Information Theory. 52: 4049-4067. DOI: 10.1109/Tit.2006.880056 |
0.365 |
|
2006 |
Liu T, Moulin P, Koetter R. On error exponents of modulo lattice additive noise channels Ieee Transactions On Information Theory. 52: 454-471. DOI: 10.1109/Tit.2005.862077 |
0.525 |
|
2006 |
Moulin P, Goteti A. Block QIM Watermarking Games Ieee Transactions On Information Forensics and Security. 1: 293-310. DOI: 10.1109/Tifs.2006.879299 |
0.399 |
|
2006 |
Sadasivam S, Moulin P, Koetter R. Graphical models for des ynchronization-resilient watermark decoding Proceedings - International Conference On Image Processing, Icip. 5. DOI: 10.1109/ICIP.2007.4379869 |
0.574 |
|
2005 |
El Choubassi M, Moulin P. New sensitivity analysis attack Proceedings of Spie - the International Society For Optical Engineering. 5681: 734-745. DOI: 10.1117/12.587901 |
0.763 |
|
2005 |
Ishwar P, Moulin P. On the existence and characterization of the maxent distribution under general moment inequality constraints Ieee Transactions On Information Theory. 51: 3322-3333. DOI: 10.1109/Tit.2005.853317 |
0.599 |
|
2005 |
Kiyavash N, Moulin P. Regular simplex fingerprints and their optimality properties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3710: 97-109. DOI: 10.1109/Tifs.2009.2025855 |
0.398 |
|
2004 |
Cannons J, Moulin P. Design and statistical analysis of a hash-aided image watermarking system. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 13: 1393-408. PMID 15462148 DOI: 10.1109/Tip.2004.834660 |
0.437 |
|
2004 |
Moulin P, Mihcak M. The Parallel-Gaussian Watermarking Game Ieee Transactions On Information Theory. 50: 272-289. DOI: 10.1109/Tit.2003.822578 |
0.737 |
|
2003 |
Ye JC, Bresler Y, Moulin P. Cramér-Rao bounds for parametric shape estimation in inverse problems. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 12: 71-84. PMID 18237880 DOI: 10.1109/Tip.2002.806249 |
0.365 |
|
2003 |
Moulin P, Ivanovic A. The zero-rate spread-spectrum watermarking game Ieee Transactions On Signal Processing. 51: 1098-1117. DOI: 10.1109/Tsp.2003.809370 |
0.456 |
|
2003 |
Ishwar P, Moulin P. On the equivalence of set-theoretic and maxent MAP estimation Ieee Transactions On Signal Processing. 51: 698-713. DOI: 10.1109/Tsp.2002.808111 |
0.617 |
|
2003 |
Moulin P. Comments on "Why watermarking is nonsense" Ieee Signal Processing Magazine. 20: 57-59. DOI: 10.1109/Msp.2003.1253555 |
0.311 |
|
2002 |
Moulin P, Mihçak MK. A framework for evaluating the data-hiding capacity of image sources. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 11: 1029-42. PMID 18249724 DOI: 10.1109/Tip.2002.802512 |
0.711 |
|
2002 |
Jain A, Moulin P, Miller MI, Ramchandran K. Information-theoretic bounds on target recognition performance based on degraded image data Ieee Transactions On Pattern Analysis and Machine Intelligence. 24: 1153-1166. DOI: 10.1109/Tpami.2002.1033209 |
0.373 |
|
2001 |
Liu J, Moulin P. Information-theoretic analysis of interscale and intrascale dependencies between image wavelet coefficients. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 10: 1647-58. PMID 18255507 DOI: 10.1109/83.967393 |
0.469 |
|
2001 |
Liu J, Moulin P. Complexity-regularized image denoising Ieee Transactions On Image Processing. 10: 841-851. DOI: 10.1109/83.923281 |
0.426 |
|
2001 |
Ye JC, Bresler Y, Moulin P. Cramér-Rao bounds for 2-D target shape estimation in nonlinear inverse scattering problems with application to passive radar Ieee Transactions On Antennas and Propagation. 49: 771-783. DOI: 10.1109/8.929632 |
0.334 |
|
2001 |
Mihcak M, Moulin P, Anitescu M, Ramchandran K. Rate-distortion-optimal subband coding without perfect-reconstruction constraints Ieee Transactions On Signal Processing. 49: 542-557. DOI: 10.1109/78.905876 |
0.712 |
|
2001 |
Moulin P. The role of information theory in watermarking and its application to image watermarking Signal Processing. 81: 1121-1139. DOI: 10.1016/S0165-1684(01)00037-8 |
0.39 |
|
2000 |
Moulin P, Anitescu M, Ramchandran K. Theory of rate-distortion-optimal, constrained filterbanks-application to IIR and FIR biorthogonal designs Ieee Transactions On Signal Processing. 48: 1120-1132. DOI: 10.1109/78.827545 |
0.363 |
|
2000 |
Ishwar P, Moulin P. On spatial adaptation of motion-field smoothness in video coding Ieee Transactions On Circuits and Systems For Video Technology. 10: 980-989. DOI: 10.1109/76.867937 |
0.571 |
|
1999 |
Kivanc Mihcak M, Kozintsev I, Ramchandran K, Moulin P. Low-complexity image denoising based on statistical modeling of wavelet coefficients Ieee Signal Processing Letters. 6: 300-303. DOI: 10.1109/97.803428 |
0.364 |
|
1999 |
Pavlovic V, Moulin P, Ramchandran K. An integrated framework for adaptive subband image coding Ieee Transactions On Signal Processing. 47: 1024-1038. DOI: 10.1109/78.752600 |
0.358 |
|
1999 |
Krishnamurthy R, Woods J, Moulin P. Frame interpolation and bidirectional prediction of video using compactly encoded optical-flow fields and label fields Ieee Transactions On Circuits and Systems For Video Technology. 9: 713-726. DOI: 10.1109/76.780361 |
0.307 |
|
1999 |
Moulin P, Liu J. Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors Ieee Transactions On Information Theory. 45: 909-919. DOI: 10.1109/18.761332 |
0.44 |
|
1998 |
Moulin P, Mihcak M. Theory and design of signal-adapted FIR paraunitary filter banks Ieee Transactions On Signal Processing. 46: 920-929. DOI: 10.1109/78.668546 |
0.704 |
|
1997 |
Moulin P, Krishnamurthy R, Woods JW. Multiscale modeling and estimation of motion fields for video coding. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 6: 1606-20. PMID 18285232 DOI: 10.1109/83.650115 |
0.335 |
|
1997 |
Moulin P, Anitescu M, Kortanek K, Potra F. The role of linear semi-infinite programming in signal-adapted QMF bank design Ieee Transactions On Signal Processing. 45: 2160-2174. DOI: 10.1109/78.622941 |
0.373 |
|
1995 |
Moulin P, Ogielski AT, Lilienfeld G, Woods JW. Video signal processing and coding on data-parallel computers Digital Signal Processing: a Review Journal. 5: 118-129. DOI: 10.1006/Dspr.1995.1011 |
0.345 |
|
1994 |
Moulin P. Wavelet thresholding techniques for power spectrum estimation Ieee Transactions On Signal Processing. 42: 3126-3136. DOI: 10.1109/78.330372 |
0.356 |
|
1993 |
Moulin P. A wavelet regularization method for diffuse radar-target imaging and speckle-noise reduction Journal of Mathematical Imaging and Vision. 3: 123-134. DOI: 10.1007/Bf01248407 |
0.334 |
|
1992 |
Moulin P, O'Sullivan JA, Snyder DL. A Method of Sieves for Multiresolution Spectrum Estimation and Radar Imaging Ieee Transactions On Information Theory. 38: 801-813. DOI: 10.1109/18.119737 |
0.369 |
|
1992 |
O'Sullivan JA, Snyder DL, Porter DG, Moulin P. An application of splines to maximum likelihood radar imaging International Journal of Imaging Systems and Technology. 4: 256-264. DOI: 10.1002/Ima.1850040405 |
0.328 |
|
Show low-probability matches. |