Остановите войну!
for scientists:
default search action
Yanzhen Ren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Zongkun Sun, Yanzhen Ren, Yihuan Huang, Wuyang Liu, Hongcheng Zhu:
AFPM: A Low-Cost and Universal Adversarial Defense for Speaker Recognition Systems. IEEE Trans. Inf. Forensics Secur. 19: 2273-2287 (2024) - 2023
- [j15]Li Peng, Yanzhen Ren, Zhiheng Luan, Xiong Chen, Xiuping Yang, Weiping Tu:
SleepViTransformer: Patch-based sleep spectrogram transformer for automatic sleep staging. Biomed. Signal Process. Control. 86(Part B): 105203 (2023) - [j14]Yanzhen Ren, Dengkai Liu, Chenyu Liu, Qiaochu Xiong, Jianming Fu, Lina Wang:
A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet. IEEE Trans. Dependable Secur. Comput. 20(1): 665-679 (2023) - [c16]Zengshan Tian, Yanzhen Ren, Ze Li, Xingqing Cheng:
Super-Resolution Time-of-Flight Estimation for Ranging via Multi-Band Splicing. GLOBECOM 2023: 4656-4661 - [c15]Wuyang Liu, Yanzhen Ren, Jingru Wang:
Attention Mixup: An Accurate Mixup Scheme Based On Interpretable Attention Mechanism for Multi-Label Audio Classification. ICASSP 2023: 1-5 - [c14]Zhiheng Luan, Yanzhen Ren, Li Peng, Xiong Chen, Xiuping Yang, Weiping Tu, Yuhong Yang:
Learning From Single-Expert Annotated Labels for Automatic Sleep Staging. ICASSP 2023: 1-5 - [c13]Xinhong Li, Baoai Han, Li Xiao, Xiuping Yang, Weiping Tu, Xiong Chen, Weiyan Yi, Jie Lin, Yuhong Yang, Yanzhen Ren:
ONEI: Unveiling Route and Phase of Breathing from Snoring Sounds. ICONIP (9) 2023: 494-505 - [c12]Yanzhen Ren, Hongcheng Zhu, Liming Zhai, Zongkun Sun, Rubing Shen, Lina Wang:
Who is Speaking Actually? Robust and Versatile Speaker Traceability for Voice Conversion. ACM Multimedia 2023: 8674-8685 - [i7]Yanzhen Ren, Hongcheng Zhu, Liming Zhai, Zongkun Sun, Rubing Shen, Lina Wang:
Who is Speaking Actually? Robust and Versatile Speaker Traceability for Voice Conversion. CoRR abs/2305.05152 (2023) - [i6]Li Xiao, Xiuping Yang, Xinhong Li, Weiping Tu, Xiong Chen, Weiyan Yi, Jie Lin, Yuhong Yang, Yanzhen Ren:
A Snoring Sound Dataset for Body Position Recognition: Collection, Annotation, and Analysis. CoRR abs/2307.13346 (2023) - [i5]Wuyang Liu, Yanzhen Ren:
Semantic Proximity Alignment: Towards Human Perception-consistent Audio Tagging by Aligning with Label Text Description. CoRR abs/2309.16265 (2023) - 2022
- [j13]Ju Jia, Liming Zhai, Weixiang Ren, Lina Wang, Yanzhen Ren:
An Effective Imbalanced JPEG Steganalysis Scheme Based on Adaptive Cost-Sensitive Feature Learning. IEEE Trans. Knowl. Data Eng. 34(3): 1038-1052 (2022) - [i4]Yanzhen Ren, Ting Liu, Liming Zhai, Lina Wang:
Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks. CoRR abs/2201.07444 (2022) - 2021
- [j12]Yanzhen Ren, Sen Cai, Lina Wang:
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD). J. Inf. Secur. Appl. 59: 102863 (2021) - [c11]Yanzhen Ren, Wuyang Liu, Dengkai Liu, Lina Wang:
Recalibrated Bandpass Filtering On Temporal Waveform For Audio Spoof Detection. ICIP 2021: 3907-3911 - [c10]Yanzhen Ren, Yiwen Liu, Lina Wang:
Using Contrastive Learning to Improve the Performance of Steganalysis Schemes. IWDW 2021: 212-226 - [i3]Yanzhen Ren, Yiwen Liu, Lina Wang:
Using contrastive learning to improve the performance of steganalysis schemes. CoRR abs/2103.00891 (2021) - [i2]Liming Zhai, Lina Wang, Yanzhen Ren, Yang Liu:
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain. CoRR abs/2112.11729 (2021) - 2020
- [j11]Ju Jia, Liming Zhai, Weixiang Ren, Lina Wang, Yanzhen Ren, Lefei Zhang:
Transferable heterogeneous feature subspace learning for JPEG mismatched steganalysis. Pattern Recognit. 100: 107105 (2020) - [j10]Liming Zhai, Lina Wang, Yanzhen Ren:
Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors. IEEE Trans. Inf. Forensics Secur. 15: 1762-1777 (2020) - [c9]Yanzhen Ren, Shan Zhong, Weiping Tu, Lina Wang:
A Secure Opus Pulse Steganographic Scheme Based on Message Transform. APSIPA 2020: 1331-1339 - [c8]Ziyue Jiang, Hongcheng Zhu, Li Peng, Wenbing Ding, Yanzhen Ren:
Self-Supervised Spoofing Audio Detection Scheme. INTERSPEECH 2020: 4223-4227
2010 – 2019
- 2019
- [j9]Yanzhen Ren, Dengkai Liu, Jing Yang, Lina Wang:
An AMR adaptive steganographic scheme based on the pitch delay of unvoiced speech. Multim. Tools Appl. 78(7): 8091-8111 (2019) - [j8]Yanzhen Ren, Zhong Fang, Dengkai Liu, Changwen Chen:
Replay attack detection based on distortion by loudspeaker for voice authentication. Multim. Tools Appl. 78(7): 8383-8396 (2019) - [j7]Lina Wang, Yibo Xu, Liming Zhai, Yanzhen Ren, Bo Du:
A posterior evaluation algorithm of steganalysis accuracy inspired by residual co-occurrence probability. Pattern Recognit. 87: 106-117 (2019) - [j6]Yanzhen Ren, Hanyi Yang, Hongxia Wu, Weiping Tu, Lina Wang:
A Secure AMR Fixed Codebook Steganographic Scheme Based on Pulse Distribution Model. IEEE Trans. Inf. Forensics Secur. 14(10): 2649-2661 (2019) - [c7]Liming Zhai, Lina Wang, Yanzhen Ren:
Multi-domain Embedding Strategies for Video Steganography by Combining Partition Modes and Motion Vectors. ICME 2019: 1402-1407 - [i1]Yanzhen Ren, Dengkai Liu, Qiaochu Xiong, Jianming Fu, Lina Wang:
Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram. CoRR abs/1901.06838 (2019) - 2018
- [j5]Yanzhen Ren, Hongxia Wu, Lina Wang:
An AMR adaptive steganography algorithm based on minimizing distortion. Multim. Tools Appl. 77(10): 12095-12110 (2018) - [c6]Yanzhen Ren, Weiman Zheng, Lina Wang:
SILK Steganography Scheme Based on the Distribution of LSF Parameter. APSIPA 2018: 539-548 - 2017
- [j4]Ming Tang, Zhipeng Guo, Annelie Heuser, Yanzhen Ren, Jie Li, Jean-Luc Danger:
PFD - A Flexible Higher-Order Masking Scheme. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(8): 1327-1339 (2017) - [j3]Yanzhen Ren, Jing Yang, Jinwei Wang, Lina Wang:
AMR Steganalysis Based on Second-Order Difference of Pitch Delay. IEEE Trans. Inf. Forensics Secur. 12(6): 1345-1357 (2017) - [c5]Liming Zhai, Lina Wang, Yanzhen Ren:
Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC. IH&MMSec 2017: 135-146 - [c4]Yanzhen Ren, Qiaochu Xiong, Lina Wang:
A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame. IWDW 2017: 217-231 - 2016
- [j2]Yanzhen Ren, Mengdi Fan, Dengpan Ye, Jing Yang, Lina Wang:
Detection of double MP3 compression Based on Difference of Calibration Histogram. Multim. Tools Appl. 75(21): 13855-13870 (2016) - [c3]Yanzhen Ren, Qiaochu Xiong, Lina Wang:
Steganalysis of AAC using calibrated Markov model of adjacent codebook. ICASSP 2016: 2139-2143 - 2015
- [j1]Yanzhen Ren, Tingting Cai, Ming Tang, Lina Wang:
AMR Steganalysis Based on the Probability of Same Pulse Position. IEEE Trans. Inf. Forensics Secur. 10(9): 1801-1811 (2015) - 2014
- [c2]Yanzhen Ren, Liming Zhai, Lina Wang, Tingting Zhu:
Video steganalysis based on subtractive probability of optimal matching feature. IH&MMSec 2014: 83-90
2000 – 2009
- 2008
- [c1]Yanzhen Ren, Ruimin Hu, Haojun Ai:
An Asymmetric Multicast Fingerprinting Scheme Based on Secret Sharing. IIH-MSP 2008: 211-214
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint