关注
Zhihui Wang
Zhihui Wang
在 dlut.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Accurate monocular 3d object detection via color-embedded 3d reconstruction for autonomous driving
X Ma, Z Wang, H Li, P Zhang, W Ouyang, X Fan
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
1732019
Optimizing least-significant-bit substitution using cat swarm optimization strategy
ZH Wang, CC Chang, MC Li
Information Sciences 192, 98-108, 2012
1172012
User-guided deep anime line art colorization with conditional adversarial networks
Y Ci, X Ma, Z Wang, H Li, Z Luo
Proceedings of the 26th ACM international conference on Multimedia, 1536-1544, 2018
752018
Histogram-shifting-imitated reversible data hiding
ZH Wang, CF Lee, CY Chang
Journal of systems and software 86 (2), 315-323, 2013
662013
A sudoku-based secret image sharing scheme with reversibility
CC Chang, PY Lin, ZH Wang, M Li
J. Commun. 5 (1), 5-12, 2010
582010
A new data hiding scheme based on DNA sequence
C Guo, CC Chang, ZH Wang
Int. J. Innov. Comput. Inf. Control 8 (1), 139-149, 2012
482012
Emoticon-based text steganography in chat
ZH Wang, TD Kieu, CC Chang, MC Li
2009 Asia-Pacific Conference on Computational Intelligence and Industrial …, 2009
382009
A reversible information hiding scheme using left–right and up–down chinese character representation
ZH Wang, CC Chang, CC Lin, MC Li
Journal of Systems and Software 82 (8), 1362-1369, 2009
372009
Weakly supervised fine-grained image classification via guassian mixture model oriented discriminative learning
Z Wang, S Wang, S Yang, H Li, J Li, Z Li
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
342020
Sharing a secret image in binary images with verification
Z Wang, CC Chang, HN Tu, MC Li
Journal of Information Hiding and Multimedia Signal Processing 2 (1), 78-90, 2011
342011
A magic cube based information hiding scheme of large payload
Q Wu, C Zhu, JJ Li, CC Chang, ZH Wang
Journal of Information Security and Applications 26, 1-7, 2016
312016
A Simple Password Authentication Scheme Based on Geometric Hashing Function.
X Zhuang, CC Chang, ZH Wang, Y Zhu
Int. J. Netw. Secur. 16 (4), 271-277, 2014
312014
Secure key transfer protocol based on secret sharing for group communications
CY Lee, ZH Wang, L Harn, CC Chang
IEICE TRANSACTIONS on Information and Systems 94 (11), 2069-2076, 2011
292011
Graph-propagation based correlation learning for weakly supervised fine-grained image classification
Z Wang, S Wang, H Li, Z Dou, J Li
Proceedings of the AAAI Conference on Artificial Intelligence 34 (07), 12289 …, 2020
282020
An encoding method for both image compression and data lossless information hiding
ZH Wang, CC Chang, KN Chen, MC Li
Journal of Systems and Software 83 (11), 2073-2082, 2010
282010
Sparse dual graph-regularized NMF for image co-clustering
J Sun, Z Wang, F Sun, H Li
Neurocomputing 316, 156-165, 2018
252018
Weakly supervised fine-grained image classification via correlation-guided discriminative learning
Z Wang, S Wang, P Zhang, H Li, W Zhong, J Li
Proceedings of the 27th ACM International Conference on Multimedia, 1851-1860, 2019
242019
Deep joint depth estimation and color correction from monocular underwater images based on unsupervised adaptation networks
X Ye, Z Li, B Sun, Z Wang, R Xu, H Li, X Fan
IEEE Transactions on Circuits and Systems for Video Technology 30 (11), 3995 …, 2019
232019
A Novel Information Concealing Method Based on Exploiting Modification Direction.
ZH Wang, The Duc Kieu, CC Chang, M Li
J. Inf. Hiding Multim. Signal Process. 1 (1), 1-9, 2010
222010
A high-performance reversible data-hiding scheme for LZW codes
ZH Wang, HR Yang, TF Cheng, CC Chang
Journal of Systems and Software 86 (11), 2771-2778, 2013
212013
系统目前无法执行此操作,请稍后再试。
文章 1–20
涓洪亸鍒舵伓鎰忔姄鍙栬涓,璇峰叧娉ㄥ叕浼楀彿鑾峰彇璁块棶鍙d护


浜岀淮鐮

寰俊鎵簩缁寸爜鍏虫敞鍏紬鍙凤紝鍙戦佲鍙d护鈥濊幏鍙

鎻愪氦

鎻愮ず锛氬彧闇姝g‘杈撳叆涓娆″彛浠わ紝璇ュ脊绐椾究涓嶅啀寮瑰嚭锛