


default search action
Rangding Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Peiwen Zhuo, Diqun Yan, Kaiyu Ying, Rangding Wang, Li Dong:
Audio steganography cover enhancement via reinforcement learning. Signal Image Video Process. 18(2): 1007-1013 (2024) - [j61]Jiale Chen
, Li Dong
, Rangding Wang
, Diqun Yan
, Chengbin Peng
:
Mixed-Bit Sampling Graphic: When Watermarking Meets Copy Detection Pattern. IEEE Signal Process. Lett. 31: 286-290 (2024) - [j60]Li Dong
, Weipeng Liang
, Rangding Wang
:
Robust Text Image Tampering Localization via Forgery Traces Enhancement and Multiscale Attention. IEEE Trans. Consumer Electron. 70(1): 3495-3507 (2024) - [j59]Haojun Dai
, Rangding Wang
, Dawen Xu
, Songhan He
, Lin Yang
:
HEVC Video Steganalysis Based on PU Maps and Multi-Scale Convolutional Residual Network. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2663-2676 (2024) - [j58]Lin Yang
, Rangding Wang
, Dawen Xu
, Li Dong
, Songhan He
:
Centralized Error Distribution-Preserving Adaptive Steganography for HEVC. IEEE Trans. Multim. 26: 4255-4270 (2024) - [j57]Lin Yang
, Dawen Xu
, Jiangbo Qian
, Rangding Wang
:
Quad-Tree Structure-Preserving Adaptive Steganography for HEVC. IEEE Trans. Multim. 26: 8625-8638 (2024) - [c49]Sifan Wu, Li Dong, Diqun Yan, Rangding Wang:
Normalizing Flows-Based Latent Variable Rearrangement for Generative Image Steganography. APSIPA 2024: 1-6 - 2023
- [j56]Mingyu Dong, Diqun Yan, Rangding Wang:
Adversarial Examples Protect Your Privacy on Speech Enhancement System. Comput. Syst. Sci. Eng. 46(1): 1-12 (2023) - [j55]Lin Yang, Dawen Xu
, Rangding Wang, Songhan He:
Adaptive HEVC video steganography based on distortion compensation optimization. J. Inf. Secur. Appl. 73: 103442 (2023) - [j54]Lang Chen
, Rangding Wang, Li Dong, Diqun Yan:
Imperceptible adversarial audio steganography based on psychoacoustic model. Multim. Tools Appl. 82(17): 26451-26463 (2023) - [c48]Jiale Chen, Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Jinyu Tian
:
Physically Robust Reversible Watermarking. AMC-SME 2023: 37-43 - [c47]Xiaojian Ji, Li Dong, Rangding Wang, Diqun Yan, Yang Yin, Jinyu Tian
:
Gradient Sign Inversion: Making an Adversarial Attack a Good Defense. IJCNN 2023: 1-6 - [c46]Jiacheng Deng
, Li Dong
, Jiahao Chen
, Diqun Yan
, Rangding Wang
, Dengpan Ye
, Lingchen Zhao
, Jinyu Tian
:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. ACM Multimedia 2023: 7559-7568 - [i5]Jiacheng Deng, Li Dong, Jiahao Chen, Diqun Yan, Rangding Wang, Dengpan Ye, Lingchen Zhao, Jinyu Tian
:
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition. CoRR abs/2308.02369 (2023) - 2022
- [j53]Jiacheng Deng
, Li Dong
, Rangding Wang
, Rui Yang, Diqun Yan
:
Decision-Based Attack to Speaker Recognition System via Local Low-Frequency Perturbation. IEEE Signal Process. Lett. 29: 1432-1436 (2022) - [c45]Lin Yang, Rangding Wang, Dawen Xu, Li Dong, Songhan He, Fang Liu:
High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC. IWDW 2022: 20-34 - [c44]Jiale Chen, Li Dong, Rangding Wang, Diqun Yan, Weiwei Sun, Hang-Yu Fan:
Physical Anti-copying Semi-robust Random Watermarking for QR Code. IWDW 2022: 131-146 - [c43]Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li:
Robust Document Image Forgery Localization Against Image Blending. TrustCom 2022: 810-817 - [i4]Jiacheng Deng, Shunyi Chen, Li Dong, Diqun Yan, Rangding Wang:
Transferability of Adversarial Attacks on Synthetic Speech Detection. CoRR abs/2205.07711 (2022) - [i3]Mingyu Dong, Diqun Yan, Rangding Wang:
Adversarial Privacy Protection on Speech Enhancement. CoRR abs/2206.08170 (2022) - [i2]Mingyu Dong, Jiahao Chen, Diqun Yan, Jingxing Gao, Li Dong, Rangding Wang:
Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations. CoRR abs/2206.15128 (2022) - 2021
- [j52]Kaiyu Ying
, Rangding Wang
, Yuzhen Lin
, Diqun Yan
:
Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes. IEEE Access 9: 11705-11715 (2021) - [j51]Lang Chen
, Rangding Wang
, Diqun Yan
, Jie Wang
:
Learning to Generate Steganographic Cover for Audio Steganography Using GAN. IEEE Access 9: 88098-88107 (2021) - [j50]Donghua Wang
, Li Dong
, Rangding Wang, Diqun Yan
:
Fast speech adversarial example generation for keyword spotting system with conditional GAN. Comput. Commun. 179: 145-156 (2021) - [j49]Jie Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yuzhen Lin:
Towards breaking DNN-based audio steganalysis with GAN. Int. J. Auton. Adapt. Commun. Syst. 14(4): 371-383 (2021) - [j48]Tianyun Liu
, Diqun Yan
, Rangding Wang, Nan Yan, Gang Chen:
Identification of Fake Stereo Audio Using SVM and CNN. Inf. 12(7): 263 (2021) - [j47]Yongkang Gong, Diqun Yan
, Terui Mao, Donghua Wang, Rangding Wang:
Defending and Detecting Audio Adversarial Example using Frame Offsets. KSII Trans. Internet Inf. Syst. 15(4): 1538-1552 (2021) - [j46]Yuzhen Lin
, Rangding Wang
, Li Dong
, Diqun Yan
, Jie Wang
:
Tackling the Cover Source Mismatch Problem in Audio Steganalysis With Unsupervised Domain Adaptation. IEEE Signal Process. Lett. 28: 1475-1479 (2021) - [c42]Terui Mao
, Diqun Yan
, Yongkang Gong
, Rangding Wang
:
Identification of Synthetic Spoofed Speech with Deep Capsule Network. FCS 2021: 257-265 - [c41]Kaiyu Ying, Rangding Wang, Diqun Yan:
Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing. WIFS 2021: 1-6 - [i1]Mingyu Dong, Diqun Yan, Yongkang Gong, Rangding Wang:
Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise. CoRR abs/2108.13562 (2021) - 2020
- [j45]Xueyuan Zhang
, Rangding Wang
, Diqun Yan
, Li Dong
, Yuzhen Lin:
Selecting Optimal Submatrix for Syndrome-Trellis Codes (STCs)-Based Steganography With Segmentation. IEEE Access 8: 61754-61766 (2020) - [j44]Donghua Wang
, Li Dong
, Rangding Wang
, Diqun Yan
, Jie Wang
:
Targeted Speech Adversarial Example Generation With Generative Adversarial Network. IEEE Access 8: 124503-124513 (2020) - [j43]Heng Yu
, Rangding Wang
, Li Dong
, Diqun Yan
, Yongkang Gong
, Yuzhen Lin
:
A High-Capacity Reversible Data Hiding Scheme Using Dual-Channel Audio. IEEE Access 8: 162271-162278 (2020) - [j42]Biaoli Tao, Rangding Wang, Diqun Yan
, Chao Jin:
Anti-Forensics of Double Compressed MP3 Audio. Int. J. Digit. Crime Forensics 12(3): 45-57 (2020) - [j41]Yongchao Ye
, Lingjie Lao
, Diqun Yan
, Rangding Wang:
Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network. Int. J. Digit. Multim. Broadcast. 2020: 8927031:1-8927031:10 (2020) - [j40]Lang Lin, Rangding Wang, Diqun Yan
, Li Dong:
A Robust Method for Speech Replay Attack Detection. KSII Trans. Internet Inf. Syst. 14(1): 168-182 (2020) - [j39]Diqun Yan
, Xiaowen Li, Li Dong, Rangding Wang:
An Antiforensic Method against AMR Compression Detection. Secur. Commun. Networks 2020: 8849902:1-8849902:8 (2020) - [j38]Li Dong
, Jiantao Zhou
, Weiwei Sun, Diqun Yan
, Rangding Wang
:
First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding. IEEE Trans. Circuits Syst. II Express Briefs 67-II(5): 951-955 (2020) - [c40]Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan
, Yuzhen Lin
, Jie Wang:
Towards Designing an Effective Complexity Indicator for Audio Steganography. ICC 2020: 1-6 - [c39]Donghua Wang
, Rangding Wang
, Li Dong
, Diqun Yan
, Yiming Ren
:
Efficient Generation of Speech Adversarial Examples with Generative Model. IWDW 2020: 251-264 - [c38]Jie Wang, Rangding Wang, Li Dong, Diqun Yan:
Robust, Imperceptible and End-to-End Audio Steganography Based on CNN. SPDE 2020: 427-442 - [c37]Donghua Wang
, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yongkang Gong:
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey. SPDE 2020: 443-468 - [c36]Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan:
Post-processing for Enhancing Audio Steganographic Undetectability. SPDE 2020: 546-559
2010 – 2019
- 2019
- [j37]Xiaowen Li
, Diqun Yan
, Li Dong
, Rangding Wang
:
Anti-Forensics of Audio Source Identification Using Generative Adversarial Network. IEEE Access 7: 184332-184339 (2019) - [j36]Diqun Yan
, Li Xiang, Zhifeng Wang
, Rangding Wang:
Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum. Autom. Control. Comput. Sci. 53(1): 72-79 (2019) - [j35]Chao Jin
, Rangding Wang, Diqun Yan
:
Source smartphone identification by exploiting encoding characteristics of recorded speech. Digit. Investig. 29: 129-146 (2019) - [j34]Qian Li, Rangding Wang, Dawen Xu:
Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients. IET Inf. Secur. 13(1): 1-6 (2019) - [c35]Yuzhen Lin
, Rangding Wang, Diqun Yan
, Li Dong, Xueyuan Zhang:
Audio Steganalysis with Improved Convolutional Neural Network. IH&MMSec 2019: 210-215 - 2018
- [j33]Qijuan Huang, Rangding Wang, Diqun Yan
, Jian Zhang:
AAC Double Compression Audio Detection Algorithm Based on the Difference of Scale Factor. Inf. 9(7): 161 (2018) - [j32]Tianyun Qin, Rangding Wang, Diqun Yan
, Lang Lin:
Source Cell-Phone Identification in the Presence of Additive Noise from CQT Domain. Inf. 9(8): 205 (2018) - [j31]Qian Li
, Rangding Wang, Dawen Xu:
An Inter-Frame Forgery Detection Algorithm for Surveillance Video. Inf. 9(12): 301 (2018) - [j30]Diqun Yan
, Rangding Wang, Jinglei Zhou, Chao Jin, Zhifeng Wang
:
Compression history detection for MP3 audio. KSII Trans. Internet Inf. Syst. 12(2): 662-675 (2018) - [j29]Dawen Xu
, Kai Chen, Rangding Wang, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification. Secur. Commun. Networks 2018: 1734961:1-1734961:14 (2018) - [c34]Lang Lin, Rangding Wang, Diqun Yan
, Can Li:
A Replay Voice Detection Algorithm Based on Multi-feature Fusion. ICCCS (6) 2018: 289-299 - [c33]Qijuan Huang, Rangding Wang, Diqun Yan
, Jian Zhang:
AAC Audio Compression Detection Based on QMDCT Coefficient. ICCCS (6) 2018: 347-359 - [c32]Lang Lin, Rangding Wang, Diqun Yan
:
A Replay Speech Detection Algorithm Based on Sub-band Analysis. Intelligent Information Processing 2018: 337-345 - 2017
- [j28]Rong Zhang, Rangding Wang, Lijun Guo, Baochuan Jiang:
High-quality JPEG compression history detection for fake uncompressed images. J. Electronic Imaging 26(3): 33028 (2017) - [j27]Dawen Xu
, Rangding Wang, Yani Zhu:
Tunable data hiding in partially encrypted H.264/AVC videos. J. Vis. Commun. Image Represent. 45: 34-45 (2017) - [j26]Chao Jin, Rangding Wang, Diqun Yan
:
Steganalysis of MP3Stego with low embedding-rate using Markov feature. Multim. Tools Appl. 76(5): 6143-6158 (2017) - 2016
- [j25]Dawen Xu
, Rangding Wang, Yun Q. Shi:
An improved scheme for data hiding in encrypted H.264/AVC videos. J. Vis. Commun. Image Represent. 36: 229-242 (2016) - [j24]Chao Jin, Rangding Wang, Diqun Yan
, Pengfei Ma, Jinglei Zhou:
An efficient algorithm for double compressed AAC audio detection. Multim. Tools Appl. 75(8): 4815-4832 (2016) - [j23]Dawen Xu
, Rangding Wang:
Separable and error-free reversible data hiding in encrypted images. Signal Process. 123: 9-21 (2016) - [j22]Dawen Xu
, Rangding Wang:
Two-dimensional reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. Signal Process. Image Commun. 47: 369-379 (2016) - [c31]Qi Sheng, Rangding Wang, Anshan Pei, Bin Wang:
An Information Hiding Algorithm for HEVC Based on Differences of Intra Prediction Modes. ICCCS (1) 2016: 63-74 - [c30]Biaoli Tao, Rangding Wang, Diqun Yan
, Chao Jin, Yanan Chen, Li Zhang:
Audio Tampering Detection Based on Quantization Artifacts. ICCCS (2) 2016: 430-439 - [c29]Chao Jin, Rangding Wang, Diqun Yan
, Biaoli Tao, Yanan Chen, Anshan Pei:
Source Cell-Phone Identification Using Spectral Features of Device Self-noise. IWDW 2016: 29-45 - [c28]Dawen Xu, Yani Zhu, Rangding Wang, Jianjing Fu, Kai Chen:
Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos. IWDW 2016: 393-406 - 2015
- [j21]Dawen Xu
, Rangding Wang:
Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos. J. Electronic Imaging 24(3): 033028 (2015) - [j20]Jiaji Wang, Rangding Wang, Dawen Xu, Wei Li:
An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode. J. Softw. 10(2): 213-221 (2015) - [j19]Rong Zhang, Rangding Wang:
In-camera JPEG compression detection for doubly compressed images. Multim. Tools Appl. 74(15): 5557-5575 (2015) - [c27]Jinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan:
Multiple MP3 Compression Detection Based on the Statistical Properties of Scale Factors. IWDW 2015: 51-60 - [c26]Meiling Huang, Rangding Wang, Jian Xu, Dawen Xu, Qian Li:
Detection of Double Compression for HEVC Videos Based on the Co-occurrence Matrix of DCT Coefficients. IWDW 2015: 61-71 - [c25]Dawen Xu, Kai Chen, Rangding Wang, Shubing Su:
Completely Separable Reversible Data Hiding in Encrypted Images. IWDW 2015: 365-377 - 2014
- [j18]Rangding Wang, Qian Li, Chao Jin, Juan Li, Yiqun Xiong:
A Novel Audio Aggregation Watermarking Algorithm Based on Copyright Protection. Int. J. Comput. Intell. Syst. 7(1): 147-159 (2014) - [j17]Dawen Xu
, Rangding Wang:
Efficient reversible data hiding in encrypted H.264/AVC videos. J. Electronic Imaging 23(5): 053022 (2014) - [j16]Xianmin Yu, Rangding Wang, Diqun Yan
, Pengfei Ma:
Detecting Fake-Quality MP3 based on Huffman Table Index. J. Softw. 9(4): 907-912 (2014) - [j15]Pengfei Ma, Rangding Wang, Diqun Yan
, Chao Jin:
Detecting double-compressed MP3 with the Same Bit-rate. J. Softw. 9(10): 2522-2527 (2014) - [j14]Dawen Xu
, Rangding Wang, Yun Q. Shi:
An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. J. Vis. Commun. Image Represent. 25(2): 410-422 (2014) - [j13]Juan Li, Rangding Wang, Diqun Yan
, Youming Li:
A multipurpose audio aggregation watermarking based on multistage vector quantization. Multim. Tools Appl. 68(3): 571-593 (2014) - [j12]Diqun Yan
, Rangding Wang:
Detection of MP3Stego exploiting recompression calibration-based feature. Multim. Tools Appl. 72(1): 865-878 (2014) - [j11]Shaojing Fan, Rangding Wang, Tian-Tsong Ng
, Cheston Yin Chet Tan
, Jonathan S. Herberg, Bryan L. Koenig:
Human Perception of Visual Realism for Photo and Computer-Generated Face Images. ACM Trans. Appl. Percept. 11(2): 7:1-7:21 (2014) - [j10]Dawen Xu
, Rangding Wang, Yun Q. Shi:
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution. IEEE Trans. Inf. Forensics Secur. 9(4): 596-606 (2014) - [c24]Chao Jin, Rangding Wang, Diqun Yan
, Pengfei Ma, Kaiyun Yang:
A novel detection scheme for MP3Stego with low payload. ChinaSIP 2014: 602-606 - [c23]Shaojing Fan, Tian-Tsong Ng
, Jonathan S. Herberg, Bryan L. Koenig, Cheston Yin Chet Tan
, Rangding Wang:
An Automated Estimator of Image Visual Realism Based on Human Cognition. CVPR 2014: 4201-4208 - [c22]Dawen Xu, Rangding Wang:
Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram Shifting. IWDW 2014: 230-242 - [c21]Jinglei Zhou, Rangding Wang, Chao Jin, Diqun Yan
:
Detecting Fake-Quality WAV Audio Based on Phase Differences. IWDW 2014: 525-534 - 2013
- [j9]Diqun Yan
, Rangding Wang, Xianmin Yu, Jie Zhu:
Steganalysis for MP3Stego using differential statistics of quantization step. Digit. Signal Process. 23(4): 1181-1185 (2013) - [j8]Qian Li, Rangding Wang:
Watermarking in H.264/AVC Compressed Domain Using CAVLC. J. Comput. 8(12): 3126-3133 (2013) - [j7]Xianmin Yu, Rangding Wang, Diqun Yan
:
Detecting MP3Stego using calibrated side information features. J. Softw. 8(10): 2628-2636 (2013) - [c20]Dawen Xu, Rangding Wang, Yun-Qing Shi:
Reversible Data Hiding in Encrypted H.264/AVC Video Streams. IWDW 2013: 141-152 - [c19]Pengfei Ma, Rangding Wang, Diqun Yan
, Chao Jin:
A Huffman Table Index Based Approach to Detect Double MP3 Compression. IWDW 2013: 258-271 - 2012
- [j6]Diqun Yan
, Rangding Wang, Xianmin Yu, Jie Zhu:
Steganography for MP3 audio by exploiting the rule of window switching. Comput. Secur. 31(5): 704-716 (2012) - [j5]Dawen Xu
, Rangding Wang, Jicheng Wang:
Prediction mode modulated data-hiding algorithm for H.264/AVC. J. Real Time Image Process. 7(4): 205-214 (2012) - [j4]Ming Jin, Youming Li, Zhenghao Zhang, Rangding Wang:
A New Spectrum Sensing Algorithm Based on Antenna Correlation for Cognitive Radio Systems. Wirel. Pers. Commun. 66(2): 419-428 (2012) - 2011
- [j3]Diqun Yan
, Rangding Wang:
Huffman table swapping-based steganograpy for MP3 audio. Multim. Tools Appl. 52(2-3): 291-305 (2011) - [j2]Dawen Xu
, Rangding Wang, Jicheng Wang:
A novel watermarking scheme for H.264/AVC video authentication. Signal Process. Image Commun. 26(6): 267-279 (2011) - [c18]Rong Zhang, Rangding Wang, Tian-Tsong Ng
:
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges. IWDW 2011: 292-305 - 2010
- [c17]Shoudong Shi, Rangding Wang, Jiangbo Qian:
To Explore Embedded System Education for Developing Local Economy. GreenCom/CPSCom 2010: 858-861 - [c16]Rangding Wang, Yiqun Xiong:
A novel audio aggregation watermarking for copyright protection. ISKE 2010: 166-172 - [c15]Dawen Xu, Rangding Wang, Jicheng Wang:
Low complexity video watermarking algorithm by exploiting CAVLC in H.264/AVC. WCNIS 2010: 411-415
2000 – 2009
- 2009
- [j1]Diqun Yan
, Rangding Wang, Liguang Zhang:
Quantization Step Parity-based Steganography for MP3 Audio. Fundam. Informaticae 97(1-2): 1-14 (2009) - [c14]Yiqun Xiong, Rangding Wang:
A Robust Audio Aggregate Zero-Watermark Algorithm. ITNG 2009: 366-370 - [c13]Dawen Xu, Rangding Wang, Jicheng Wang:
Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video. IWDW 2009: 96-109 - 2008
- [c12]Yigiun Xiong, Rangding Wang:
An Audio Zero-Watermark Algorithm Combined DCT with Zernike Moments. CW 2008: 11-15 - [c11]Yuanyuan Hu, Rangding Wang:
Moving Shadow Removal Based on ILT. CW 2008: 127-130 - [c10]Jiaqiang Tan, Rangding Wang:
The Analysis of VLC-Coded Efficiency Based on MPEG-I Layer III Audio. CW 2008: 136-141 - [c9]Jiangbo Qian, Rangding Wang, Guang Jin, Yuan Li:
Breaking Boundaries among Hardware Curriculums by EDA Technology. ICYCS 2008: 2536-2540 - [c8]Diqun Yan
, Rangding Wang:
Reversible Data Hiding for Audio Based on Prediction Error Expansion. IIH-MSP 2008: 249-252 - [c7]Dawen Xu, Rangding Wang, Jicheng Wang:
Video Watermarking Based on Spatio-temporal JND Profile. IWDW 2008: 327-341 - 2007
- [c6]Rangding Wang, Wenji Hu:
Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation. IWDW 2007: 373-381 - 2005
- [c5]Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye, Yong-Deak Kim:
Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection. CIS (2) 2005: 935-940 - [c4]Gangyi Jiang, Liangzhong Fan, Mei Yu, Xien Ye, Rangding Wang, Yong-Deak Kim:
Fast Ray-Space Interpolation with Depth Discontinuity Preserving for Free Viewpoint Video System. PCM (1) 2005: 408-419 - [c3]Liangzhong Fan, Mei Yu, Gangyi Jiang, Rangding Wang, Yong-Deak Kim:
New Ray-Space Interpolation Method For Free Viewpoint Video System. PDCAT 2005: 684-688 - [c2]Mei Yu, Xien Ye, Rangding Wang, Fangming Xiao, Gangyi Jiang:
New Multiple Description Layered Coding Method For Video Communication. PDCAT 2005: 694-697 - [c1]Rangding Wang, Dawen Xu, Qian Li:
Audio Watermarking Algorithm Based on Wavelet Packet and Psychoacoustic Model. PDCAT 2005: 812-814
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint