dblp.uni-trier.dewww.uni-trier.de

Yun Q. Shi

Yun-Qing Shi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
99 Yun Q. Shi: Transactions on Data Hiding and Multimedia Security III Springer 2008
98EEYun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser: Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings Springer 2008
97 Haifeng Xiao, Chunhua Chen, Wei Su, John A. Kosinski, Yun Q. Shi: Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree. DMIN 2008: 3-9
96EEFangjun Huang, Yun Q. Shi, Jiwu Huang: A study on security performance of YASS. ICIP 2008: 2084-2087
95EEChunhua Chen, Yun Q. Shi, Wei Su: A machine learning based scheme for double JPEG compression detection. ICPR 2008: 1-4
94EEWen Chen, Yun Q. Shi, Guorong Xuan, Wei Su: Computer graphics identification using genetic algorithm. ICPR 2008: 1-4
93EEGuorong Xuan, Yun Q. Shi, Peiqi Chai, Xuefeng Tong, Jianzhong Teng, Jue Li: Reversible binary image data hiding by run-length histogram modification. ICPR 2008: 1-4
92EEChunhua Chen, Yun Q. Shi: JPEG image steganalysis utilizing both intrablock and interblock correlations. ISCAS 2008: 3029-3032
91EEBin Li, Yun Q. Shi, Jiwu Huang: Steganalysis of YASS. MM&Sec 2008: 139-148
90EEBin Li, Yun Q. Shi, Jiwu Huang: Detecting doubly compressed JPEG images by using Mode Based First Digit Features. MMSP 2008: 730-735
89EEZhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun, Xiao Lin: Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication. IEEE Trans. Circuits Syst. Video Techn. 18(4): 497-509 (2008)
2007
88 Yun Q. Shi: Transactions on Data Hiding and Multimedia Security II Springer 2007
87EEGuorong Xuan, Xiuming Zhu, Yun Q. Shi, Peiqi Chai, Xia Cui, Jue Li: A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. ICIAR 2007: 375-386
86EEGuorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai, Xia Cui, Xuefeng Tong: Reversible Data Hiding for JPEG Images Based on Histogram Pairs. ICIAR 2007: 715-727
85EEChunhua Chen, Yun Q. Shi, Guorong Xuan: Steganalyzing Texture Images. ICIP (2) 2007: 153-156
84EEWen Chen, Yun Q. Shi, Guorong Xuan: Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions. ICME 2007: 1123-1126
83EEGuorong Xuan, Xia Cui, Yun Q. Shi, Wen Chen, Xuefeng Tong, Cong Huang: JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. ICME 2007: 903-906
82EEYun Q. Shi, Chunhua Chen, Wen Chen, Maala P. Kaundinya: Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study. ISCAS 2007: 1265-1268
81EEShunquan Tan, Jiwu Huang, Yun Q. Shi: Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. IWDW 2007: 112-126
80EEBin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi: Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. IWDW 2007: 143-157
79EEYun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su: Steganalysis Versus Splicing Detection. IWDW 2007: 158-172
78EEGuorong Xuan, Yun Q. Shi, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong: Optimum Histogram Pair Based Image Lossless Data Embedding. IWDW 2007: 264-278
77EEYun Q. Shi, Chunhua Chen, Wen Chen: A natural image model approach to splicing detection. MM&Sec 2007: 51-62
2006
76 Yun-Qing Shi, Byeungwoo Jeon: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings Springer 2006
75 Yun Q. Shi: Transactions on Data Hiding and Multimedia Security I Springer 2006
74EEShunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi: Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. ICIP 2006: 101-104
73EEChunhua Chen, Yun Q. Shi, Wen Chen, Guorong Xuan: Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function. ICIP 2006: 105-108
72EEDekun Zou, Yun Q. Shi, Wei Su, Guorong Xuan: Steganalysis based on Markov Model of Thresholded Prediction-Error Image. ICME 2006: 1365-1368
71EEGuorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu: Feature Selection based on the Bhattacharyya Distance. ICPR (3) 2006: 1232-1235
70EEGuorong Xuan, Peiqi Chai, Xiuming Zhu, Qiuming Yao, Cong Huang, Yun Q. Shi, Dongdong Fu: A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA). ICPR (3) 2006: 320-323
69EEGuorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu: Feature Selection based on the Bhattacharyya Distance. ICPR (4) 2006: 957
68EEDongdong Fu, Yun Q. Shi, Wei Su: Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. IWDW 2006: 177-187
67EEGuorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi, Zhicheng Ni: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. IWDW 2006: 323-332
66EEGuorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai, Jianjiong Gao: Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). IWDW 2006: 49-60
65EEYun Q. Shi, Chunhua Chen, Wen Chen: A Markov Process Based Approach to Effective Attacking JPEG Steganography. Information Hiding 2006: 249-264
64EEDekun Zou, Yun Q. Shi, Zhicheng Ni, Wei Su: A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform. IEEE Trans. Circuits Syst. Video Techn. 16(10): 1294-1300 (2006)
63EEZhicheng Ni, Yun-Qing Shi, Nirwan Ansari, Wei Su: Reversible data hiding. IEEE Trans. Circuits Syst. Video Techn. 16(3): 354-362 (2006)
62EEHui Cheng, Xi Min Zhang, Yun Q. Shi, Anthony Vetro, Huifang Sun: Constant quality rate allocation for FGS coding using composite R-D analysis. IEEE Transactions on Multimedia 8(2): 405-407 (2006)
61EEHong Zhao, Nirwan Ansari, Yun Q. Shi: Network Traffic Prediction Using Least Mean Kurtosis. IEICE Transactions 89-B(5): 1672-1674 (2006)
2005
60EEGuorong Xuan, Yun Q. Shi, Chengyun Yang, Yizhan Zhen, Dekun Zou, Peiqi Chai, Peiqi Chai: Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. ICME 2005: 1520-1523
59EEYun Q. Shi, Guorong Xuan, Dekun Zou, Jianjiong Gao, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Wen Chen, Chunhua Chen: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. ICME 2005: 269-272
58EEZaihe Yu, Yun Q. Shi, Wei Su: Symbol-rate estimation based on filter bank. ISCAS (2) 2005: 1437-1440
57EEDekun Zou, Yun Q. Shi: Formatted text document data hiding robust to printing, copying and scanning. ISCAS (5) 2005: 4971-4974
56EEHong Zhao, Nirwan Ansari, Yun Q. Shi: Layered MPEG Video Transmission over IP DiffServ. ITCC (1) 2005: 63-67
55EEYun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen: Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC (1) 2005: 768-773
54EEXiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng: Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. IWDW 2005: 139-146
53EEGuorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen: Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. Information Hiding 2005: 262-277
52EEHongmei Liu, Jiwu Huang, Yun Q. Shi: Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss. Int. J. Image Graphics 5(1): 111-134 (2005)
51EEHaiping Lu, Yun Q. Shi, Alex C. Kot, Lihui Chen: Binary Image Watermarking Through Blurring, Biased Binarization. Int. J. Image Graphics 5(1): 67-88 (2005)
50EEYun Q. Shi: Guest Editorial. VLSI Signal Processing 41(3): 243-244 (2005)
49EEMingui Sun, Yun Q. Shi, Qiang Liu, Robert J. Sclabassi: Data Integration for Medical Information Management. VLSI Signal Processing 41(3): 319-328 (2005)
2004
48EEXiangui Kang, Jiwu Huang, Yun Q. Shi: Improve robustness of image watermarking via adaptive receiving. ICIP 2004: 2343-2346
47EEJiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi: Improve security of fragile watermarking via parameterized wavelet. ICIP 2004: 721-724
46 Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun, Xiao Lin: Robust lossless image data hiding. ICME 2004: 2199-2202
45 Zhishou Zhang, Gang Qiu, Qibin Sun, Xiao Lin, Zhicheng Ni, Yun Q. Shi: A unified authentication framework for JPEG2000. ICME 2004: 915-918
44 Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Jidong Chen, Chengyun Yang, Yizhan Zhen, Junxiang Zheng: High capacity lossless data hiding based on integer wavelet transform. ISCAS (2) 2004: 29-32
43 Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changyin Liang, Guorong Xuan: Lossless data hiding: fundamentals, algorithms and applications. ISCAS (2) 2004: 33-36
42 Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi: Self-synchronized audio watermark in DWT domain. ISCAS (5) 2004: 712-715
41EEYun Q. Shi: Reversible Data Hiding. IWDW 2004: 1-12
40EEGuorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni: Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique. IWDW 2004: 115-124
39EEGuorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liu Liansheng, Bai Weichao: A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. IWDW 2004: 55-65
38EEXi Min Zhang, Yan Qiu Chen, Nirwan Ansari, Yun Q. Shi: Mini-max initialization for function approximation. Neurocomputing 57: 389-409 (2004)
2003
37EEZhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su: Reversible data hiding. ISCAS (2) 2003: 912-915
36EEHongmei Liu, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi: A high capacity distortion-free data hiding algorithm for palette image. ISCAS (2) 2003: 916-919
35EEYun Q. Shi, Zhicheng Ni, Nirwan Ansari, Jiwu Huang: 2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. ISCAS (2) 2003: 924-927
34EEYanmei Fang, Jiwu Huang, Yun Q. Shi: Image watermarking algorithm applying CDMA. ISCAS (2) 2003: 948-951
33EELimin Gu, Jiwu Huang, Yun Q. Shi: Analysis of the role played by error correcting coding in robust watermarking. ISCAS (3) 2003: 798-801
32EEHong Zhao, Nirwan Ansari, Yun Q. Shi: Self-similar Traffic Prediction Using Least Mean Kurtosis. ITCC 2003: 352-355
31EEXiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu: Robust Watermarking with Adaptive Receiving. IWDW 2003: 396-407
30 Xi Min Zhang, Anthony Vetro, Yun Q. Shi, Huifang Sun: Constant quality constrained rate allocation for FGS-coded video. IEEE Trans. Circuits Syst. Video Techn. 13(2): 121-130 (2003)
29 Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Techn. 13(8): 776-786 (2003)
2002
28EEHaiping Lu, Jian Wang, Alex C. Kot, Yun Q. Shi: An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio. ICPR (4) 2002: 239-242
27 Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot, Lihui Chen: Watermark embedding in DC components of DCT for binary images. IEEE Workshop on Multimedia Signal Processing 2002: 300-303
26 Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su: Lossless data hiding based on integer wavelet transform. IEEE Workshop on Multimedia Signal Processing 2002: 312-315
25 Constantine N. Manikopoulos, Yun-Qing Shi, Sui Song, Zheng Zhang, Zhicheng Ni, Dekun Zou: Detection of block DCT-based steganography in gray-scale images. IEEE Workshop on Multimedia Signal Processing 2002: 355-358
24 Mingui Sun, Yun-Qing Shi, Qiang Liu, Robert J. Sclabassi: Sample domain integration of medical data for multimedia diagnosis. IEEE Workshop on Multimedia Signal Processing 2002: 363-366
23EEX. Zhang, Yun Q. Shi, Hangjun Chen, Alexander M. Haimovich, Anthony Vetro, Huifang Sun: Successive packing based interleaver design for turbo codes. ISCAS (1) 2002: 17-20
22EEHong Zhao, Nirwan Ansari, Yun Q. Shi: A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction. ITCC 2002: 54-58
21EEJunquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi: A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. IWDW 2002: 179-188
20EEXiangui Kang, Jiwu Huang, Yun Q. Shi: An Image Watermarking Algorithm Robust to Geometric Distortion. IWDW 2002: 212-223
19 Xi Min Zhang, Anthony Vetro, Yun-Qing Shi, Huifang Sun: Constant-quality constrained-rate allocation for FGS video coded bitstreams. VCIP 2002: 817-827
18 Jiwu Huang, Yun Q. Shi: Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Techn. 12(10): 916- (2002)
2001
17EEZhen Guo, Xi Min Zhang, Jacob Savir, Yun-Qing Shi: On Test and Characterization of Analog Linear Time-Invariant Circuits Using Neural Networks. Asian Test Symposium 2001: 338-343
16EEJiwu Huang, Yun Q. Shi: Embedding gray level images. ISCAS (5) 2001: 239-242
15EEHai Liu, Nirwan Ansari, Yun Q. Shi: On-Line Dynamic Bandwidth Allocation For Vbr Video Transmission. ITCC 2001: 354-358
14EEHai Liu, Nirwan Ansari, Yun Q. Shi: Modeling MPEG Coded Video Traffic by Markov-Modulated Self-Similar Processes. VLSI Signal Processing 29(1-2): 101-113 (2001)
2000
13 Hai Liu, Nirwan Ansari, Yun Q. Shi: A Simple Model for MPEG Video Traffic. IEEE International Conference on Multimedia and Expo (I) 2000: 553-556
12 Zhicheng Ni, Eric Sung, Yun Q. Shi: Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform. IEEE International Conference on Multimedia and Expo (II) 2000: 1033-1036
11 George F. Elmasry, Yun Q. Shi: 3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences. IEEE International Conference on Multimedia and Expo (II) 2000: 1037-
10 George F. Elmasry, Yun Q. Shi: 2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images. IEEE International Conference on Multimedia and Expo (II) 2000: 731-734
9EEHai Liu, Nirwan Ansari, Yun Q. Shi: Dynamic Bandwidth Allocation for VBR Video Traffic Based on Scene Change Identification. ITCC 2000: 284-288
8 Jiwu Huang, Yun Q. Shi, Yi Shi: Embedding image watermarks in dc components. IEEE Trans. Circuits Syst. Video Techn. 10(6): 974-979 (2000)
1999
7 Hai Liu, Nirwan Ansari, Yun Q. Shi: MPEG Video Traffic Models: Sequentially Modulated Self-Similar Processes. Broadband Communications 1999: 63-72
1998
6EEJ. N. Pan, Yun Q. Shi, Chang-Qing Shu: Correlation-feedback technique in optical flow determination. IEEE Transactions on Image Processing 7(7): 1061-1067 (1998)
1994
5 J. N. Pan, Yun Q. Shi, Chang-Qing Shu: A Kalman Filter in Motion Analysis from Stereo Image Sequences. ICIP (3) 1994: 63-67
4 J. N. Pan, Yun Q. Shi, Chang-Qing Shu: Correlation-feedback Approach to Computation of Optical Flow. ISCAS 1994: 33-36
3EEYun Q. Shi, Chang-Qing Shu, J. N. Pan: Unified optical flow field approach to motion analysis from a sequence of stereo images. Pattern Recognition 27(12): 1577-1590 (1994)
1993
2EEChang-Qing Shu, Yun Q. Shi: Direct recovering of Nth order surface structure using unified optical flow field. Pattern Recognition 26(8): 1137-1148 (1993)
1991
1EEChang-Qing Shu, Yun Q. Shi: On unified optical flow field. Pattern Recognition 24(6): 579-586 (1991)

Coauthor Index

1Nirwan Ansari [7] [9] [13] [14] [15] [22] [32] [35] [37] [38] [46] [56] [61] [63] [89]
2Peiqi Chai [53] [55] [59] [60] [66] [67] [69] [70] [71] [78] [86] [87] [93]
3Chunhua Chen [53] [55] [59] [65] [73] [77] [79] [82] [85] [92] [95] [97]
4Hangjun Chen [23]
5Jidong Chen [26] [44]
6Lihui Chen [27] [51]
7Wen Chen [53] [55] [59] [65] [73] [77] [82] [83] [84] [94]
8Yan Qiu Chen [38]
9Hui Cheng [62]
10Xia Cui [78] [83] [86] [87]
11George F. Elmasry [10] [11]
12Yanmei Fang [34]
13Dongdong Fu [66] [68] [69] [70] [71]
14Jianjiong Gao [53] [55] [59] [66] [67]
15Limin Gu [33]
16Zhen Guo [17]
17Alexander M. Haimovich [23]
18Junquan Hu [21] [47]
19Cong Huang [66] [70] [83]
20Daren Huang [21] [42] [47]
21Fangjun Huang [80] [96]
22Jiwu Huang [8] [16] [18] [20] [21] [29] [31] [33] [34] [35] [36] [42] [47] [48] [52] [54] [74] [80] [81] [90] [91] [96]
23Byeungwoo Jeon [76]
24Xiangui Kang [20] [29] [31] [48] [54]
25Stefan Katzenbeisser [98]
26Maala P. Kaundinya [82]
27Hyoung-Joong Kim [98]
28John A. Kosinski [97]
29Alex ChiChung Kot (Alex C. Kot) [27] [28] [51]
30Bin Li [80] [90] [91]
31Jue Li [87] [93]
32Changyin Liang [43]
33Liu Liansheng [39]
34Xiao Lin [45] [46] [89]
35Yan Lin [29]
36Hai Liu [7] [9] [13] [14] [15]
37Hongmei Liu [36] [52]
38Qiang Liu [24] [49]
39Haiping Lu [27] [28] [51]
40Constantine N. Manikopoulos [25]
41Zhicheng Ni [12] [25] [26] [35] [37] [40] [43] [44] [45] [46] [63] [64] [67] [78] [86] [89]
42J. N. Pan [3] [4] [5] [6]
43Gang Qiu [45]
44Jacob Savir [17]
45Robert J. Sclabassi [24] [49]
46Xuxia Shi [27]
47Yi Shi [8]
48Chang-Qing Shu [1] [2] [3] [4] [5] [6]
49Sui Song [25]
50Wei Su [26] [37] [46] [58] [63] [64] [68] [72] [79] [89] [94] [95] [97]
51Huifang Sun [19] [23] [30] [62]
52Mingui Sun [24] [49]
53Qibin Sun [45] [46] [89]
54Eric Sung [12]
55Shunquan Tan [74] [80] [81]
56Jianzhong Teng [93]
57Xuefeng Tong [78] [83] [86] [93]
58Anthony Vetro [19] [23] [30] [62]
59Jian Wang [28]
60Bai Weichao [39]
61Shaoquan Wu [42]
62Huang Xialing [36]
63Haifeng Xiao [97]
64Guorong Xuan [26] [39] [40] [43] [44] [53] [55] [59] [60] [66] [67] [69] [70] [71] [72] [73] [78] [79] [83] [84] [85] [86] [87] [93] [94]
65Chengyun Yang [39] [40] [44] [53] [55] [59] [60] [67]
66Zhihua Yang [74]
67Qiuming Yao [67] [70]
68Zaihe Yu [58]
69Wenjun Zeng [54]
70X. Zhang [23]
71Xi Min Zhang [17] [19] [30] [38] [62]
72Zheng Zhang [25]
73Zhenping Zhang [53] [55] [59] [69] [71]
74Zhishou Zhang [45]
75Hong Zhao [22] [32] [56] [61]
76Zhang Zhefeng [36]
77Yizhan Zhen [40] [44] [60]
78Junxiang Zheng [39] [44]
79Jiang Zhu [26]
80Jianxiang Zhu [31]
81Xiuming Zhu [66] [69] [70] [71] [87]
82Dekun Zou [25] [39] [43] [53] [55] [57] [59] [60] [64] [72]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)