default search action
Weihai Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Fei Hu, Weihai Li, Nenghai Yu:
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability. Multim. Tools Appl. 83(14): 40713-40732 (2024) - [j13]Yue Yu, Zhe Zhao, Sian-Jheng Lin, Weihai Li:
Accelerating Huffman Encoding Using 512-Bit SIMD Instructions. IEEE Trans. Consumer Electron. 70(1): 554-563 (2024) - [c51]Zikai Xu, Bin Liu, Fei Hu, Weihai Li, Nenghai Yu:
DSIS: A Novel (K, N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery. ICASSP 2024: 3720-3724 - [c50]Zikai Xu, Bin Liu, Fei Hu, Weihai Li, Nenghai Yu:
SE-SIS: Shadow-Embeddable Lossless Secret Image Sharing for Greyscale Images. ICASSP 2024: 4775-4779 - 2022
- [j12]Changtao Miao, Qi Chu, Weihai Li, Suichan Li, Zhentao Tan, Wanyi Zhuang, Nenghai Yu:
Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection. IEEE Trans. Biom. Behav. Identity Sci. 4(1): 71-84 (2022) - [c49]Zhengyu Yue, Yuanzhi Yao, Weihai Li, Nenghai Yu:
ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage. ICC 2022: 3448-3453 - [c48]Boshen Shan, Yuanzhi Yao, Weihai Li, Xiaodong Zuo, Nenghai Yu:
Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control. TrustCom 2022: 1340-1347 - [i4]Qiankun Liu, Bin Liu, Yue Wu, Weihai Li, Nenghai Yu:
Real-time Online Multi-Object Tracking in Compressed Domain. CoRR abs/2204.02081 (2022) - [i3]Zhengyu Yue, Yuanzhi Yao, Weihai Li, Nenghai Yu:
ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage. CoRR abs/2205.02117 (2022) - 2021
- [j11]Zhentao Tan, Bin Liu, Qi Chu, Hangshi Zhong, Yue Wu, Weihai Li, Nenghai Yu:
Real Time Video Object Segmentation in Compressed Domain. IEEE Trans. Circuits Syst. Video Technol. 31(1): 175-188 (2021) - [c47]Aoran Lu, Weihai Li, Yuanzhi Yao, Nenghai Yu:
TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System. DSC 2021: 106-113 - [c46]Jiabin Zhang, Qi Chu, Weihai Li, Bin Liu, Weiming Zhang, Nenghai Yu:
Towards More Powerful Multi-column Convolutional Network for Crowd Counting. ICIG (1) 2021: 381-392 - [c45]Changtao Miao, Qi Chu, Weihai Li, Tao Gong, Wanyi Zhuang, Nenghai Yu:
Towards Generalizable and Robust Face Manipulation Detection via Bag-of-feature. VCIP 2021: 1-5 - [i2]Changtao Miao, Qi Chu, Weihai Li, Tao Gong, Wanyi Zhuang, Nenghai Yu:
Towards Generalizable and Robust Face Manipulation Detection via Bag-of-local-feature. CoRR abs/2103.07915 (2021) - 2020
- [c44]Zhu Chen, Weihai Li, Chi Fei, Bin Liu, Nenghai Yu:
Spatial-Temporal Feature Aggregation Network For Video Object Detection. ICASSP 2020: 1858-1862 - [c43]Fei Hu, Yuanzhi Yao, Weihai Li, Nenghai Yu:
A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code. ICAIS (2) 2020: 86-97 - [c42]Zhouping Cui, Weihai Li, Chaohai Yu, Nenghai Yu:
A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks. ICCSP 2020: 68-73 - [c41]Xueliang Li, Weihai Li, Yunxiao Zu:
Combined Method Based on Source Text and Representation for Text Enhancement. SSPS 2020: 61-68
2010 – 2019
- 2019
- [j10]Qiankun Liu, Bin Liu, Yue Wu, Weihai Li, Nenghai Yu:
Real-Time Online Multi-Object Tracking in Compressed Domain. IEEE Access 7: 76489-76499 (2019) - [j9]Xiaodan Li, Weihai Li, Bin Liu, Nenghai Yu:
Object and patch based anomaly detection and localization in crowded scenes. Multim. Tools Appl. 78(15): 21375-21390 (2019) - [j8]Changchong Lu, Weihai Li:
Ship Classification in High-Resolution SAR Images via Transfer Learning with Small Training Dataset. Sensors 19(1): 63 (2019) - [c40]Zhiwei Zhao, Bin Liu, Weihai Li, Nenghai Yu:
Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification. ICIG (1) 2019: 429-441 - [c39]Kun Zhao, Bin Liu, Luchuan Song, Weihai Li, Nenghai Yu:
Cascaded Residual Density Network for Crowd Counting. ICIP 2019: 2199-2203 - [c38]Yan Lu, Zheran Hong, Bin Liu, Weihai Li, Nenghai Yu:
Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion. ICIP 2019: 3935-3939 - [c37]Zhengtao Tan, Bin Liu, Weihai Li, Nenghai Yu:
Real Time Compressed Video Object Segmentation. ICME 2019: 628-633 - [c36]Wenfei Yang, Bin Liu, Weihai Li, Nenghai Yu:
Tracking Assisted Faster Video Object Detection. ICME 2019: 1750-1755 - [c35]Hangshi Zhong, Zhentao Tan, Bin Liu, Weihai Li, Nenghai Yu:
PPML: Metric Learning with Prior Probability for Video Object Segmentation. VCIP 2019: 1-4 - 2018
- [j7]Yan Lu, Bin Liu, Weihai Li, Nenghai Yu:
Fast Video Stitching for Aerially Captured HD Videos. Int. J. Image Graph. 18(3): 1850018:1-1850018:13 (2018) - [j6]Yao Wei, Weiming Zhang, Weihai Li, Nenghai Yu, Xi Sun:
Which gray level should be given the smallest cost for adaptive steganography? Multim. Tools Appl. 77(14): 17861-17874 (2018) - [c34]Xiaodan Li, Weihai Li, Bin Liu, Qiankun Liu, Nenghai Yu:
Object-Oriented Anomaly Detection in Surveillance Videos. ICASSP 2018: 1907-1911 - [c33]Guokun Wang, Bin Liu, Weihai Li, Nenghai Yu:
Flow Guided Siamese Network for Visual Tracking. ICIP 2018: 231-235 - [c32]Tao Gong, Bin Liu, Weihai Li, Nenghai Yu:
Pyramid Sub-Region Sensitive Network for Object Detection. ICIP 2018: 1303-1307 - [c31]Kun Zhao, Bin Liu, Weihai Li, Nenghai Yu, Zhiqiang Liu:
Anomaly Detection and Localization: A Novel Two-Phase Framework Based on Trajectory-Level Characteristics. ICME Workshops 2018: 1-6 - [c30]Huihui Zhu, Bin Liu, Yan Lu, Weihai Li, Nenghai Yu:
Real-time Anomaly Detection with HMOF Feature. ICVIP 2018: 49-54 - [c29]Zhu Chen, Weihai Li, Chi Fei, Bin Liu, Nenghai Yu:
Robust Anomaly Detection via Fusion of Appearance and Motion Features. VCIP 2018: 1-4 - [i1]Huihui Zhu, Bin Liu, Guojun Yin, Yan Lu, Weihai Li, Nenghai Yu:
Real-Time Anomaly Detection With HMOF Feature. CoRR abs/1812.04980 (2018) - 2017
- [j5]Xin Su, Weihai Li, Honggang Hu:
Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy. Multim. Tools Appl. 76(12): 14021-14033 (2017) - [j4]Kai Tan, Weihai Li:
Imaging and Parameter Estimating for Fast Moving Targets in Airborne SAR. IEEE Trans. Computational Imaging 3(1): 126-140 (2017) - [c28]Hanpei Yang, Weihai Li:
Hierarchical saliency optimization. ICASSP 2017: 1218-1222 - [c27]Ying Jia, Weihai Li:
Multi-occlusion handling in depth estimation of light fields. ICME Workshops 2017: 13-18 - [c26]Nianwang Wan, Zhenyu Duan, Yongdong Hua, Qingbin Wang, Weihai Li:
Nest Detection Using Coarse-to-Fine Searching Strategy. IFTC 2017: 503-512 - [c25]Hanpei Yang, Weihai Li:
Edge-Aware Saliency Detection via Novel Graph Model. PCM (2) 2017: 45-55 - 2016
- [c24]Huiling Wu, Weihai Li:
Robust online multi-object tracking based on KCF trackers and reassignment. GlobalSIP 2016: 124-128 - [c23]Qiang Li, Weihai Li, Huiling Wu, Liang Xu, Tonghuan Yu:
A speed-up seed point otsu method for ship detection in various scenarios. IGARSS 2016: 6421-6424 - [c22]Tonghuan Yu, Weihai Li:
3-D target height extraction via high squint airborne SAR. IGARSS 2016: 6661-6664 - [c21]Qiang Li, Weihai Li:
A Novel Framework for Anomaly Detection in Video Surveillance Using Multi-feature Extraction. ISCID (1) 2016: 455-459 - [c20]Liang Xu, Weihai Li, Huiling Wu, Qiang Li:
Online multi-object tracking based on global and local features. VCIP 2016: 1-4 - 2015
- [c19]Tonghuan Yu, Weihai Li:
A high squint airborne SAR imaging algorithm with low PRF. ChinaSIP 2015: 1076-1080 - [c18]Kai Tan, Weihai Li:
A novel moving parameter estimation approach offast moving targets based on phase extraction. ICIP 2015: 2075-2079 - 2014
- [c17]Chong Shen, Nenghai Yu, Weihai Li, Wei Zhou:
Moving object detection of dynamic scenes using spatio-temporal context and background modeling. WCSP 2014: 1-4 - 2013
- [c16]Ruohan Qian, Weihai Li, Nenghai Yu, Bin Liu:
High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance. ICIG 2013: 106-111 - [c15]Kai Jiang, Nenghai Yu, Weihai Li:
Online travel destination recommendation with efficient variable memory Markov model. ICME Workshops 2013: 1-4 - [c14]Ruohan Qian, Weihai Li, Nenghai Yu:
High precision rotation angle estimation for rotated images. ICME Workshops 2013: 1-4 - [c13]Weihai Li, Yunxiao Zu, Yue Jia:
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms. ICoC 2013: 31-39 - 2012
- [c12]Ruohan Qian, Weihai Li, Nenghai Yu, Zhuo Hao:
Image Forensics with Rotation-Tolerant Resampling Detection. ICME Workshops 2012: 61-66 - [c11]Weihai Li, Yupeng Yan, Nenghai Yu:
Breaking row-column shuffle based image cipher. ACM Multimedia 2012: 1097-1100 - 2011
- [c10]Shijia Gu, Yueyang Song, Xin Zhao, Weihai Li:
Fuzzing test data generation based on message matrix perturbation with keyword reference. MILCOM 2011: 1115-1120 - [c9]Shijia Gu, Weihai Li, Xin Zhao:
Brute Force Vulnerability Testing Technology Based on Data Mutation. VTC Fall 2011: 1-6 - 2010
- [c8]Weihai Li, Nenghai Yu:
Rotation robust detection of copy-move forgery. ICIP 2010: 2113-2116 - [c7]Ming Liu, Nenghai Yu, Weihai Li:
Camera Model Identification for JPEG Images via Tensor Analysis. IIH-MSP 2010: 462-465 - [c6]Weihai Li, Nenghai Yu, Yuan Yuan:
Identifying camera and processing from cropped JPEG photos via tensor analysis. SMC 2010: 3889-3895
2000 – 2009
- 2009
- [j3]Weihai Li, Yuan Yuan, Nenghai Yu:
Passive detection of doctored JPEG image via block artifact grid extraction. Signal Process. 89(9): 1821-1829 (2009) - [c5]Weihai Li, Yan Ma, Qing Ma, Xiaohong Huang:
Dynamic Dictionary Design for SIP Signaling Compression. CSIE (1) 2009: 448-451 - [c4]Weihai Li, Nenghai Yu:
A robust chaos-based image encryption scheme. ICME 2009: 1034-1037 - [c3]Weihai Li, Yuan Yuan:
Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift. SMC 2009: 3694-3698 - 2008
- [c2]Weihai Li, Nenghai Yu, Yuan Yuan:
Doctored JPEG image detection. ICME 2008: 253-256 - 2007
- [j2]Weihai Li, Yuan Yuan:
A leak and its remedy in JPEG image encryption. Int. J. Comput. Math. 84(9): 1367-1378 (2007) - [j1]Weihai Li, Yuan Yuan:
A New Blind Attack Procedure for DCT-Based Image Encryption with Spectrum Learning. Int. J. Image Graph. 7(3): 481-496 (2007) - 2006
- [c1]Weihai Li, Yuan Yuan:
Visual Information Encryption in Frequency Domain: Risk and Enhancement. IWICPAS 2006: 225-234
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint