default search action
Wan-Li Lyu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Lichun Tang, Zhaoxia Yin, Hang Su, Wanli Lyu, Bin Luo:
WFSS: weighted fusion of spectral transformer and spatial self-attention for robust hyperspectral image classification against adversarial attacks. Vis. Intell. 2(1) (2024) - [c14]Xiaochun Wu, Jiawang Zhang, Qi Yao, Wanli Lyu:
Reversible Data Hiding Based on Octree Partitioning and Arithmetic Coding in Encrypted Three-Dimensional Mesh Models. ICIC (9) 2024: 49-60 - 2023
- [j10]Wan-Li Lyu, Yajie Yue, Zhaoxia Yin:
Reversible data hiding based on automatic contrast enhancement using histogram expansion. J. Vis. Commun. Image Represent. 92: 103798 (2023) - [j9]Zhaoxia Yin, Li Chen, Wanli Lyu, Bin Luo:
Reversible attack based on adversarial perturbation and reversible data hiding in YUV colorspace. Pattern Recognit. Lett. 166: 1-7 (2023) - [c13]Yujie Yin, Heng Yin, Zhaoxia Yin, Wanli Lyu, Sha Wei:
High-Quality Triggers Based Fragile Watermarking for Optical Character Recognition Model. APSIPA ASC 2023: 468-475 - [c12]Wanli Lyu, Lulu Cheng, Zhaoxia Yin, Bin Luo:
Efficient Reversible Data Hiding for 3D Mesh Models Based on Multi-LSB Substitution and Ring-prediction. APSIPA ASC 2023: 1907-1914 - [c11]Wanli Lyu, Mengjiang Wu, Zhaoxia Yin, Bin Luo:
MAEDefense: An Effective Masked AutoEncoder Defense against Adversarial Attacks. APSIPA ASC 2023: 1915-1922 - [c10]Jiefei Zhang, Jie Wang, Wanli Lyu, Zhaoxia Yin:
Local Texture Complexity Guided Adversarial Attack. ICIP 2023: 2065-2069 - [c9]Youqing Fang, Jingwen Jia, Yuhai Yang, Wanli Lyu:
Improving Transferability Reversible Adversarial Examples Based on Flipping Transformation. ICPCSEE (1) 2023: 417-432 - [c8]Tong Zhu, Zhaoxia Yin, Wanli Lyu, Jiefei Zhang, Bin Luo:
Imperceptible Adversarial Attack on S Channel of HSV Colorspace. IJCNN 2023: 1-7 - [i2]Zhaoxia Yin, Shaowei Zhu, Hang Su, Jianteng Peng, Wanli Lyu, Bin Luo:
Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization. CoRR abs/2305.04436 (2023) - 2022
- [j8]Wan-Li Lyu, Lulu Cheng, Zhaoxia Yin:
High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Process. 201: 108686 (2022) - [c7]Shaowei Zhu, Wanli Lyu, Bin Li, Zhaoxia Yin, Bin Luo:
Adversarial Example Defense via Perturbation Grading Strategy. IFTC 2022: 407-420 - [c6]Yun Tang, Lulu Cheng, Wanli Lyu, Zhaoxia Yin:
High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology. IWDW 2022: 205-218 - [i1]Shaowei Zhu, Wanli Lyu, Bin Li, Zhaoxia Yin, Bin Luo:
Adversarial Example Defense via Perturbation Grading Strategy. CoRR abs/2212.08341 (2022)
2010 – 2019
- 2018
- [j7]Chin-Chen Chang, Ran Tang, Chia-Chen Lin, Wan-Li Lyu:
High-Capacity Reversible Data Hiding Method for JPEG Images. J. Softw. 13(1): 1-17 (2018) - 2016
- [j6]Feng Wang, Wan-Li Lyu, Jeng-Shyang Pan:
Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format. IET Image Process. 10(12): 971-978 (2016) - [j5]Wan-Li Lyu, Chin-Chen Chang:
An Image Compression Method Based on Block Truncation Coding and Linear Regression. J. Inf. Hiding Multim. Signal Process. 7(1): 198-215 (2016) - [j4]Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Image Authentication and Self-Recovery Scheme Based on The Rehashing Model. J. Inf. Hiding Multim. Signal Process. 7(3): 460-474 (2016) - [c5]Xue-Jing Li, Yu-Qi Feng, Wan-Li Lyu:
A High-Capacity Image Data Hiding Based on Extended EMD-2 Reference Matrix. IGTA 2016: 51-61 - [c4]Xue-Jing Li, Wan-Li Lyu, Jie Xie:
Image Content Authentication and Self-recovery Using Rehashing and Matrix Combined Method. IGTA 2016: 209-219 - [c3]Jing Sun, Wan-Li Lyu:
A Perfect Hash Model Used for Image Content Tamper Detection. IGTA 2016: 220-229 - 2015
- [j3]Wan-Li Lyu, Chin-Chen Chang, Feng Wang:
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method. J. Inf. Hiding Multim. Signal Process. 6(3): 523-533 (2015) - [j2]Wan-Li Lyu, Chin-Chen Chang, Yeh-Chieh Chou, Chia-Chen Lin:
Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication. J. Inf. Hiding Multim. Signal Process. 6(4): 686-696 (2015) - [j1]Feng Wang, Chin-Chen Chang, Wan-Li Lyu:
The credit card visual authentication scheme based on GF(28) field. Multim. Tools Appl. 74(24): 11451-11465 (2015) - [c2]You-Jing Lu, Wan-Li Lyu:
A novel high-capacity reversible data-hiding scheme using two steganographic images. BMEI 2015: 667-671 - [c1]Xiao-Juan Dong, Wan-Li Lyu:
A novel terraced field block based scheme for data hiding. BMEI 2015: 757-761
Coauthor Index
aka: Zhaoxia Yin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint