default search action
Yuewei Dai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Chengxi Wu, Hamid Reza Karimi, Liang Shan, Yuewei Dai:
Data-driven iterative learning cooperative trajectory tracking control for multiple autonomous underwater vehicles with input saturation constraints. J. Field Robotics 41(7): 2475-2487 (2024) - [j75]Yunxiang Li, Wen Tian, Xiaopeng Ji, Guangjie Liu, Yuewei Dai:
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures. IEEE Syst. J. 18(1): 692-701 (2024) - [i3]Zhuheng Lu, Ting Wu, Yuewei Dai, Weiqing Li, Zhiyong Su:
Fine-grained Metrics for Point Cloud Semantic Segmentation. CoRR abs/2407.21289 (2024) - 2023
- [j74]Zhuheng Lu, Yuewei Dai, Weiqing Li, Zhiyong Su:
Joint data and feature augmentation for self-supervised representation learning on point clouds. Graph. Model. 129: 101188 (2023) - [j73]Weilong Zhang, Liang Shan, Lu Chang, Yuewei Dai:
SVF-RRT*: A Stream-Based VF-RRT* for USVs Path Planning Considering Ocean Currents. IEEE Robotics Autom. Lett. 8(4): 2413-2420 (2023) - [j72]Lu Chang, Liang Shan, Weilong Zhang, Yuewei Dai:
Hierarchical multi-robot navigation and formation in unknown environments via deep reinforcement learning and distributed optimization. Robotics Comput. Integr. Manuf. 83: 102570 (2023) - [j71]Wen Tian, Xufei Ding, Guangjie Liu, Yuewei Dai, Zhu Han:
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things. IEEE Trans. Green Commun. Netw. 7(4): 2025-2037 (2023) - [j70]Jifei Du, Wen Tian, Xiaopeng Ji, Miao Du, Guangjie Liu, Yuewei Dai, Zhu Han:
Strategic UAV-Assisted Game Model for Detection in Covert Communication. IEEE Trans. Veh. Technol. 72(6): 7426-7438 (2023) - 2022
- [j69]Huilin Ge, Zhiyu Zhu, Yuewei Dai, Biao Wang, Xuedong Wu:
Facial expression recognition based on deep learning. Comput. Methods Programs Biomed. 215: 106621 (2022) - [j68]Huilin Ge, Zhiyu Zhu, Yuewei Dai, Runbang Liu:
Super-resolution reconstruction of biometric features recognition based on manifold learning and deep residual network. Comput. Methods Programs Biomed. 221: 106822 (2022) - [j67]Chenyang Wu, Xiaopeng Ji, Yuewei Dai:
Dynamic channel allocation strategy for quality of service enhancement in wireless ad hoc networks. Concurr. Comput. Pract. Exp. 34(10) (2022) - [j66]Luhui Yang, Guangjie Liu, Jinwei Wang, Jiangtao Zhai, Yuewei Dai:
A semantic element representation model for malicious domain name detection. J. Inf. Secur. Appl. 66: 103148 (2022) - [j65]Huilin Ge, Yuewei Dai, Zhiyu Zhu, Xu Zang:
Single-Stage Underwater Target Detection Based on Feature Anchor Frame Double Optimization Network. Sensors 22(20): 7875 (2022) - [j64]Zhuheng Lu, Weiwei Mao, Yuewei Dai, Weiqing Li, Zhiyong Su:
Slicing-Tracking-Detection: Simultaneous Multi-Cylinder Detection From Large-Scale and Complex Point Clouds. IEEE Trans. Vis. Comput. Graph. 28(12): 4172-4185 (2022) - [i2]Zhuheng Lu, Peng Zhang, Yuewei Dai, Weiqing Li, Zhiyong Su:
Hypergraph Convolutional Network based Weakly Supervised Point Cloud Semantic Segmentation with Scene-Level Annotations. CoRR abs/2211.01174 (2022) - [i1]Zhuheng Lu, Yuewei Dai, Weiqing Li, Zhiyong Su:
Joint Data and Feature Augmentation for Self-Supervised Representation Learning on Point Clouds. CoRR abs/2211.01184 (2022) - 2021
- [j63]Huiwen Bai, Weiwei Liu, Guangjie Liu, Yuewei Dai, Shuhua Huang:
Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information. IEEE Access 9: 80639-80653 (2021) - [j62]Lu Chang, Liang Shan, Chao Jiang, Yuewei Dai:
Reinforcement based mobile robot path planning with improved dynamic window approach in unknown environment. Auton. Robots 45(1): 51-76 (2021) - [j61]Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Huiwen Bai:
A correlation-based approach to detecting wireless physical covert channels. Comput. Commun. 176: 31-39 (2021) - [j60]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yuewei Dai, Huiwen Bai:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. Int. J. Digit. Crime Forensics 13(2): 115-133 (2021) - [j59]Wen Tian, Miao Du, Xiaopeng Ji, Guangjie Liu, Yuewei Dai, Zhu Han:
Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game. IEEE Internet Things J. 8(24): 17372-17381 (2021) - [j58]Luhui Yang, Guangjie Liu, Jinwei Wang, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Fast3DS: A real-time full-convolutional malicious domain name detection system. J. Inf. Secur. Appl. 61: 102933 (2021) - [j57]Luhui Yang, Guangjie Liu, Weiwei Liu, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model. Secur. Commun. Networks 2021: 5567635:1-5567635:20 (2021) - [j56]Wen Tian, Miao Du, Xiaopeng Ji, Guangjie Liu, Yuewei Dai, Zhu Han:
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure. IEEE Trans. Smart Grid 12(5): 4259-4268 (2021) - 2020
- [j55]Wen Tian, Xiaopeng Ji, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Shuhua Huang:
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid. IEEE Access 8: 64075-64085 (2020) - [j54]Luhui Yang, Guangjie Liu, Yuewei Dai, Jinwei Wang, Jiangtao Zhai:
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework. IEEE Access 8: 82876-82889 (2020) - [j53]Shuhua Huang, Xiaogeng Hou, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian:
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication. IEEE Access 8: 180341-180351 (2020) - [j52]Weiwei Mao, Zhuheng Lu, Yuewei Dai, Weiqing Li, Zhiyong Su:
Partial Matching of Large Scale Process Plant Models Using Random Walk on Graphs. IEEE Access 8: 201109-201119 (2020) - [j51]Shuhua Huang, Weiwei Liu, Guangjie Liu, Yuewei Dai, Wen Tian:
Exploiting Correlation Characteristics to Detect Covert digital communication. KSII Trans. Internet Inf. Syst. 14(8): 3550-3566 (2020)
2010 – 2019
- 2019
- [j50]Huawang Qin, Raylin Tso, Yuewei Dai:
Quantum secret sharing by using Fourier transform on orbital angular momentum. IET Inf. Secur. 13(2): 104-108 (2019) - [j49]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. KSII Trans. Internet Inf. Syst. 13(4): 1866-1883 (2019) - [j48]Yuewei Dai, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai:
An end-to-end generative network for environmental sound-based covert communication. Multim. Tools Appl. 78(7): 8635-8653 (2019) - [j47]Luhui Yang, Jiangtao Zhai, Weiwei Liu, Xiaopeng Ji, Huiwen Bai, Guangjie Liu, Yuewei Dai:
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis. Symmetry 11(2): 176 (2019) - [c27]Lu Chang, Liang Shan, Jun Li, Yuewei Dai:
The Path Planning of Mobile Robots Based on an Improved A* Algorithm. ICNSC 2019: 257-262 - 2018
- [j46]Lu Liu, Liang Shan, Yuewei Dai, Cheng-Lin Liu, Zhidong Qi:
A Modified Quantum Bacterial Foraging Algorithm for Parameters Identification of Fractional-Order System. IEEE Access 6: 6610-6619 (2018) - [j45]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network. IEEE Access 6: 48030-48041 (2018) - [j44]Lu Liu, Liang Shan, Chao Jiang, Yuewei Dai, Chenglin Liu, Zhidong Qi:
A Modified PSO Algorithm for Parameters Identification of the Double-Dispersion Cole Model. J. Circuits Syst. Comput. 27(13): 1850210:1-1850210:16 (2018) - [j43]Huawang Qin, Raylin Tso, Yuewei Dai:
Multi-dimensional quantum state sharing based on quantum Fourier transform. Quantum Inf. Process. 17(3): 48 (2018) - [j42]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. Secur. Commun. Networks 2018: 1214681:1-1214681:15 (2018) - [j41]Weiwei Liu, Guangjie Liu, Yang Xia, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. Secur. Commun. Networks 2018: 5051270:1-5051270:16 (2018) - [j40]Zhiyong Su, Ying Ye, Qi Zhang, Weiqing Li, Yuewei Dai:
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors. IEEE Trans. Inf. Forensics Secur. 13(4): 1018-1030 (2018) - [c26]Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
A Comprehensive Analysis of Interval Based Network Flow Watermarking. ICCCS (4) 2018: 72-84 - [c25]Chenpeng Ding, Jiangtao Zhai, Yuewei Dai:
An Improved ICS Honeypot Based on SNAP7 and IMUNES. ICCCS (1) 2018: 303-313 - [c24]Luhui Yang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. ICCCS (2) 2018: 472-483 - 2017
- [j39]Zhiyong Su, Lang Zhou, Yaobin Mao, Yuewei Dai, Weiqing Tang:
A unified framework for authenticating topology integrity of 2D heterogeneous engineering CAD drawings. Multim. Tools Appl. 76(20): 20663-20689 (2017) - [j38]Huawang Qin, Yuewei Dai:
Dynamic quantum secret sharing by using d-dimensional GHZ state. Quantum Inf. Process. 16(3): 64 (2017) - [c23]Hao Wang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Detection of Jitterbug Covert Channel Based on Partial Entropy Test. ICCCS (2) 2017: 357-368 - 2016
- [j37]Huawang Qin, Yuewei Dai:
Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell state. Inf. Process. Lett. 116(5): 351-355 (2016) - [j36]Hao Wang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation. KSII Trans. Internet Inf. Syst. 10(4): 1927-1943 (2016) - [j35]Lihua Zhang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes. J. Inf. Hiding Multim. Signal Process. 7(5): 1041-1051 (2016) - [j34]Jiangtao Zhai, Fang Yang, Yuewei Dai, Mingqian Wang:
A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence. J. Inf. Hiding Multim. Signal Process. 7(6): 1222-1230 (2016) - [j33]Huawang Qin, Yuewei Dai:
d-Dimensional quantum state sharing with adversary structure. Quantum Inf. Process. 15(4): 1689-1701 (2016) - [j32]Huawang Qin, Yuewei Dai:
Efficient quantum secret sharing. Quantum Inf. Process. 15(5): 2091-2100 (2016) - [j31]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy. Secur. Commun. Networks 9(8): 791-802 (2016) - [j30]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
Detecting JitterBug covert timing channel with sparse embedding. Secur. Commun. Networks 9(11): 1509-1519 (2016) - [j29]Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Dipak Ghosal:
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation. IEEE Trans. Inf. Forensics Secur. 11(4): 677-690 (2016) - [c22]Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping. ICCCS (1) 2016: 166-177 - 2015
- [j28]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
SkyLen: a Skype-based length covert channel. J. Inf. Hiding Multim. Signal Process. 6(3): 473-481 (2015) - [j27]Lihua Zhang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Improving Reliability of Covert Timing Channel to Packet Loss. J. Inf. Hiding Multim. Signal Process. 6(3): 544-553 (2015) - [j26]Hao Wang, Guangjie Liu, Yuewei Dai, Jin Shi:
A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size. J. Inf. Hiding Multim. Signal Process. 6(4): 750-759 (2015) - [j25]Weiwei Jiang, Guangjie Liu, Yuewei Dai:
基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort). 计算机科学 42(11): 212-216 (2015) - [j24]Yongfei Yang, Guangjie Liu, Yuewei Dai:
基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network). 计算机科学 42(Z6): 388-392 (2015) - [j23]Huawang Qin, Xiaohua Zhu, Yuewei Dai:
(t, n) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process. 14(8): 2997-3004 (2015) - [j22]Huawang Qin, Yuewei Dai:
Proactive quantum secret sharing. Quantum Inf. Process. 14(11): 4237-4244 (2015) - [j21]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. Secur. Commun. Networks 8(9): 1636-1647 (2015) - [c21]Hao Li, Guangjie Liu, Weiwei Jiang, Yuewei Dai:
Designing snort rules to detect abnormal DNP3 network data. ICCAIS 2015: 343-348 - 2014
- [j20]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Syndrome trellis codes based on minimal span generator matrix. Ann. des Télécommunications 69(7-8): 403-416 (2014) - [j19]Weiwei Liu, Guangjie Liu, Yuewei Dai:
Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity. J. Inf. Hiding Multim. Signal Process. 5(4): 769-777 (2014) - [j18]Lihua Zhang, Guangjie Liu, Yuewei Dai:
Network Packet Length Covert Channel Based on Empirical Distribution Function. J. Networks 9(6): 1440-1446 (2014) - [j17]Guangjie Liu, Weiwei Liu, Yuewei Dai, Shiguo Lian:
Adaptive steganography based on block complexity and matrix embedding. Multim. Syst. 20(2): 227-238 (2014) - [j16]Zhiyong Su, Lang Zhou, Guangjie Liu, Jianshou Kong, Yuewei Dai:
Authenticating topological integrity of process plant models through digital watermarking. Multim. Tools Appl. 73(3): 1687-1707 (2014) - [c20]Huawang Qin, Xiaohua Zhu, Yuewei Dai:
Provably Secure Identity-Based Threshold Decryption on Access Structure. CIS 2014: 464-468 - 2013
- [j15]Zhiyong Su, Weiqing Li, Jianshou Kong, Yuewei Dai, Weiqing Tang:
Watermarking 3D CAPD models for topology verification. Comput. Aided Des. 45(7): 1042-1052 (2013) - [j14]Zhiyong Su, Lang Zhou, Weiqing Li, Yuewei Dai, Weiqing Tang:
Topology authentication for CAPD models based on Laplacian coordinates. Comput. Graph. 37(4): 269-279 (2013) - [j13]Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
An Improved Retransmission-based Network Steganography: Design and Detection. J. Networks 8(1): 182-188 (2013) - [j12]Guangjie Liu, Junwen Wang, Shiguo Lian, Yuewei Dai:
Detect image splicing with artificial blurred boundary. Math. Comput. Model. 57(11-12): 2647-2659 (2013) - [j11]Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
Detection of TCP covert channel based on Markov model. Telecommun. Syst. 54(3): 333-343 (2013) - 2012
- [j10]Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Network covert timing channel with distribution matching. Telecommun. Syst. 49(2): 199-205 (2012) - 2011
- [j9]Huawang Qin, Yuewei Dai, Zhiquan Wang:
Identity-based multi-receiver threshold signcryption scheme. Secur. Commun. Networks 4(11): 1331-1337 (2011) - 2010
- [j8]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Secure Multimedia Distribution Based on Watermarking and Encryption. J. Convergence Inf. Technol. 5(9): 279-286 (2010) - [j7]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression. J. Digit. Content Technol. its Appl. 4(8): 34-42 (2010) - [j6]Guangjie Liu, Zhan Zhang, Yuewei Dai, Shiguo Lian:
Improved LSB-matching Steganography for Preserving Second-order Statistics. J. Multim. 5(5): 458-463 (2010) - [c19]Haiwen Wang, Jinggang Zhang, Yuewei Dai, Junhai Qu:
Optimal Design for 2-DOF PID Regulator Based on PSO Algorithm. ICSI (2) 2010: 515-522
2000 – 2009
- 2009
- [j5]Huawang Qin, Yuewei Dai, Zhiquan Wang:
A Model of Intrusion Tolerant System Based on Game Theory. Comput. Inf. Sci. 2(2): 112-117 (2009) - [j4]Huawang Qin, Yuewei Dai, Zhiquan Wang:
A secret sharing scheme based on (t, n) threshold and adversary structure. Int. J. Inf. Sec. 8(5): 379-385 (2009) - [c18]Yanyan Huang, Jian-Yu Wang, J. Wang, Yuewei Dai:
An evaluation method of operational effectiveness for the emergency plans. SOLI 2009: 169-172 - 2008
- [j3]Jinwei Wang, Shiguo Lian, Guangjie Liu, Yuewei Dai, Zhongxuan Liu, Zhen Ren:
Secure multimedia watermarking authentication in wavelet domain. J. Electronic Imaging 17(3): 033010 (2008) - [j2]Jinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian:
Locally optimum detection for Barni's multiplicative watermarking in DWT domain. Signal Process. 88(1): 117-130 (2008) - [c17]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Robust Hashing Based on Persistent Points for Video Copy Detection. CIS (1) 2008: 305-308 - [c16]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao:
Forgery-location highway monitoring systembased on video watermarking. ICNSC 2008: 625-629 - [c15]Yuewei Dai, Jinwei Wang, Guangjie Liu:
Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion. ICNSC 2008: 911-915 - [c14]Ming Bao, Yuewei Dai, Guangjie Liu:
Assessment of Integrated Electronic Information System survivability based on u-function. ICNSC 2008: 1837-1841 - 2007
- [j1]Deng-Pan Ye, Changfu Zou, Yuewei Dai, Zhiquan Wang:
A new adaptive watermarking for real-time MPEG videos. Appl. Math. Comput. 185(2): 907-918 (2007) - [c13]Guangjie Liu, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Image Steganography Based on Quantization-Embedders Combination. ICME 2007: 1115-1118 - [c12]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
A RST-Resilient Watermarking Scheme Based on Invariant Features. SITIS 2007: 927-933 - 2006
- [c11]Jinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian:
Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. ICICIC (3) 2006: 471-474 - [c10]Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Semi-Fragile Watermarking Authentication with Local and Global Watermarks. AIAI 2006: 681-688 - [c9]Guangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang:
Data Hiding in Neural Network Prediction Errors. ISNN (2) 2006: 273-278 - 2005
- [c8]Guangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang:
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. ICNC (3) 2005: 976-979 - [c7]Guangjie Liu, Yuewei Dai, Jinwei Wang, Zhiquan Wang, Shiguo Lian:
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming. MMSP 2005: 1-4 - 2004
- [c6]Shiguo Lian, Jinsheng Sun, Zhiquan Wang, Yuewei Dai:
A fast video encryption scheme based-on chaos. ICARCV 2004: 126-131 - [c5]Hongyu Lei, Yu Zhao, Yuewei Dai, Zhiquan Wang:
A secure voice communication system based on DSP. ICARCV 2004: 132-137 - [c4]Deng-Pan Ye, Yuewei Dai, Zhiquan Wang, Hongyu Lei:
A fast motion segmentation based watermarking for MPEG-2 video. ICARCV 2004: 1088-1091 - [c3]Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang:
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images. IWDW 2004: 152-162 - [c2]Yuewei Dai, Stefan Thiemert, Martin Steinebach:
Feature-based watermarking scheme for MPEG-I/II video authentication. Security, Steganography, and Watermarking of Multimedia Contents 2004: 325-335 - 2003
- [c1]Jinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang:
A Feature-Watermarking Scheme for JPEG Image Authentication. IWDW 2003: 212-222
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint