Weihai Li

Orcid: 0000-0002-4023-8385

According to our database1, Weihai Li authored at least 67 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability.
Multim. Tools Appl., April, 2024

Accelerating Huffman Encoding Using 512-Bit SIMD Instructions.
IEEE Trans. Consumer Electron., February, 2024

SE-SIS: Shadow-Embeddable Lossless Secret Image Sharing for Greyscale Images.
Proceedings of the IEEE International Conference on Acoustics, 2024

DSIS: A Novel (K, N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery.
Proceedings of the IEEE International Conference on Acoustics, 2024

2022
Learning Forgery Region-Aware and ID-Independent Features for Face Manipulation Detection.
IEEE Trans. Biom. Behav. Identity Sci., 2022

Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control.
Proceedings of the IEEE International Conference on Trust, 2022

ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Real Time Video Object Segmentation in Compressed Domain.
IEEE Trans. Circuits Syst. Video Technol., 2021

Towards Generalizable and Robust Face Manipulation Detection via Bag-of-local-feature.
CoRR, 2021

Towards Generalizable and Robust Face Manipulation Detection via Bag-of-feature.
Proceedings of the International Conference on Visual Communications and Image Processing, 2021

Towards More Powerful Multi-column Convolutional Network for Crowd Counting.
Proceedings of the Image and Graphics - 11th International Conference, 2021

TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record System.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Combined Method Based on Source Text and Representation for Text Enhancement.
Proceedings of the SSPS 2020: 2020 2nd Symposium on Signal Processing Systems, 2020

A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Spatial-Temporal Feature Aggregation Network For Video Object Detection.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Ship Classification in High-Resolution SAR Images via Transfer Learning with Small Training Dataset.
Sensors, 2019

Object and patch based anomaly detection and localization in crowded scenes.
Multim. Tools Appl., 2019

Real-Time Online Multi-Object Tracking in Compressed Domain.
IEEE Access, 2019

PPML: Metric Learning with Prior Probability for Video Object Segmentation.
Proceedings of the 2019 IEEE Visual Communications and Image Processing, 2019

Tracking Assisted Faster Video Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Real Time Compressed Video Object Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Cascaded Residual Density Network for Crowd Counting.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Dhff: Robust Multi-Scale Person Search by Dynamic Hierarchical Feature Fusion.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification.
Proceedings of the Image and Graphics - 10th International Conference, 2019

2018
Which gray level should be given the smallest cost for adaptive steganography?
Multim. Tools Appl., 2018

Fast Video Stitching for Aerially Captured HD Videos.
Int. J. Image Graph., 2018

Real-Time Anomaly Detection With HMOF Feature.
CoRR, 2018

Robust Anomaly Detection via Fusion of Appearance and Motion Features.
Proceedings of the IEEE Visual Communications and Image Processing, 2018

Real-time Anomaly Detection with HMOF Feature.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

Anomaly Detection and Localization: A Novel Two-Phase Framework Based on Trajectory-Level Characteristics.
Proceedings of the 2018 IEEE International Conference on Multimedia & Expo Workshops, 2018

Flow Guided Siamese Network for Visual Tracking.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Pyramid Sub-Region Sensitive Network for Object Detection.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Object-Oriented Anomaly Detection in Surveillance Videos.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Imaging and Parameter Estimating for Fast Moving Targets in Airborne SAR.
IEEE Trans. Computational Imaging, 2017

Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy.
Multim. Tools Appl., 2017

Edge-Aware Saliency Detection via Novel Graph Model.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Nest Detection Using Coarse-to-Fine Searching Strategy.
Proceedings of the Digital TV and Wireless Multimedia Communication, 2017

Multi-occlusion handling in depth estimation of light fields.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Hierarchical saliency optimization.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
Online multi-object tracking based on global and local features.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

A Novel Framework for Anomaly Detection in Video Surveillance Using Multi-feature Extraction.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

3-D target height extraction via high squint airborne SAR.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A speed-up seed point otsu method for ship detection in various scenarios.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Robust online multi-object tracking based on KCF trackers and reassignment.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

2015
A novel moving parameter estimation approach offast moving targets based on phase extraction.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

A high squint airborne SAR imaging algorithm with low PRF.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Moving object detection of dynamic scenes using spatio-temporal context and background modeling.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

2013
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms.
Proceedings of the Frontiers in Internet Technologies, 2013

High precision rotation angle estimation for rotated images.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Online travel destination recommendation with efficient variable memory Markov model.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

High Precision Image Rotation Angle Estimation with Periodicity of Pixel Variance.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

2012
Breaking row-column shuffle based image cipher.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Image Forensics with Rotation-Tolerant Resampling Detection.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, 2012

2011
Brute Force Vulnerability Testing Technology Based on Data Mutation.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Fuzzing test data generation based on message matrix perturbation with keyword reference.
Proceedings of the MILCOM 2011, 2011

2010
Identifying camera and processing from cropped JPEG photos via tensor analysis.
Proceedings of the IEEE International Conference on Systems, 2010

Camera Model Identification for JPEG Images via Tensor Analysis.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Rotation robust detection of copy-move forgery.
Proceedings of the International Conference on Image Processing, 2010

2009
Passive detection of doctored JPEG image via block artifact grid extraction.
Signal Process., 2009

Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift.
Proceedings of the IEEE International Conference on Systems, 2009

A robust chaos-based image encryption scheme.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Dynamic Dictionary Design for SIP Signaling Compression.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Doctored JPEG image detection.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

2007
A New Blind Attack Procedure for DCT-Based Image Encryption with Spectrum Learning.
Int. J. Image Graph., 2007

A leak and its remedy in JPEG image encryption.
Int. J. Comput. Math., 2007

2006
Visual Information Encryption in Frequency Domain: Risk and Enhancement.
Proceedings of the Advances in Machine Vision, 2006


  Loading...