Volgen
Zhen Li
Zhen Li
Geverifieerd e-mailadres voor i2r.a-star.edu.sg
Titel
Geciteerd door
Geciteerd door
Jaar
Blind and Robust Audio Watermarking Scheme Based on SVD–DCT
BY Lei, IY Soon, Z Li
Signal Processing 91 (8), 1973-1984, 2011
2032011
A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition
B Lei, Y Soon, F Zhou, Z Li, H Lei
Signal processing 92 (9), 1985-2001, 2012
1702012
A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition
B Lei, Y Soon, F Zhou, Z Li, H Lei
International Workshop on Digital Watermarking (IWDW) 7128, 86-96, 2011
1702011
A Comparative Study of Mobile-based Landmark Recognition Techniques
KH Yap, T Chen, Z Li, K Wu
Intelligent Systems, IEEE 25 (1), 48-57, 2010
562010
A New Blind Robust Image Watermarking Scheme in SVD-DCT Composite Domain
Z Li, KH Yap, BY Lei
18th IEEE International Conference on Image Processing (ICIP), 2757-2760, 2011
452011
Pornographic images detection based on CBIR and skin analysis
B Liu, J Su, Z Lu, Z Li
International Conference on Semantics, Knowledge and Grid (SKG), 487-488, 2008
392008
A Survey on Mobile Landmark Recognition for Information Retrieval
T Chen, K Wu, KH Yap, Z Li, FS Tsai
10-th International Conference on Mobile Data Management: Systems, Services …, 2009
352009
Reversible Data Hiding for 3D Meshes in the PVQ-compressed Domain
Z Sun, ZM Lu, Z Li
International Conference on Intelligent Information Hiding and Multimedia …, 2006
272006
DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching
N Xue, L Niu, X Hong, Z Li, L Hoffaeller, C Pöpper
Annual Computer Security Applications Conference, 304-319, 2020
262020
3D Mesh Model Coding, Streaming media architectures, techniques, and applications: Recent Advances
L Zhen
IGI Global, 2010
24*2010
High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain
ZM Lu, Z Li
7-th International Workshop on Digital Watermarking, 233-243, 2007
202007
Fast Codevector Search Scheme for 3D Mesh Model Vector Quantisation
Z Li, ZM Lu
Electronics Letters 44 (2), 104-105, 2008
192008
Automatic fine-grained access control in SCADA by machine learning
L Zhou, C Su, Z Li, Z Liu, GP Hancke
Future Generation Computer Systems 93, 548--559, 2019
172019
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU
J Lu, Z Li, M Henricksen
Applied Cryptography and Network Security, 350-369, 2015
162015
Citrus disease recognition based on weighted scalable vocabulary tree
XL Deng, Z Li, TS Hong
Precision agriculture 15 (3), 321-330, 2014
162014
An Efficient Approach for Scene Categorization Based on Discriminative Codebook Learning in Bag-of-Words Framework
Z Li, KH Yap
Image and Vision Computing 31 (10), 748-755, 2013
152013
Face Recognition via Local Preserving Average Neighborhood Margin Maximization and Extreme Learning Machine
X Chen, W Liu, J Lai, Z Li, C Lu
Soft Computing 16 (9), 1515-1523, 2012
142012
Content and context boosting for mobile landmark recognition
Z Li, KH Yap
IEEE Signal Processing Letters 19 (8), 459-462, 2012
142012
Efficient Mobile Landmark Recognition Based on Saliency-aware Scalable Vocabulary Tree
KH Yap, Z Li, DJ Zhang, ZK Ng
20th ACM International Conference on Multimedia, 1001-1004, 2012
122012
NLOS Mitigation Method for TDOA Measurement
H Jiang, J Xu, Z Li
6-th International Conference on Intelligent Information Hiding and …, 2010
112010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20