default search action
Zhenghui Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Junjie He, Pei Zhu, Zhenghui Liu, Yi Cao:
A Novel Digital Audio Encryption and Forensics Watermarking Scheme. IEEE Access 12: 103565-103582 (2024) - [j23]Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu:
A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers. Int. J. Digit. Crime Forensics 16: 1-13 (2024) - [j22]Zhenghui Liu, Yi Cao, Kejia Lin:
A watermarking-based authentication and recovery scheme for encrypted audio. Multim. Tools Appl. 83(4): 10969-10987 (2024) - [j21]Bin Li, Jincheng Chen, Yuxiong Xu, Weixiang Li, Zhenghui Liu:
DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks. IEEE Trans. Inf. Forensics Secur. 19: 6529-6544 (2024) - 2023
- [j20]Hejun Xuan, Yi Zhou, Xuelin Zhao, Zhenghui Liu:
Multi-agent deep reinforcement learning algorithm with self-adaption division strategy for VNF-SC deployment in SDN/NFV-Enabled Networks. Appl. Soft Comput. 138: 110189 (2023) - [j19]Junjie He, Zhenghui Liu, Kejia Lin, Qing Qian:
A novel audio watermarking algorithm robust against recapturing attacks. Multim. Tools Appl. 82(12): 18599-18616 (2023) - [c11]Chuanshuai Deng, Chenjing Zhao, Zhenghui Liu, Jiexin Zhang, Yunlong Wu, Yanzhen Wang, Hong Cheng, Xiaodong Yi:
Learning Behavior Trees by Evolution-Inspired Approaches. GECCO Companion 2023: 275-278 - [c10]Chenjing Zhao, Chuanshuai Deng, Zhenghui Liu, Jiexin Zhang, Yunlong Wu, Yanzhen Wang, Xiaodong Yi:
Interpretable Reinforcement Learning of Behavior Trees. ICMLC 2023: 492-499 - 2022
- [c9]Hejun Xuan, Lidan Lin, Zhenghui Liu, Xuelin Zhao:
Load balance and time delay efficient algorithm for VNF service chain deployment based on DQN. CIS 2022: 440-444 - [c8]Kunchi Liu, Siheng Li, Zhenghui Liu, Fusang Zhang, Beihong Jin:
Towards Safer Transporting in Resilient Cities: Risk Assessment and Path Planning. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1603-1610 - 2021
- [j18]Hejun Xuan, Xuelin Zhao, Lei You, Zhenghui Liu, Yanling Li:
Multiobjective Model and Improved Artificial Raindrop Algorithm for Virtual Network Mapping. Mob. Inf. Syst. 2021: 5542670:1-5542670:10 (2021) - [j17]Hejun Xuan, Xuelin Zhao, Zhenghui Liu, Jianwei Fan, Yanling Li:
Energy Efficiency Opposition-Based Learning and Brain Storm Optimization for VNF-SC Deployment in IoT. Wirel. Commun. Mob. Comput. 2021: 6651112:1-6651112:9 (2021) - 2020
- [j16]Hongzhou Yue, Shuilong He, Zhenghui Liu:
Social Media Users Send Promotional Links to Strangers: Legitimate Promotion or Security Vulnerability? IEEE Access 8: 41705-41718 (2020) - [j15]Pan Zou, Lijin Duan, Shasha Zhang, Xue Bai, Zhenghui Liu, Fengmei Jin, Haibo Sun, Wentao Xu, Rui Chen:
Target Specificity of the CRISPR-Cas9 System in Arabidopsis thaliana, Oryza sativa, and Glycine max Genomes. J. Comput. Biol. 27(10): 1544-1552 (2020) - [j14]Zhenghui Liu, Yancong Yang, Da Luo, Chuanda Qi:
Speech watermarking robust against recapturing and de-synchronization attacks. Multim. Tools Appl. 79(9-10): 6009-6024 (2020) - [c7]Da Luo, Wenqing Cheng, Huaqiang Yuan, Weiqi Luo, Zhenghui Liu:
Compression Detection of Audio Waveforms Based on Stacked Autoencoders. ICAIS (2) 2020: 393-404
2010 – 2019
- 2019
- [j13]Zhenghui Liu, Yuankun Huang, Jiwu Huang:
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. IEEE Trans. Inf. Forensics Secur. 14(5): 1171-1180 (2019) - 2018
- [j12]Ran Li, Yongfeng Lv, Zhenghui Liu:
Multi-Scheme Frame Rate Up-Conversion Using Space-Time Saliency. IEEE Access 6: 1905-1915 (2018) - [j11]Ran Li, Zhenghui Liu, Yu Zhang, Yanling Li, Zhangjie Fu:
Noise-level estimation based detection of motion-compensated frame interpolation in video sequences. Multim. Tools Appl. 77(1): 663-688 (2018) - [j10]Ran Li, Wei He, Zhenghui Liu, Yanling Li, Zhangjie Fu:
Saliency-based adaptive compressive sampling of images using measurement contrast. Multim. Tools Appl. 77(10): 12139-12156 (2018) - [c6]Zhenghui Liu, Yanli Li, Fang Sun, Junjie He, Chuanda Qi, Da Luo:
A Robust Recoverable Algorithm Used for Digital Speech Forensics Based on DCT. ICCCS (6) 2018: 300-311 - [c5]Zhenghui Liu, Bin Wang, Changjun Zhou, Xiaopeng Wei, Qiang Zhang, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng:
An Improved Iterated Hybrid Search for DNA Codes Design. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 99-105 - 2017
- [j9]Fang Sun, Zhenghui Liu, Chuanda Qi:
Speech Content Authentication Scheme based on High-Capacity Watermark Embedding. Int. J. Digit. Crime Forensics 9(2): 1-14 (2017) - [j8]Zhenghui Liu, Jiwu Huang, Xingming Sun, Chuanda Qi:
A security watermark scheme used for digital speech forensics. Multim. Tools Appl. 76(7): 9297-9317 (2017) - [j7]Zhenghui Liu, Da Luo, Jiwu Huang, J. Wang, Chuanda Qi:
Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multim. Tools Appl. 76(10): 12481-12504 (2017) - [j6]Ran Li, Hongbing Liu, Zhenghui Liu, Yanling Li, Zhangjie Fu:
Motion-compensated frame interpolation using patch-based sparseland model. Signal Process. Image Commun. 54: 36-48 (2017) - [c4]Zhenghui Liu, Lixiang Liu, Jianzhou Chen:
Two-scale geographic back-pressure algorithm for deep space networks. ICIS 2017: 51-56 - [c3]Zhenghui Liu, Bin Wang, Changjun Zhou, Xiaopeng Wei, Qiang Zhang:
A Modified Shuffled Frog Leaping Algorithm for Constructing DNA Codes. ISICA (1) 2017: 269-278 - 2016
- [j5]Zhenghui Liu, Fan Zhang, Jing Wang, Hongxia Wang, Jiwu Huang:
Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process. 123: 157-166 (2016) - 2015
- [j4]Fan Zhang, Zhenghui Liu, Hongxia Wang:
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform. Int. J. Digit. Crime Forensics 7(3): 19-36 (2015) - [c2]Jing Wang, Zhenghui Liu, Junjie He, Chuanda Qi:
An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT. IWDW 2015: 206-219 - 2014
- [j3]Zhenghui Liu, Hongxia Wang:
A novel speech content authentication algorithm based on Bessel-Fourier moments. Digit. Signal Process. 24: 197-208 (2014) - [j2]Zhenghui Liu, Hong-Xia Wang:
Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack. Multim. Tools Appl. 70(3): 2271-2291 (2014) - 2013
- [j1]Zhenghui Liu, Hongxia Wang:
A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain. Int. J. Digit. Crime Forensics 5(3): 15-34 (2013) - 2012
- [c1]Zhenghui Liu, Hongxia Wang:
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree. IWDW 2012: 311-326
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint