default search action
Weixiang Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Weixiang Li, Binxin Wu:
Computational fluid dynamics investigation of pesticide spraying by agricultural drones. Comput. Electron. Agric. 227: 109506 (2024) - [j19]Weixiang Li, Binxin Wu:
Computational fluid dynamics investigation of aerodynamics for agricultural drones. Comput. Electron. Agric. 227: 109528 (2024) - [j18]Haijun Zhou, Weixiang Li, Ming Cheng, Yuan Sun:
Weighted Generalized Hesitant Fuzzy Sets and Its Application in Ensemble Learning. IEICE Trans. Inf. Syst. 107(5): 694-703 (2024) - [j17]Xulong Liu, Weixiang Li, Kaiqing Lin, Bin Li:
Spatial-Frequency Feature Fusion Network for Lightweight and Arbitrary-Sized JPEG Steganalysis. IEEE Signal Process. Lett. 31: 2585-2589 (2024) - [j16]Weixiang Li, Shihang Wu, Bin Li, Weixuan Tang, Xinpeng Zhang:
Payload-Independent Direct Cost Learning for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1970-1975 (2024) - [j15]Jiansong Zhang, Kejiang Chen, Weixiang Li, Weiming Zhang, Nenghai Yu:
Steganography With Generated Images: Leveraging Volatility to Enhance Security. IEEE Trans. Dependable Secur. Comput. 21(4): 3994-4005 (2024) - [j14]Bin Li, Jincheng Chen, Yuxiong Xu, Weixiang Li, Zhenghui Liu:
DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks. IEEE Trans. Inf. Forensics Secur. 19: 6529-6544 (2024) - [j13]Kaiqing Lin, Bin Li, Weixiang Li, Mauro Barni, Benedetta Tondi, Xulong Liu:
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment. IEEE Trans. Inf. Forensics Secur. 19: 9390-9405 (2024) - [c4]Jiaqi Hou, Shiyao Liu, Weixiang Li, Tiemeng Li:
FT Player - Oh! This is the Fourier Transform! VR Workshops 2024: 1098-1099 - [i3]Kaiqing Lin, Yuzhen Lin, Weixiang Li, Taiping Yao, Bin Li:
Standing on the Shoulders of Giants: Reprogramming Visual-Language Model for General Deepfake Detection. CoRR abs/2409.02664 (2024) - 2023
- [j12]Weixuan Tang, Bin Li, Weixiang Li, Yuangen Wang, Jiwu Huang:
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism. Sci. China Inf. Sci. 66(3) (2023) - [j11]Weixiang Li, Bin Li, Weiming Zhang, Shengli Zhang:
Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 18: 5026-5040 (2023) - 2022
- [j10]Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. IEEE Trans. Vis. Comput. Graph. 28(12): 5006-5025 (2022) - 2021
- [j9]Yaofei Wang, Weixiang Li, Weiming Zhang, Xinzhi Yu, Kunlin Liu, Nenghai Yu:
BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography. IEEE Trans. Circuits Syst. Video Technol. 31(5): 2082-2088 (2021) - [j8]Yaofei Wang, Weiming Zhang, Weixiang Li, Nenghai Yu:
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance. IEEE Trans. Inf. Forensics Secur. 16: 1117-1130 (2021) - [i2]Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu:
Three-Dimensional Mesh Steganography and Steganalysis: A Review. CoRR abs/2104.10203 (2021) - 2020
- [j7]Xinzhi Yu, Kejiang Chen, Yaofei Wang, Weixiang Li, Weiming Zhang, Nenghai Yu:
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain. Signal Process. 168 (2020) - [j6]Weixiang Li, Weiming Zhang, Li Li, Hang Zhou, Nenghai Yu:
Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes. IEEE Trans. Commun. 68(7): 3948-3962 (2020) - [j5]Weixiang Li, Wenbo Zhou, Weiming Zhang, Chuan Qin, Huanhuan Hu, Nenghai Yu:
Shortening the Cover for Fast JPEG Steganography. IEEE Trans. Circuits Syst. Video Technol. 30(6): 1745-1757 (2020) - [j4]Kejiang Chen, Hang Zhou, Weixiang Li, Kuan Yang, Weiming Zhang, Nenghai Yu:
Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2027-2032 (2020) - [j3]Weixiang Li, Kejiang Chen, Weiming Zhang, Hang Zhou, Yaofei Wang, Nenghai Yu:
JPEG Steganography With Estimated Side-Information. IEEE Trans. Circuits Syst. Video Technol. 30(7): 2288-2294 (2020) - [j2]Yaofei Wang, Weiming Zhang, Weixiang Li, Xinzhi Yu, Nenghai Yu:
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences. IEEE Trans. Inf. Forensics Secur. 15: 2081-2095 (2020) - [i1]Weixiang Li, Wei Jie, Somaiyeh Mahmoud Zadeh:
Single Image Dehazing Algorithm Based on Sky Region Segmentation. CoRR abs/2007.06492 (2020)
2010 – 2019
- 2019
- [j1]Wenbo Zhou, Weixiang Li, Kejiang Chen, Hang Zhou, Weiming Zhang, Nenghai Yu:
Controversial 'pixel' prior rule for JPEG adaptive steganography. IET Image Process. 13(1): 24-33 (2019) - [c3]Weixiang Li, Wei Jie, Somaiyeh Mahmoud Zadeh:
Single Image Dehazing Algorithm Based on Sky Region Segmentation. ADMA 2019: 489-500 - 2018
- [c2]Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Defining Joint Distortion for JPEG Steganography. IH&MMSec 2018: 5-16
2000 – 2009
- 2008
- [c1]Guiling Sun, Wenhe Yue, Bo Liu, Weixiang Li:
Design and Study of Distribution Map of a General Architecture for Wireless Sensor Networks Based on GDI+. CSSE (2) 2008: 444-447
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint