default search action
Zhiquan Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Xiaoyun Yuan, Tengyao Li, Lingling Li, Ruixiang Li, Zhiquan Wang, Xiangyang Luo:
HSWF: Enhancing website fingerprinting attacks on Tor to address real world distribution mismatch. Comput. Networks 241: 110217 (2024) - [j31]Zhiquan Wang, Tengyao Li, Meijuan Yin, Xiaoyun Yuan, Xiangyang Luo, Lingling Li:
WF3A: A N-shot website fingerprinting with effective fusion feature attention. Comput. Secur. 140: 103796 (2024) - 2023
- [j30]Zhenshuang Tang, Lilin Yin, Dong Yin, Haohao Zhang, Yuhua Fu, Guangliang Zhou, Yunxiang Zhao, Zhiquan Wang, Xiaolei Liu, Xinyun Li, Shuhong Zhao:
Development and application of an efficient genomic mating method to maximize the production performances of three-way crossbred pigs. Briefings Bioinform. 24(1) (2023) - [j29]Guobin Chang, Xiaoya Yuan, Qixin Guo, Hao Bai, Xiaofang Cao, Meng Liu, Zhixiu Wang, Bichun Li, Shasha Wang, Yong Jiang, Zhiquan Wang, Yang Zhang, Qi Xu, Qianqian Song, Rui Pan, Lingling Qiu, Tiantian Gu, Xinsheng Wu, Yulin Bi, Zhengfeng Cao, Yu Zhang, Yang Chen, Hong Li, Jianfeng Liu, Wangcheng Dai, Guohong Chen:
The First Crested Duck Genome Reveals Clues to Genetic Compensation and Crest Cushion Formation. Genom. Proteom. Bioinform. 21(3): 483-500 (2023) - [j28]Tianle Xu, Venkatesh Merwade, Zhiquan Wang:
Interpolating Hydrologic Data Using Laplace Formulation. Remote. Sens. 15(15): 3844 (2023) - [c44]Chengwan Zhang, Congcong Miao, Changqing An, Anlun Hong, Ning Wang, Zhiquan Wang, Jilong Wang:
Metis: Detecting Fake AS-PATHs Based on Link Prediction. ISCC 2023: 656-662 - 2022
- [j27]Jiawei Li, Weihong Ma, Qifeng Li, Chunjiang Zhao, Dan Tulpan, Simon Yang, Luyu Ding, Ronghua Gao, Ligen Yu, Zhiquan Wang:
Multi-view real-time acquisition and 3D reconstruction of point clouds for beef cattle. Comput. Electron. Agric. 197: 106987 (2022) - [j26]Jiawei Li, Weihong Ma, Chunjiang Zhao, Qifeng Li, Dan Tulpan, Zhiquan Wang, Simon X. Yang, Luyu Ding, Ronghua Gao, Ligen Yu:
Extraction of key regions of beef cattle based on bidirectional tomographic slice features from point cloud data. Comput. Electron. Agric. 199: 107190 (2022) - [j25]Xinran Li, Jiaqi Zhou, Wenjuan Zhao, Qing Wen, Weijie Wang, Huipai Peng, Yuan Gao, Kelly J. Bouchonville, Steven M. Offer, Kuiming Chan, Zhiquan Wang, Nan Li, Haiyun Gan:
Defining Proximity Proteome of Histone Modifications by Antibody-mediated Protein A-APEX2 Labeling. Genom. Proteom. Bioinform. 20(1): 87-100 (2022) - [i3]Zhiquan Wang, Bedrich Benes, Ahmed H. Qureshi, Christos Mousas:
Co-design of Embodied Neural Intelligence via Constrained Evolution. CoRR abs/2205.10688 (2022) - 2021
- [j24]Huimin Liu, Zhiquan Wang, Angshuman Mazumdar, Christos Mousas:
Virtual reality game level layout design for real environment constraints. Graph. Vis. Comput. 4: 200020 (2021) - [j23]Christos Mousas, Claudia Krogmeier, Zhiquan Wang:
Photo Sequences of Varying Emotion: Optimization with a Valence-Arousal Annotated Dataset. ACM Trans. Interact. Intell. Syst. 11(2): 16:1-16:19 (2021) - [c43]Xingyu Lei, Nicoletta Adamo-Villani, Bedrich Benes, Zhiquan Wang, Zachary Meyer, Richard E. Mayer, Alyssa P. Lawson:
Perceived Naturalness of Interpolation Methods for Character Upper Body Animation. ISVC (1) 2021: 103-115 - 2020
- [j22]Cheng Ma, Wei Shi, Chengang Dong, Lei Yang, Zhiquan Wang, Meilin Wu, Haiqing Wang, Chuanhui Zhong, Chaofan Li:
998 Multiplication Rate of GaAs Avalanche Semiconductor Switch Triggered by 0.567 nJ. IEEE Access 8: 116515-116519 (2020) - [c42]Huimin Liu, Zhiquan Wang, Christos Mousas, Dominic Kao:
Virtual Reality Racket Sports: Virtual Drills for Exercise and Training. ISMAR 2020: 566-576 - [c41]Zhiquan Wang, Huimin Liu, Yucong Pan, Christos Mousas:
Color Blindness Bartender: An Embodied VR Game Experience. VR Workshops 2020: 519-520
2010 – 2019
- 2019
- [c40]Dengfeng Zhang, Hao Zhuang, Baochun Lu, Zhiquan Wang, Cuimei Bo:
Fault-tolerant Speed Synchronous Control of Multi-motor System against Inverter Faults. CAA SAFEPROCESS 2019: 596-601 - 2017
- [j21]Dengfeng Zhang, Jun Li, Baochun Lu, Steven X. Ding, Zhiquan Wang, Chao Zhao:
Satisfactory fault tolerant control with soft-constraint for discrete time-varying systems: numerical recursive approach. J. Frankl. Inst. 354(2): 1109-1137 (2017) - 2012
- [j20]Dengfeng Zhang, Hong Wang, Baochun Lu, Zhiquan Wang:
Improved observer-based fault estimator design for a class of T-S fuzzy systems. Int. J. Control 85(6): 629-647 (2012) - 2011
- [j19]Guangjie Liu, Junwen Wang, Shiguo Lian, Zhiquan Wang:
A passive image authentication scheme for detecting region-duplication forgery with rotation. J. Netw. Comput. Appl. 34(5): 1557-1565 (2011) - [j18]Huawang Qin, Yuewei Dai, Zhiquan Wang:
Identity-based multi-receiver threshold signcryption scheme. Secur. Commun. Networks 4(11): 1331-1337 (2011) - 2010
- [j17]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Secure Multimedia Distribution Based on Watermarking and Encryption. J. Convergence Inf. Technol. 5(9): 279-286 (2010) - [j16]Liang Shan, Zhong Liu, Zhiquan Wang:
A New MLS Chaotic System and its Backstepping Sliding Mode Synchronization Control. J. Comput. 5(3): 456-463 (2010) - [j15]Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression. J. Digit. Content Technol. its Appl. 4(8): 34-42 (2010) - [j14]Huimin Qian, Yaobin Mao, Wenbo Xiang, Zhiquan Wang:
Recognition of human activities using SVM multi-class classifier. Pattern Recognit. Lett. 31(2): 100-111 (2010) - [j13]Benlian Xu, Qinglan Chen, Jihong Zhu, Zhiquan Wang:
Ant estimator with application to target tracking. Signal Process. 90(5): 1496-1509 (2010) - [c39]Qiujie Li, Yaobin Mao, Zhiquan Wang:
An efficient data-scalable algorithm for image orientation detection. ICIP 2010: 2665-2668 - [c38]Jihong Zhu, Benlian Xu, Fei Wang, Zhiquan Wang:
A Real-Time Moving Ant Estimator for Bearings-Only Tracking. ICSI (1) 2010: 273-280
2000 – 2009
- 2009
- [j12]Zhipeng Cai, Hadi Sabaa, Yining Wang, Randy Goebel, Zhiquan Wang, Jiaofen Xu, Paul Stothard, Guohui Lin:
Most parsimonious haplotype allele sharing determination. BMC Bioinform. 10 (2009) - [j11]Huawang Qin, Yuewei Dai, Zhiquan Wang:
A Model of Intrusion Tolerant System Based on Game Theory. Comput. Inf. Sci. 2(2): 112-117 (2009) - [j10]Huawang Qin, Yuewei Dai, Zhiquan Wang:
A secret sharing scheme based on (t, n) threshold and adversary structure. Int. J. Inf. Sec. 8(5): 379-385 (2009) - [c37]Qiujie Li, Yaobin Mao, Zhiquan Wang, Wenbo Xiang:
Cost-Sensitive Boosting: Fitting an Additive Asymmetric Logistic Regression Model. ACML 2009: 234-247 - [c36]Liang Shan, Zhong Liu, Jun Li, Zhiquan Wang:
A new fractional-order chaotic system and its synchronization control. CDC 2009: 5918-5922 - [c35]Zhongxin Li, Wan-he Xu, Yue Zhang, Yaobin Mao, Zhiquan Wang:
Video Mosaic with Block Matching and M-Estimation. CSIE (6) 2009: 632-635 - [c34]Qiujie Li, Yaobin Mao, Zhiquan Wang, Wenbo Xiang:
Robust Real-Time Detection of Abandoned and Removed Objects. ICIG 2009: 156-161 - 2008
- [j9]Benlian Xu, Qinglan Chen, Zhengyi Wu, Zhiquan Wang:
Analysis and approximation of performance bound for two-observer bearings-only tracking. Inf. Sci. 178(8): 2059-2078 (2008) - [j8]Shiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang:
Efficient video encryption scheme based on advanced video coding. Multim. Tools Appl. 38(1): 75-89 (2008) - [j7]Jinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian:
Locally optimum detection for Barni's multiplicative watermarking in DWT domain. Signal Process. 88(1): 117-130 (2008) - [j6]Benlian Xu, Qinglan Chen, Zhiquan Wang:
Ants for track initiation of bearings-only tracking. Simul. Model. Pract. Theory 16(6): 626-638 (2008) - [j5]Shiguo Lian, Zhiquan Wang:
Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation. IEEE Trans. Circuits Syst. Video Technol. 18(10): 1462-1467 (2008) - [c33]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
Robust Hashing Based on Persistent Points for Video Copy Detection. CIS (1) 2008: 305-308 - [c32]Huimin Qian, Yaobin Mao, Wenbo Xiang, Zhiquan Wang:
Home environment fall detection system based on a cascaded multi-SVM classifier. ICARCV 2008: 1567-1572 - [c31]He Huang, Xiaodong Han, Xiaopeng Ji, Zhiquan Wang:
Fault-tolerant Control of Networked Control System with Packet Dropout and Transmission delays. ICNSC 2008: 325-329 - [c30]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao:
Forgery-location highway monitoring systembased on video watermarking. ICNSC 2008: 625-629 - [c29]Xiaodong Han, He Huang, Xiaopeng Ji, Zhiquan Wang:
Output Feedback Satisfactory Fault-Tolerant Control of Uncertain Linear Discrete-Time Systems. ICNSC 2008: 671-676 - [c28]Xiaopeng Ji, Long Ge, Xiaodong Han, Zhiquan Wang:
Wire-Sizing for Interconnect Performance Optimization Considering High Inductance Effects. ICNSC 2008: 1114-1118 - 2007
- [j4]Deng-Pan Ye, Changfu Zou, Yuewei Dai, Zhiquan Wang:
A new adaptive watermarking for real-time MPEG videos. Appl. Math. Comput. 185(2): 907-918 (2007) - [j3]Dengfeng Zhang, Zhiquan Wang, Shousong Hu:
Robust satisfactory fault-tolerant control of uncertain linear discrete-time systems: an LMI approach. Int. J. Syst. Sci. 38(2): 151-165 (2007) - [j2]Benlian Xu, Zhengyi Wu, Zhiquan Wang:
On the Cramér-Rao lower bound for biased bearings-only maneuvering target tracking. Signal Process. 87(12): 3175-3189 (2007) - [c27]Guangjie Liu, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Image Steganography Based on Quantization-Embedders Combination. ICME 2007: 1115-1118 - [c26]Huimin Qian, Yaobin Mao, Jason Geng, Zhiquan Wang:
Object Tracking with Self-updating Tracking Window. PAISI 2007: 82-93 - [c25]Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang:
A RST-Resilient Watermarking Scheme Based on Invariant Features. SITIS 2007: 927-933 - [i2]Shiguo Lian, Jinsheng Sun, Zhiquan Wang:
One-way Hash Function Based on Neural Network. CoRR abs/0707.4032 (2007) - 2006
- [j1]Shiguo Lian, Jinsheng Sun, Zhiquan Wang:
Secure hash function based on neural network. Neurocomputing 69(16-18): 2346-2350 (2006) - [c24]Xueping Dong, Zhiquan Wang:
Stability Analysis of Nonlinear Distributed Parameter Switched Systems. ICARCV 2006: 1-4 - [c23]Cuimei Bo, Jun Li, Zhiquan Wang, Jinguo Lin:
Adaptive Neural Model Based Fault Tolerant Control for Multi-variable Process. ICIC (2) 2006: 596-601 - [c22]Jinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian:
Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. ICICIC (3) 2006: 471-474 - [c21]Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang:
Semi-Fragile Watermarking Authentication with Local and Global Watermarks. AIAI 2006: 681-688 - [c20]Cuimei Bo, Zhiquan Wang, Jinguo Lin, Shi Zhang, Guangming Zhang:
The Online Models based Fault Tolerant Control for Multiple Sensor Fault of Multi-variable Nonlinear Processes. IJCNN 2006: 936-943 - [c19]Guangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang:
Data Hiding in Neural Network Prediction Errors. ISNN (2) 2006: 273-278 - [i1]Shiguo Lian, Jinsheng Sun, Zhiquan Wang:
Security Analysis of A Chaos-based Image Encryption Algorithm. CoRR abs/cs/0608119 (2006) - 2005
- [c18]Benlian Xu, Zhiquan Wang:
Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization. CIS (2) 2005: 881-886 - [c17]Guangjie Liu, Jinwei Wang, Yuewei Dai, Zhiquan Wang:
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography. ICNC (3) 2005: 976-979 - [c16]Guangjie Liu, Yuewei Dai, Jinwei Wang, Zhiquan Wang, Shiguo Lian:
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming. MMSP 2005: 1-4 - [c15]Shiguo Lian, Zhongxuan Liu, Zhen Ren, Zhiquan Wang:
Selective Video Encryption Based on Advanced Video Coding. PCM (2) 2005: 281-290 - 2004
- [c14]Shiguo Lian, Jinsheng Sun, Zhiquan Wang:
Perceptual Cryptography on JPEG2000 Compressed Images or Videos. CIT 2004: 78-83 - [c13]Shiguo Lian, Jinsheng Sun, Zhiquan Wang:
A secure 3D-SPIHT codec. EUSIPCO 2004: 813-816 - [c12]Shiguo Lian, Jinsheng Sun, Zhiquan Wang, Yuewei Dai:
A fast video encryption scheme based-on chaos. ICARCV 2004: 126-131 - [c11]Hongyu Lei, Yu Zhao, Yuewei Dai, Zhiquan Wang:
A secure voice communication system based on DSP. ICARCV 2004: 132-137 - [c10]Shan Huaning, Zhiquan Wang, Wang Jue, Wang Pingli:
Comparison and analysis of the Lyapunov exponents of blood flow signal of healthy and stenotic artery. ICARCV 2004: 211-216 - [c9]Deng-Pan Ye, Yuewei Dai, Zhiquan Wang, Hongyu Lei:
A fast motion segmentation based watermarking for MPEG-2 video. ICARCV 2004: 1088-1091 - [c8]Liang Shan, Jun Li, Zhiquan Wang:
Generalized synchronization of unified chaotic system and the research of CSK. ICARCV 2004: 1928-1933 - [c7]Shiguo Lian, Jinsheng Sun, Zhiquan Wang:
Perceptual cryptography on SPIHT compressed images or videos. ICME 2004: 2195-2198 - [c6]Shiguo Lian, Jinsheng Sun, Zhongxin Li, Zhiquan Wang:
A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. ICONIP 2004: 720-725 - [c5]Shiguo Lian, Guanrong Chen, Albert Cheung, Zhiquan Wang:
A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. ISNN (2) 2004: 627-632 - [c4]Shiguo Lian, Jinsheng Sun, Zhiquan Wang:
A Novel Image Encryption Scheme Based-on JPEG Encoding. IV 2004: 217-220 - [c3]Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang:
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images. IWDW 2004: 152-162 - [c2]Shiguo Lian, Jinsheng Sun, Dengfeng Zhang, Zhiquan Wang:
A Selective Image Encryption Scheme Based on JPEG2000 Codec. PCM (2) 2004: 65-72 - 2003
- [c1]Jinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang:
A Feature-Watermarking Scheme for JPEG Image Authentication. IWDW 2003: 212-222
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint