Follow
Zhen Li
Zhen Li
Verified email at i2r.a-star.edu.sg
Title
Cited by
Cited by
Year
Blind and Robust Audio Watermarking Scheme Based on SVD–DCT
BY Lei, IY Soon, Z Li
Signal Processing 91 (8), 1973-1984, 2011
2182011
A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition
B Lei, Y Soon, F Zhou, Z Li, H Lei
Signal processing 92 (9), 1985-2001, 2012
1822012
A Comparative Study of Mobile-based Landmark Recognition Techniques
KH Yap, T Chen, Z Li, K Wu
Intelligent Systems, IEEE 25 (1), 48-57, 2010
612010
Deepsim: Gps spoofing detection on uavs using satellite imagery matching
N Xue, L Niu, X Hong, Z Li, L Hoffaeller, C Pöpper
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
462020
A New Blind Robust Image Watermarking Scheme in SVD-DCT Composite Domain
Z Li, KH Yap, BY Lei
18th IEEE International Conference on Image Processing (ICIP), 2757-2760, 2011
462011
A Survey on Mobile Landmark Recognition for Information Retrieval
T Chen, K Wu, KH Yap, Z Li, FS Tsai
10-th International Conference on Mobile Data Management: Systems, Services …, 2009
392009
Pornographic images detection based on CBIR and skin analysis
B Liu, J Su, Z Lu, Z Li
International Conference on Semantics, Knowledge and Grid (SKG), 487-488, 2008
392008
Reversible Data Hiding for 3D Meshes in the PVQ-compressed Domain
Z Sun, ZM Lu, Z Li
International Conference on Intelligent Information Hiding and Multimedia …, 2006
302006
3D Mesh Model Coding, Streaming media architectures, techniques, and applications: Recent Advances
L Zhen
IGI Global, 2010
26*2010
Automatic fine-grained access control in SCADA by machine learning
L Zhou, C Su, Z Li, Z Liu, GP Hancke
Future Generation Computer Systems 93, 548--559, 2019
252019
High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain
ZM Lu, Z Li
7-th International Workshop on Digital Watermarking, 233-243, 2007
222007
Citrus disease recognition based on weighted scalable vocabulary tree
XL Deng, Z Li, XL Deng, TS Hong
Precision agriculture 15, 321-330, 2014
212014
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU
J Lu, Z Li, M Henricksen
Applied Cryptography and Network Security, 350-369, 2015
192015
Fast Codevector Search Scheme for 3D Mesh Model Vector Quantisation
Z Li, ZM Lu
Electronics Letters 44 (2), 104-105, 2008
192008
An Efficient Approach for Scene Categorization Based on Discriminative Codebook Learning in Bag-of-Words Framework
Z Li, KH Yap
Image and Vision Computing 31 (10), 748-755, 2013
142013
Efficient Mobile Landmark Recognition Based on Saliency-aware Scalable Vocabulary Tree
KH Yap, Z Li, DJ Zhang, ZK Ng
20th ACM International Conference on Multimedia, 1001-1004, 2012
142012
Content and context boosting for mobile landmark recognition
Z Li, KH Yap
IEEE Signal Processing Letters 19 (8), 459-462, 2012
142012
Multiple Object Tracking with GRU Association and Kalman Prediction
Z Li, S Cai, X Wang, H Shao, L Niu, N Xue
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
132021
Face Recognition via Local Preserving Average Neighborhood Margin Maximization and Extreme Learning Machine
X Chen, W Liu, J Lai, Z Li, C Lu
Soft Computing 16 (9), 1515-1523, 2012
132012
NLOS Mitigation Method for TDOA Measurement
H Jiang, J Xu, Z Li
6-th International Conference on Intelligent Information Hiding and …, 2010
132010
The system can't perform the operation now. Try again later.
Articles 1–20