default search action
Zhenyu Li 0004
Person information
- affiliation: University of York, Department of Computer Science, UK
- affiliation (former): Zhengzhou Institute of Information Science and Technology, China
Other persons with the same name
- Zhenyu Li — disambiguation page
- Zhenyu Li 0001 — Chinese Academy Sciences, Institute of Computing Technology, Beijing, China
- Zhenyu Li 0002 — Harbin Institute of Technology, State Key Laboratory of Robotics and System, China
- Zhenyu Li 0003 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Zhenyu Li 0005 (aka: Anthony Zhenyu Li) — University of Warwick, Department of Computer Science, Coventry, UK
- Zhenyu Li 0006 — Wuhan University of Science and Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Wentong Fan, Zhenyu Li, Hao Li, Yi Zhang, Xiangyang Luo:
SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis. IET Image Process. 17(10): 2894-2906 (2023) - [j12]Lei Tan, Daofu Gong, Jinmao Xu, Zhenyu Li, Fenlin Liu:
Meta-path fusion based neural recommendation in heterogeneous information networks. Neurocomputing 529: 236-248 (2023) - [j11]Chun Mao, Zhenyu Li, Mingliang Zhang, Yi Zhang, Xiangyang Luo:
A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments. IEEE Trans. Consumer Electron. 69(3): 568-580 (2023) - [j10]Lei Tan, Daofu Gong, Zhenyu Li, Shaoyong Du, Fenlin Liu:
Neural Attention Networks for Recommendation With Auxiliary Data. IEEE Trans. Netw. Serv. Manag. 20(2): 1125-1139 (2023) - [c10]Haoyu Lu, Daofu Gong, Zhenyu Li, Feng Liu, Fenlin Liu:
BotCS: A Lightweight Model for Large-Scale Twitter Bot Detection Comparable to GNN-Based Models. ICC 2023: 2870-2876 - 2022
- [j9]Yilong Wang, Zhenyu Li, Daofu Gong, Haoyu Lu, Fenlin Liu:
Image fragile watermarking algorithm based on deneighbourhood mapping. IET Image Process. 16(10): 2652-2664 (2022) - [j8]Mingliang Zhang, Zhenyu Li, Pei Zhang, Yi Zhang, Xiangyang Luo:
A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks. Symmetry 14(1): 111 (2022) - [c9]Yilong Wang, Daofu Gong, Zhenyu Li, Fenlin Liu:
A Fragile Watermarking Algorithm Based on Multiple Watermarking. IVSP 2022: 48-55 - [i2]Yilong Wang, Zhenyu Li, Daofu Gong, Haoyu Lu, Fenlin Liu:
Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping. CoRR abs/2201.10272 (2022) - 2021
- [c8]Zhenyu Li, Daofu Gong, Lei Tan, Xiangyang Luo, Fenlin Liu, Adrian G. Bors:
Self-embedding watermarking method for G-code used in 3D printing. WIFS 2021: 1-6 - 2020
- [j7]Zhenyu Li, Adrian G. Bors:
Steganalysis of meshes based on 3D wavelet multiresolution analysis. Inf. Sci. 522: 164-179 (2020) - [j6]Yi Zhang, Xiangyang Luo, Xiaodong Zhu, Zhenyu Li, Adrian G. Bors:
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes. J. Real Time Image Process. 17(1): 115-123 (2020) - [j5]Lei Tan, Chunfang Yang, Fenlin Liu, Xiangyang Luo, Baojun Qi, Zhenyu Li:
Steganalysis of homogeneous-representation based steganography for high dynamic range images. Multim. Tools Appl. 79(27-28): 20079-20105 (2020) - [j4]Zhenyu Li, Adrian G. Bors:
Selection of Robust and Relevant Features for 3-D Steganalysis. IEEE Trans. Cybern. 50(5): 1989-2001 (2020)
2010 – 2019
- 2019
- [j3]Jicang Lu, Gang Zhou, Chunfang Yang, Zhenyu Li, Mingjing Lan:
Steganalysis of Content-Adaptive Steganography Based on Massive Datasets Pre-Classification and Feature Selection. IEEE Access 7: 21702-21711 (2019) - [c7]Yuanyuan Ma, Xiangyang Luo, Zhenyu Li, Yi Zhang, Adrian G. Bors:
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion. ACM TUR-C 2019: 66:1-66:5 - 2018
- [b1]Zhenyu Li:
Steganalytic methods for 3D objects. University of York, UK, 2018 - [c6]Zhenyu Li, Fenlin Liu, Adrian G. Bors:
3D Steganalysis Using Laplacian Smoothing at Various Levels. ICCCS (6) 2018: 223-232 - [c5]Zhenyu Li, Daofu Gong, Fenlin Liu, Adrian G. Bors:
3D Steganalysis Using the Extended Local Feature Set. ICIP 2018: 1683-1687 - 2017
- [j2]Zhenyu Li, Adrian G. Bors:
Steganalysis of 3D objects using statistics of local feature sets. Inf. Sci. 415: 85-99 (2017) - [c4]Zhenyu Li, Sebastien Beugnon, William Puech, Adrian G. Bors:
Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis. ICIP 2017: 510-414 - [i1]Zhenyu Li, Adrian G. Bors:
Steganalysis of 3D Objects Using Statistics of Local Feature Sets. CoRR abs/1702.07178 (2017) - 2016
- [c3]Zhenyu Li, Adrian G. Bors:
3D mesh steganalysis using local shape features. ICASSP 2016: 2144-2148 - [c2]Zhenyu Li, Adrian G. Bors:
Selection of robust features for the Cover Source Mismatch problem in 3D steganalysis. ICPR 2016: 4256-4261 - 2015
- [j1]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Zhenyu Li:
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion. KSII Trans. Internet Inf. Syst. 9(12): 5209-5228 (2015) - 2013
- [c1]Zhenyu Li, Zongyun Hu, Xiangyang Luo, Bin Lu:
Embedding change rate estimation based on ensemble learning. IH&MMSec 2013: 77-84
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint