Publication

See Hong CAO in Google Scholar.

Thesis

Journal papers

Conference papers

Book chapters

JOURNAL PAPER:

[51] H. Cao, et. al. "Bring AI to Life," APAC CIO Advisor, Special Issue on Data Analytics, 2019 (Web)

[50] H. Li, W. Li, H. Cao, S. Wang, F. Huang, A.C. Kot, "Unsupervised Domain Adaptation for Face Anti-Spoofing," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 13(7), pp. 1794-1809, 2018

[49] H. Cao, M. Bhandari, "Managing Uncertainty with an Analytics-Driven Supply Chain," APAC CIO Outlook, 2018 (Link)

[48] H. Cao, K.C.C. Chang, "Nonintrusive Smartphone User Verification Using Anonymized Multimodal Data," IEEE Trans. on Knowledge and Data Engineering (TKDE), Vol. 31(3), pp. 479-492, 2019 (Draft PDF)

[47] H. Cao, M. Bhandari, "Powering Data-Driven Innovation," APAC CIO Outlook, Special Issue on Bid Data, August 2017 (PDF, Web)

[46] H. Cao, M. Lin, "Mining Smartphone Data for App Usage Prediction and Recommendations: A Survey," Pervasive and Mobile Computing (PMC), vol. 37, pp1-22, June 2017 (PDF)

[45] G.I. Webb, R. Hyde, H. Cao, H.L. Nguyen, F. Petitjean, "Characterizing Concept Drift," Data Mining and Knowledge Discovery (DMKD), vol. 30(4), pp. 964-994, Apr 2016 (Generator Code, PDF, Cited by Nature Magazine)

[44] M. Wu, H. Cao, J. Cao, H.L. Nguyen, J. B. Gomez, S.P. Krishnaswamy, "An Overview of State-of-the-Art Partial Discharge Analysis Techniques for Condition Monitoring," IEEE Electrical Insulation Magazine (EIM), vol. 31(6), pp. 22-35, 2015

[43] H. Cao, V. Y. F. Tan and J. Z. F. Pang, “A Parsimonious Mixture of Gaussian Trees Model for Oversampling in Imbalanced and Multi-Modal Time-Series Classification,” IEEE Trans. on Neural Network and Learning System (TNNLS), vol. 25(12), pp. 2226-2239, 2014 (Details, PDF)

[42] H. Cao and A.C. Kot, “On Establishing Edge Adaptive Grid for Bi-Level Image Data Hiding,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 8(9), pp. 1508-1518, 2013 (Details, Software (32-bit Windows), PDF)

[41] J. Fan, H. Cao and A.C. Kot, “Estimating EXIF Parameters Based on Noise Features for Image Manipulation Detection,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 8(4), pp. 608-618, 2013.

[40] H. Cao, X.-L. Li, Y.-K. Woon and S.-K. Ng. “Integrated Oversampling for Imbalanced Time Series Classification,” IEEE Trans. on Knowledge and Data Engineering (TKDE), vol. 25(12), pp. 2809-2822, 2013. (PDF, Code)

[39] H. Cao and A.C. Kot, “Measuring the Statistical Correlation Inconsistencies in Mobile Images for Tamper Detection,” LNCS Trans. on Data Hiding and Multimedia Security (DHMMS), vol. 7110/2012, pp. 63-81, 2012 (PDF)

[38] H. Cao and A.C. Kot, “Manipulation Detection on Image Patches using FusionBoost,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 7(3), pp. 992-1002, 2012 (PDF, Demosaicing Feature Tool)

[37] H. Cao and A.C. Kot, “Detection of Tampering Inconsistencies on Mobile Photos,” in Proc. Int. Workshop on Digital Watermarking (IWDW), Lecture Notes in Computer Science, pp. 105-119, Seoul, Oct. 2010 (Best Paper Award) (PDF, PPT)

[36] H. Cao and A.C. Kot, “Lossless Data Embedding in Electronic Inks,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 5(2), pp. 314-323, June 2010 (PDF)

[35] H. Cao and A.C. Kot, “Accurate Detection of Demosaicing Regularity for Digital Image Forensics,” IEEE Trans. on Information Forensics and Security (TIFS), vol. 4(4-2), pp. 899-910, Dec. 2009 (PDF, Demosaicing Feature Tool)

BOOK CHAPTER:

[34] V. Zheng and H. Cao, "Mobile Augmented Reality to Enable Intelligent Mall Shopping by Network Data," Big Data and Computational Intelligence in Networking, Taylor & Francis LLC, CRC Press, 2017

[33] A.C. Kot and H. Cao, “Image and Video Source Class Identification,” Digital Image Forensics-There is more to a picture than meet the eye, Part 2, 157-178, Springer Velag, 2013

[32] A.C. Kot, H. Yang and H. Cao, “Theme Review on Multimedia Security,” Multimedia Image and Video Processing (2nd edition), CRC Press, 2012

CONFERENCE PAPER:

[31] V.W Zheng, H. Cao, S. Gao, A. Adhikari, M. Lin, K. C.-C. Chang, "Cold-Start Heterogeneous-Device Wireless Localization," Proc. AAAI Conference on Artificial Intelligence, 2016 (PDF)

[30] A. Adhikari, V.W. Zheng, H. Cao, M. Lin, Y. Fang, K. C.-C Chang, "IntelligShop: Enabling Intelligent Shopping in Malls through Location-based Augmented Reality," Proc. IEEE international Conference on Data Mining (ICDM), 2015 (Press, Demo, PDF)

[29] H.-L. Nguyen, J.B. Gomes, M. Wu, H. Cao, J. Cao and S. P. Krishnaswamy, "Active learning for accurate analysis of streaming partial discharge data," Proc. PHM, pp. 1-5, 2015

[28] M. Wu, H. Cao, H.-L. Nguyen, K. Surmacz and C. Hargrove, "Modeling perceived stress via HRV and accelerometer sensor streams," Proc. EMBC, pp. 1625-1628, 2015

[27] M. Lin, H. Cao, V. Zheng, K.C.C. Chang and S. P. Krishnaswamy, "Mobility Profiling for User Verification with Anonymized Location Data," in Proc. IJCAI, pp. 960-966, 2015

[26] M. Lin, H. Cao, V. Zheng, K. C.C. Chang and S. P. Krishnaswamy, "Mobile User Verification/Identification using Statistical Mobility Profile," in Proc. BigComp, pp. 15-18, 2015

[25] H. Cao, C. Bao, X.-L. Li and Y.-K. Wong, "Class Augmented Active Learning," in Proc. SIAM International Conference on Data Mining (SDM), pp. 1-9, 2014 (Details)

[24] M. Dash, H.-L. Nguyen, H. Cao, G.-E. Yap, M. N. Nguyen, Xiao-Li Li, S. Krishnaswamy, J. Decraene, S. Antonatos, Y. Wang, D. T. Anh and A. Shi-Nash, "Home and Work Place Prediction for Urban Planning Using Mobile Network Data,” Proc. IEEE Mobile Data Management (MDM), vol. 2, pp. 37-42, 2014

[23] M. Dash, G. G. Chua, H.-L. Nguyen, G.-E. Yap, H. Cao, X.-L. Li, S. Krishnaswamy, J. Decraene and A. Shi-Nash, "An Interactive Analytics Tool for Understanding Location Semantics and Mobility of Users Using Mobile Network Data”, Proc. IEEE MDM (Demo), 2014

[22] J.Z.F. Pang, H. Cao and V. Y. F. Tan, “MOGT: Oversampling with a Parsimonious Mixture of Gaussian Trees Model for Imbalanced Time-Series Classification,” in Proc. MLSP, pp. 1-6, 2013 (Student best paper finalist)

[21] H. Cao and A.C. Kot, “EAG: Edge Adaptive Grid Data Hiding for Binary Image Authentication,” in Proc. APSIPA ASC, pp. 1-6, 2012 (Image Data).

[20] C. Phua, H. Cao, J.B. Gomes and M.N. Nguyen, “Predicting Near-Future Churners and Win-Backs in the Telecommunications Industry,” in arXiv preprint arXiv:1210.6891, 2012.

[19] H. Cao, M.-N. Nguyen, C. Phua, S. Krishnaswamy and X.-L. Li, “An Integrated Framework for Human Activity Classification,” in Proc. Ubicomp, pp. 331-340, 2012 (PDF, PPT).

[18] C.C. Teck, X. Li, J.-H. Zhou, X.-L. Li, H. Cao and Y.-K. Wong, "Hybrid Rebalancing Approach to Handle Imbalanced Dataset for Fault Diagnosis in Manufacturing Systems", in Proc. ICIEA, pp. 1211-1216, 2012.

[17] H. Cao, M.-N. Nguyen, C. Phua, S. Krishnaswamy, and X.-L. Li, "An Integrated Framework for Human Activity Recognition", in Proc. ACM International Conference on Ubiquitous Computing (Poster) Ubicomp, 2012.

[16] H. Cao and A.C. Kot, “Similar DSLR Processor Identification using Compact Model Templates,” in Proc. APSIPA ASC, 2011 (PDF) .

[15] H. Cao, X.-L. Li, Y.-K. Woon and S.-K. Ng, “SPO: Structure Preserving Oversampling for Imbalanced Time Series Classification,” Proc. IEEE Int. Conf. on Data Mining ICDM, pp. 1008-1013, 2011 (PDF, PPT, Data, Code).

[14] J. Fan, A.C. Kot, H. Cao and F. Sattar, “Modeling the EXIF-Image Correlation for Image Manipulation Detection,” Proc. Int. Conf. on Image Processing ICIP, pp. 1945-1948, 2011 (PDF) .

[13] H. Cao and A.C. Kot, “ Mobile Camera Identification Using Demosaicing Features,” in Proc. of ISCAS (invited paper), pp. 1683-1686, 2010, (Student best paper finalist) (PDF, Demosaicing Feature Tool).

[12] H. Cao and A.C. Kot, “Identification of Recaptured Photographs on LCD Screens,” in Proc. of ICASSP, pp. 1790-1793, 2010 (PDF).

[11] H. Cao and A.C. Kot, “RAW-Tool Identification through Detected Demosaicing Regularity,” in Proc. of ICIP, pp. 2885-2888, 2009 (PDF).

[10] H. Cao and A.C. Kot, “Accurate Detection of Demosaicing Regularity from Output Images,” in Proc. of ISCAS (invited paper), pp. 497-500, 2009 (PDF, Demosaicing Feature Tool).

[9] H. Cao and A.C. Kot, “Lossless Data Hiding for Electronic Ink,” in Proc. of ICASSP, pp. 1381-1384, 2009 (PDF).

[8] H. Cao and A.C. Kot, “A Generalized Model for Detection of Demosaicing Characteristics,” in Proc. of ICME, pp. 1513-1516, 2008 (PDF).

[7] J. Cheng, A.C. Kot, J. Liu and H. Cao, “Detection of Data Hiding in Binary Text Images,” in Proc. of ICIP, vol. 3, pp. III-73-76, 2005 (PDF).

[6] J. Cheng, A.C. Kot, J. Liu and H. Cao, “Steganalysis of Data Hiding in Binary Text Images,” in Proc. of ISCAS, vol. 5, pp. 4405 – 4408, 2005 (PDF).

[5] J. Cheng, A.C. Kot, J. Liu and H. Cao, “Steganalysis of Binary Text Images”, in Proc. of ICASSP, vol. 4, pp. 689-692, 2005 (PDF).

[4] H. Cao and A.C. Kot, “Online Structure Based Chinese Character Pre-Classification,” in Proc. of ICPR, vol. 2, pp. 395-398, 2004 (PDF).

[3] H. Cao and A.C. Kot, “Modified Kohonen Learning Network and its Application in Chinese Character Recognition,” in Proc. of TENCON, vol. 2, pp. 136-139, 2004 (PDF) .

THESIS:

[2] H. Cao, “Statistical Image Source Model Identification and Forgery Detection”, PhD thesis, Nanyang Technological University, 2011. (PDF)

[1] H. Cao, “Learning Network and Structure Based Character Recognition”, MEng thesis, Nanyang Technological University, 2004. (PDF)