Zhiquan Wang

Orcid: 0000-0002-5611-0335

According to our database1, Zhiquan Wang authored at least 80 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evolution-Based Shape and Behavior Co-Design of Virtual Agents.
IEEE Trans. Vis. Comput. Graph., December, 2024

WF3A: A N-shot website fingerprinting with effective fusion feature attention.
Comput. Secur., 2024

HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch.
Comput. Networks, 2024

2023
Interpolating Hydrologic Data Using Laplace Formulation.
Remote. Sens., August, 2023

The First Crested Duck Genome Reveals Clues to Genetic Compensation and Crest Cushion Formation.
Genom. Proteom. Bioinform., June, 2023

Development and application of an efficient genomic mating method to maximize the production performances of three-way crossbred pigs.
Briefings Bioinform., January, 2023

Metis: Detecting Fake AS-PATHs Based on Link Prediction.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

2022
Defining Proximity Proteome of Histone Modifications by Antibody-mediated Protein A-APEX2 Labeling.
Genom. Proteom. Bioinform., 2022

Co-design of Embodied Neural Intelligence via Constrained Evolution.
CoRR, 2022

Extraction of key regions of beef cattle based on bidirectional tomographic slice features from point cloud data.
Comput. Electron. Agric., 2022

Multi-view real-time acquisition and 3D reconstruction of point clouds for beef cattle.
Comput. Electron. Agric., 2022

2021
Photo Sequences of Varying Emotion: Optimization with a Valence-Arousal Annotated Dataset.
ACM Trans. Interact. Intell. Syst., 2021

Virtual reality game level layout design for real environment constraints.
Graph. Vis. Comput., 2021

Perceived Naturalness of Interpolation Methods for Character Upper Body Animation.
Proceedings of the Advances in Visual Computing - 16th International Symposium, 2021

2020
998 Multiplication Rate of GaAs Avalanche Semiconductor Switch Triggered by 0.567 nJ.
IEEE Access, 2020

Color Blindness Bartender: An Embodied VR Game Experience.
Proceedings of the 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2020

Virtual Reality Racket Sports: Virtual Drills for Exercise and Training.
Proceedings of the 2020 IEEE International Symposium on Mixed and Augmented Reality, 2020

2019
Fault-tolerant Speed Synchronous Control of Multi-motor System against Inverter Faults.
Proceedings of the CAA Symposium on Fault Detection, 2019

2017
Satisfactory fault tolerant control with soft-constraint for discrete time-varying systems: numerical recursive approach.
J. Frankl. Inst., 2017

2012
Improved observer-based fault estimator design for a class of T-S fuzzy systems.
Int. J. Control, 2012

2011
Identity-based multi-receiver threshold signcryption scheme.
Secur. Commun. Networks, 2011

A passive image authentication scheme for detecting region-duplication forgery with rotation.
J. Netw. Comput. Appl., 2011

2010
Ant estimator with application to target tracking.
Signal Process., 2010

Recognition of human activities using SVM multi-class classifier.
Pattern Recognit. Lett., 2010

Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
J. Digit. Content Technol. its Appl., 2010

A New MLS Chaotic System and its Backstepping Sliding Mode Synchronization Control.
J. Comput., 2010

Secure Multimedia Distribution Based on Watermarking and Encryption.
J. Convergence Inf. Technol., 2010

A Real-Time Moving Ant Estimator for Bearings-Only Tracking.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

An efficient data-scalable algorithm for image orientation detection.
Proceedings of the International Conference on Image Processing, 2010

2009
A secret sharing scheme based on (<i>t</i>, <i>n</i>) threshold and adversary structure.
Int. J. Inf. Sec., 2009

A Model of Intrusion Tolerant System Based on Game Theory.
Comput. Inf. Sci., 2009

Most parsimonious haplotype allele sharing determination.
BMC Bioinform., 2009

Robust Real-Time Detection of Abandoned and Removed Objects.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Video Mosaic with Block Matching and M-Estimation.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A new fractional-order chaotic system and its synchronization control.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Cost-Sensitive Boosting: Fitting an Additive Asymmetric Logistic Regression Model.
Proceedings of the Advances in Machine Learning, 2009

2008
Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation.
IEEE Trans. Circuits Syst. Video Technol., 2008

Ants for track initiation of bearings-only tracking.
Simul. Model. Pract. Theory, 2008

Locally optimum detection for Barni's multiplicative watermarking in DWT domain.
Signal Process., 2008

Efficient video encryption scheme based on advanced video coding.
Multim. Tools Appl., 2008

Analysis and approximation of performance bound for two-observer bearings-only tracking.
Inf. Sci., 2008

Forgery-location highway monitoring systembased on video watermarking.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Wire-Sizing for Interconnect Performance Optimization Considering High Inductance Effects.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Fault-tolerant Control of Networked Control System with Packet Dropout and Transmission delays.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Output Feedback Satisfactory Fault-Tolerant Control of Uncertain Linear Discrete-Time Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Home environment fall detection system based on a cascaded multi-SVM classifier.
Proceedings of the 10th International Conference on Control, 2008

Robust Hashing Based on Persistent Points for Video Copy Detection.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
On the Cramér-Rao lower bound for biased bearings-only maneuvering target tracking.
Signal Process., 2007

Robust satisfactory fault-tolerant control of uncertain linear discrete-time systems: an LMI approach.
Int. J. Syst. Sci., 2007

One-way Hash Function Based on Neural Network
CoRR, 2007

A new adaptive watermarking for real-time MPEG videos.
Appl. Math. Comput., 2007

A RST-Resilient Watermarking Scheme Based on Invariant Features.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Object Tracking with Self-updating Tracking Window.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Image Steganography Based on Quantization-Embedders Combination.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Secure hash function based on neural network.
Neurocomputing, 2006

Security Analysis of A Chaos-based Image Encryption Algorithm
CoRR, 2006

Data Hiding in Neural Network Prediction Errors.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

The Online Models based Fault Tolerant Control for Multiple Sensor Fault of Multi-variable Nonlinear Processes.
Proceedings of the International Joint Conference on Neural Networks, 2006

Semi-Fragile Watermarking Authentication with Local and Global Watermarks.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Adaptive Neural Model Based Fault Tolerant Control for Multi-variable Process.
Proceedings of the Computational Intelligence, 2006

Stability Analysis of Nonlinear Distributed Parameter Switched Systems.
Proceedings of the Ninth International Conference on Control, 2006

2005
Selective Video Encryption Based on Advanced Video Coding.
Proceedings of the Advances in Multimedia Information Processing, 2005

Image Hiding by Non-uniform Generalized LSB and Dynamic Programming.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Selective Image Encryption Scheme Based on JPEG2000 Codec.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

A Multi-feature Based Invertible Authentication Watermarking for JPEG Images.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A Novel Image Encryption Scheme Based-on JPEG Encoding.
Proceedings of the 8th International Conference on Information Visualisation, 2004

A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images.
Proceedings of the Advances in Neural Networks, 2004

A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

Perceptual cryptography on SPIHT compressed images or videos.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Generalized synchronization of unified chaotic system and the research of CSK.
Proceedings of the 8th International Conference on Control, 2004

A fast video encryption scheme based-on chaos.
Proceedings of the 8th International Conference on Control, 2004

A secure voice communication system based on DSP.
Proceedings of the 8th International Conference on Control, 2004

Comparison and analysis of the Lyapunov exponents of blood flow signal of healthy and stenotic artery.
Proceedings of the 8th International Conference on Control, 2004

A fast motion segmentation based watermarking for MPEG-2 video.
Proceedings of the 8th International Conference on Control, 2004

A secure 3D-SPIHT codec.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Perceptual Cryptography on JPEG2000 Compressed Images or Videos.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
A Feature-Watermarking Scheme for JPEG Image Authentication.
Proceedings of the Digital Watermarking, Second International Workshop, 2003


  Loading...