dblp.uni-trier.dewww.uni-trier.de

Zhiquan Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
39EEHuimin Qian, Yaobin Mao, Wenbo Xiang, Zhiquan Wang: Home environment fall detection system based on a cascaded multi-SVM classifier. ICARCV 2008: 1567-1572
38EEXiaopeng Ji, Long Ge, Xiaodong Han, Zhiquan Wang: Wire-Sizing for Interconnect Performance Optimization Considering High Inductance Effects. ICNSC 2008: 1114-1118
37EEHe Huang, Xiaodong Han, Xiaopeng Ji, Zhiquan Wang: Fault-tolerant Control of Networked Control System with Packet Dropout and Transmission delays. ICNSC 2008: 325-329
36EEYuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao: Forgery-location highway monitoring systembased on video watermarking. ICNSC 2008: 625-629
35EEXiaodong Han, He Huang, Xiaopeng Ji, Zhiquan Wang: Output Feedback Satisfactory Fault-Tolerant Control of Uncertain Linear Discrete-Time Systems. ICNSC 2008: 671-676
34EEShiguo Lian, Zhiquan Wang: Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation. IEEE Trans. Circuits Syst. Video Techn. 18(10): 1462-1467 (2008)
33EEBenlian Xu, Qinglan Chen, Zhengyi Wu, Zhiquan Wang: Analysis and approximation of performance bound for two-observer bearings-only tracking. Inf. Sci. 178(8): 2059-2078 (2008)
32EEShiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang: Efficient video encryption scheme based on advanced video coding. Multimedia Tools Appl. 38(1): 75-89 (2008)
31EEJinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian: Locally optimum detection for Barni's multiplicative watermarking in DWT domain. Signal Processing 88(1): 117-130 (2008)
30EEBenlian Xu, Qinglan Chen, Zhiquan Wang: Ants for track initiation of bearings-only tracking. Simulation Modelling Practice and Theory 16(6): 626-638 (2008)
2007
29EEGuangjie Liu, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang: Image Steganography Based on Quantization-Embedders Combination. ICME 2007: 1115-1118
28EEHuimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang: Object Tracking with Self-updating Tracking Window. PAISI 2007: 82-93
27EEDengpan Ye, Changfu Zou, Yuewei Dai, Zhiquan Wang: A new adaptive watermarking for real-time MPEG videos. Applied Mathematics and Computation 185(2): 907-918 (2007)
26EEShiguo Lian, Jinsheng Sun, Zhiquan Wang: One-way Hash Function Based on Neural Network CoRR abs/0707.4032: (2007)
25EEDengfeng Zhang, Zhiquan Wang, Shousong Hu: Robust satisfactory fault-tolerant control of uncertain linear discrete-time systems: an LMI approach. Int. J. Systems Science 38(2): 151-165 (2007)
24EEBenlian Xu, Zhengyi Wu, Zhiquan Wang: On the Cramér-Rao lower bound for biased bearings-only maneuvering target tracking. Signal Processing 87(12): 3175-3189 (2007)
2006
23EEJinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang: Semi-Fragile Watermarking Authentication with Local and Global Watermarks. AIAI 2006: 681-688
22EEXueping Dong, Zhiquan Wang: Stability Analysis of Nonlinear Distributed Parameter Switched Systems. ICARCV 2006: 1-4
21EECuimei Bo, Jun Li, Zhiquan Wang, Jinguo Lin: Adaptive Neural Model Based Fault Tolerant Control for Multi-variable Process. ICIC (2) 2006: 596-601
20EEJinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian: Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. ICICIC (3) 2006: 471-474
19EECuimei Bo, Zhiquan Wang, Jinguo Lin, Shi Zhang, Guangming Zhang: The Online Models based Fault Tolerant Control for Multiple Sensor Fault of Multi-variable Nonlinear Processes. IJCNN 2006: 936-943
18EEGuangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang: Data Hiding in Neural Network Prediction Errors. ISNN (2) 2006: 273-278
17EEShiguo Lian, Jinsheng Sun, Zhiquan Wang: Security Analysis of A Chaos-based Image Encryption Algorithm CoRR abs/cs/0608119: (2006)
16EEShiguo Lian, Jinsheng Sun, Zhiquan Wang: Secure hash function based on neural network. Neurocomputing 69(16-18): 2346-2350 (2006)
2005
15EEBenlian Xu, Zhiquan Wang: Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization. CIS (2) 2005: 881-886
14EEGuangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang: On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. ICNC (3) 2005: 976-979
13EEShiguo Lian, Zhongxuan Liu, Zhen Ren, Zhiquan Wang: Selective Video Encryption Based on Advanced Video Coding. PCM (2) 2005: 281-290
2004
12EEShiguo Lian, Jinsheng Sun, Zhiquan Wang: Perceptual Cryptography on JPEG2000 Compressed Images or Videos. CIT 2004: 78-83
11EEDeng-Pan Ye, Yuewei Dai, Zhiquan Wang, Hong-Yu Lei: A fast motion segmentation based watermarking for MPEG-2 video. ICARCV 2004: 1088-1091
10EEShiguo Lian, Jinsheng Sun, Zhiquan Wang, Yuewei Dai: A fast video encryption scheme based-on chaos. ICARCV 2004: 126-131
9EEHongyu Lei, Yu Zhao, Yuewei Dai, Zhiquan Wang: A secure voice communication system based on DSP. ICARCV 2004: 132-137
8EEShan Liang, Li Jun, Zhiquan Wang: Generalized synchronization of unified chaotic system and the research of CSK. ICARCV 2004: 1928-1933
7 Shiguo Lian, Jinsheng Sun, Zhiquan Wang: Perceptual cryptography on SPIHT compressed images or videos. ICME 2004: 2195-2198
6EEShiguo Lian, Jinsheng Sun, Zhongxin Li, Zhiquan Wang: A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. ICONIP 2004: 720-725
5EEShiguo Lian, Guanrong Chen, Albert Cheung, Zhiquan Wang: A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. ISNN (2) 2004: 627-632
4EEShiguo Lian, Jinsheng Sun, Zhiquan Wang: A Novel Image Encryption Scheme Based-on JPEG Encoding. IV 2004: 217-220
3EEDeng-Pan Ye, Yao-Bin Mao, Yuewei Dai, Zhiquan Wang: A Multi-feature Based Invertible Authentication Watermarking for JPEG Images. IWDW 2004: 152-162
2EEShiguo Lian, Jinsheng Sun, Dengfeng Zhang, Zhiquan Wang: A Selective Image Encryption Scheme Based on JPEG2000 Codec. PCM (2) 2004: 65-72
2003
1EEJinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang: A Feature-Watermarking Scheme for JPEG Image Authentication. IWDW 2003: 212-222

Coauthor Index

1Ming Bao [36]
2Cuimei Bo [19] [21]
3Guanrong Chen [5]
4Qinglan Chen [30] [33]
5Albert Cheung [5]
6Yuewei Dai [1] [3] [9] [10] [11] [14] [18] [20] [23] [27] [29] [31] [36]
7Xueping Dong [22]
8Long Ge [38]
9Jason Geng [28]
10Xiaodong Han [35] [37] [38]
11Shousong Hu [25]
12He Huang [35] [37]
13Xiaopeng Ji [35] [37] [38]
14Li Jun [8]
15Hong-Yu Lei [11]
16Hongyu Lei [9]
17Jun Li [21]
18Zhongxin Li [6]
19Shiguo Lian [2] [4] [5] [6] [7] [10] [12] [13] [16] [17] [18] [20] [23] [26] [29] [31] [32] [34]
20Shan Liang [8]
21Jinguo Lin [19] [21]
22Guangjie Liu [14] [18] [20] [29] [31] [32] [36]
23Zhongxuan Liu [13]
24Yao-Bin Mao [3]
25Yaobin Mao [28] [39]
26Huimin Qian [28] [39]
27Zhen Ren [13] [23] [29]
28Jinsheng Sun [2] [4] [6] [7] [10] [12] [16] [17] [26] [31] [32]
29Stefan Thiemert [1]
30Jinshen Wang [1]
31Jinwei Wang [14] [18] [20] [23] [31]
32Zhengyi Wu [24] [33]
33Wenbo Xiang [39]
34Benlian Xu [15] [24] [30] [33]
35Deng-Pan Ye [3] [11]
36Dengpan Ye [27]
37Dengfeng Zhang [2] [25]
38Guangming Zhang [19]
39Shi Zhang [19]
40Yu Zhao [9]
41Yuxin Zhao [36]
42Changfu Zou [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)