default search action
Zhaopin Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Zhaopin Su, Ziqi Fang, Chensi Lian, Guofu Zhang, Mengke Li:
Audio splicing detection and localization using multistage filterbank spectral sketches and decision fusion. Multim. Syst. 30(2): 92 (2024) - [j20]Xiangyu Cheng, Yaofei Wang, Chang Liu, Donghui Hu, Zhaopin Su:
HiFi-GANw: Watermarked Speech Synthesis via Fine-Tuning of HiFi-GAN. IEEE Signal Process. Lett. 31: 2440-2444 (2024) - [j19]Guofu Zhang, Lei Li, Zhaopin Su, Feng Yue, Yang Chen, Miqing Li, Xin Yao:
On Estimating the Feasible Solution Space of Multi-objective Testing Resource Allocation. ACM Trans. Softw. Eng. Methodol. 33(6): 145 (2024) - 2023
- [j18]Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Yaofei Wang:
Robust audio copy-move forgery detection on short forged slices using sliding window. J. Inf. Secur. Appl. 75: 103507 (2023) - [j17]Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Miqing Li, Weiming Zhang, Xin Yao:
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM. IEEE Trans. Dependable Secur. Comput. 20(5): 4016-4031 (2023) - [j16]Guofu Zhang, Lulu Zheng, Zhaopin Su, Yifei Zeng, Guoquan Wang:
M-Sequences and Sliding Window Based Audio Watermarking Robust Against Large-Scale Cropping Attacks. IEEE Trans. Inf. Forensics Secur. 18: 1182-1195 (2023) - [j15]Guofu Zhang, Lei Li, Zhaopin Su, Zhisheng Shao, Miqing Li, Bin Li, Xin Yao:
New Reliability-Driven Bounds for Architecture-Based Multi-Objective Testing Resource Allocation. IEEE Trans. Software Eng. 49(4): 2513-2529 (2023) - 2022
- [c3]Feng Yue, Jiale Chen, Zhaopin Su, Niansong Wang, Guofu Zhang:
Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet. ESORICS (3) 2022: 756-762 - 2021
- [j14]Zhaopin Su, Guofu Zhang, Feng Yue, Dezhi Zhan, Miqing Li, Bin Li, Xin Yao:
Enhanced Constraint Handling for Reliability-Constrained Multiobjective Testing Resource Allocation. IEEE Trans. Evol. Comput. 25(3): 537-551 (2021) - 2020
- [j13]Zhaopin Su, Wangwang Li, Guofu Zhang, Donghui Hu, Xianxian Zhou:
A steganographic method based on gain quantization for iLBC speech streams. Multim. Syst. 26(2): 223-233 (2020) - [j12]Zhaopin Su, Guofu Zhang, Feng Yue, Jindong He, Miqing Li, Bin Li, Xin Yao:
Finding the Largest Successful Coalition under the Strict Goal Preferences of Agents. ACM Trans. Auton. Adapt. Syst. 14(4): 15:1-15:33 (2020) - [j11]Guofu Zhang, Zhaopin Su, Miqing Li, Meibin Qi, Jianguo Jiang, Xin Yao:
A Task-Oriented Heuristic for Repairing Infeasible Solutions to Overlapping Coalition Structure Generation. IEEE Trans. Syst. Man Cybern. Syst. 50(3): 785-801 (2020)
2010 – 2019
- 2018
- [j10]Zhaopin Su, Guofu Zhang, Feng Yue, Lejie Chang, Jianguo Jiang, Xin Yao:
SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking. IEEE Trans. Multim. 20(10): 2631-2644 (2018) - 2017
- [j9]Zhaopin Su, Lejie Chang, Guofu Zhang, Jianguo Jiang, Feng Yue:
Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multim. Tools Appl. 76(7): 9363-9386 (2017) - [j8]Guofu Zhang, Zhaopin Su, Miqing Li, Feng Yue, Jianguo Jiang, Xin Yao:
Constraint Handling in NSGA-II for Solving Optimal Testing Resource Allocation Problems. IEEE Trans. Reliab. 66(4): 1193-1212 (2017) - 2016
- [j7]Yang Liu, Guofu Zhang, Zhaopin Su, Feng Yue, Jianguo Jiang:
Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games. J. Comput. Sci. Technol. 31(6): 1136-1150 (2016) - 2015
- [j6]Guofu Zhang, Renzhi Yang, Zhaopin Su, Feng Yue, Yuqi Fan, Meibin Qi, Jianguo Jiang:
Using binary particle swarm optimization to search for maximal successful coalition. Appl. Intell. 42(2): 195-209 (2015) - [j5]Feng Yue, Guofu Zhang, Zhaopin Su, Yang Lu, Ting Zhang:
Multi-software reliability allocation in multimedia systems with budget constraints using Dempster-Shafer theory and improved differential evolution. Neurocomputing 169: 13-22 (2015) - 2011
- [j4]Guofu Zhang, Jianguo Jiang, Changhua Lu, Zhaopin Su, Hua Fang, Yang Liu:
A revision algorithm for invalid encodings in concurrent formation of overlapping coalitions. Appl. Soft Comput. 11(2): 2164-2172 (2011) - [j3]Zhaopin Su, Jianguo Jiang, Chang-Yong Liang, Guofu Zhang:
Path selection in disaster response management based on Q-learning. Int. J. Autom. Comput. 8(1): 100-106 (2011) - [p1]Zhaopin Su, Shiguo Lian, Guofu Zhang, Jianguo Jiang:
Chaos-Based Video Encryption Algorithms. Chaos-Based Cryptography 2011: 205-226 - 2010
- [j2]Guofu Zhang, Jianguo Jiang, Zhaopin Su, Meibin Qi, Hua Fang:
Searching for overlapping coalitions in multiple virtual organizations. Inf. Sci. 180(17): 3140-3156 (2010) - [j1]Jianguo Jiang, Yang Liu, Zhaopin Su, Guofu Zhang, Shiyi Xing:
An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling. J. Multim. 5(5): 464-472 (2010)
2000 – 2009
- 2007
- [c2]Jianguo Jiang, Zhaopin Su, Na Xia, Guofu Zhang:
Research on Comprehensive Evaluation of Agent Coalition Based on D-S Evidential Reasoning. FSKD (2) 2007: 477-481 - 2006
- [c1]Guofu Zhang, Jianguo Jiang, Na Xia, Zhaopin Su:
Particle Swarms Cooperative Optimization for Coalition Generation Problem. SEAL 2006: 166-173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint