Zhenghui Liu

Orcid: 0009-0008-3691-9074

According to our database1, Zhenghui Liu authored at least 35 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A watermarking-based authentication and recovery scheme for encrypted audio.
Multim. Tools Appl., January, 2024

DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

A Novel Watermarking Scheme for Audio Data Stored in Third Party Servers.
Int. J. Digit. Crime Forensics, 2024

A Novel Digital Audio Encryption and Forensics Watermarking Scheme.
IEEE Access, 2024

2023
A novel audio watermarking algorithm robust against recapturing attacks.
Multim. Tools Appl., May, 2023

Multi-agent deep reinforcement learning algorithm with self-adaption division strategy for VNF-SC deployment in SDN/NFV-Enabled Networks.
Appl. Soft Comput., May, 2023

Interpretable Reinforcement Learning of Behavior Trees.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

Learning Behavior Trees by Evolution-Inspired Approaches.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

2022
Towards Safer Transporting in Resilient Cities: Risk Assessment and Path Planning.
Proceedings of the IEEE Smartworld, 2022

Load balance and time delay efficient algorithm for VNF service chain deployment based on DQN.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
Energy Efficiency Opposition-Based Learning and Brain Storm Optimization for VNF-SC Deployment in IoT.
Wirel. Commun. Mob. Comput., 2021

Multiobjective Model and Improved Artificial Raindrop Algorithm for Virtual Network Mapping.
Mob. Inf. Syst., 2021

2020
Speech watermarking robust against recapturing and de-synchronization attacks.
Multim. Tools Appl., 2020

Target Specificity of the CRISPR-Cas9 System in Arabidopsis thaliana, Oryza sativa, and Glycine max Genomes.
J. Comput. Biol., 2020

Social Media Users Send Promotional Links to Strangers: Legitimate Promotion or Security Vulnerability?
IEEE Access, 2020

Compression Detection of Audio Waveforms Based on Stacked Autoencoders.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks.
IEEE Trans. Inf. Forensics Secur., 2019

2018
Noise-level estimation based detection of motion-compensated frame interpolation in video sequences.
Multim. Tools Appl., 2018

Saliency-based adaptive compressive sampling of images using measurement contrast.
Multim. Tools Appl., 2018

Multi-Scheme Frame Rate Up-Conversion Using Space-Time Saliency.
IEEE Access, 2018

An Improved Iterated Hybrid Search for DNA Codes Design.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Robust Recoverable Algorithm Used for Digital Speech Forensics Based on DCT.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Motion-compensated frame interpolation using patch-based sparseland model.
Signal Process. Image Commun., 2017

Tamper recovery algorithm for digital speech signal based on DWT and DCT.
Multim. Tools Appl., 2017

A security watermark scheme used for digital speech forensics.
Multim. Tools Appl., 2017

Speech Content Authentication Scheme based on High-Capacity Watermark Embedding.
Int. J. Digit. Crime Forensics, 2017

A Modified Shuffled Frog Leaping Algorithm for Constructing DNA Codes.
Proceedings of the Computational Intelligence and Intelligent Systems, 2017

Two-scale geographic back-pressure algorithm for deep space networks.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Authentication and recovery algorithm for speech signal based on digital watermarking.
Signal Process., 2016

2015
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform.
Int. J. Digit. Crime Forensics, 2015

An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack.
Multim. Tools Appl., 2014

A novel speech content authentication algorithm based on Bessel-Fourier moments.
Digit. Signal Process., 2014

2013
A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain.
Int. J. Digit. Crime Forensics, 2013

2012
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012


  Loading...