Blind and Robust Audio Watermarking Scheme Based on SVD–DCT BY Lei, IY Soon, Z Li Signal Processing 91 (8), 1973-1984, 2011 | 218 | 2011 |
A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition B Lei, Y Soon, F Zhou, Z Li, H Lei Signal processing 92 (9), 1985-2001, 2012 | 183 | 2012 |
A Comparative Study of Mobile-based Landmark Recognition Techniques KH Yap, T Chen, Z Li, K Wu Intelligent Systems, IEEE 25 (1), 48-57, 2010 | 61 | 2010 |
Deepsim: Gps spoofing detection on uavs using satellite imagery matching N Xue, L Niu, X Hong, Z Li, L Hoffaeller, C Pöpper Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 57 | 2020 |
A New Blind Robust Image Watermarking Scheme in SVD-DCT Composite Domain Z Li, KH Yap, BY Lei 18th IEEE International Conference on Image Processing (ICIP), 2757-2760, 2011 | 46 | 2011 |
A Survey on Mobile Landmark Recognition for Information Retrieval T Chen, K Wu, KH Yap, Z Li, FS Tsai 10-th International Conference on Mobile Data Management: Systems, Services …, 2009 | 39 | 2009 |
Pornographic images detection based on CBIR and skin analysis B Liu, J Su, Z Lu, Z Li International Conference on Semantics, Knowledge and Grid (SKG), 487-488, 2008 | 39 | 2008 |
Reversible Data Hiding for 3D Meshes in the PVQ-compressed Domain Z Sun, ZM Lu, Z Li International Conference on Intelligent Information Hiding and Multimedia …, 2006 | 31 | 2006 |
Automatic fine-grained access control in SCADA by machine learning L Zhou, C Su, Z Li, Z Liu, GP Hancke Future Generation Computer Systems 93, 548--559, 2019 | 28 | 2019 |
3D Mesh Model Coding, Streaming media architectures, techniques, and applications: Recent Advances L Zhen IGI Global, 2010 | 27* | 2010 |
Citrus disease recognition based on weighted scalable vocabulary tree XL Deng, Z Li, XL Deng, TS Hong Precision agriculture 15, 321-330, 2014 | 23 | 2014 |
High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain ZM Lu, Z Li 7-th International Workshop on Digital Watermarking, 233-243, 2007 | 22 | 2007 |
Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU J Lu, Z Li, M Henricksen Applied Cryptography and Network Security, 350-369, 2015 | 19 | 2015 |
Fast Codevector Search Scheme for 3D Mesh Model Vector Quantisation Z Li, ZM Lu Electronics Letters 44 (2), 104-105, 2008 | 19 | 2008 |
Recognition of grape leaf diseases using MobileNetV3 and deep transfer learning X Yin, W Li, Z Li, L Yi International Journal of Agricultural and Biological Engineering 15 (3), 184-194, 2022 | 16 | 2022 |
Multiple Object Tracking with GRU Association and Kalman Prediction Z Li, S Cai, X Wang, H Shao, L Niu, N Xue 2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021 | 16 | 2021 |
An Efficient Approach for Scene Categorization Based on Discriminative Codebook Learning in Bag-of-Words Framework Z Li, KH Yap Image and Vision Computing 31 (10), 748-755, 2013 | 15 | 2013 |
Efficient Mobile Landmark Recognition Based on Saliency-aware Scalable Vocabulary Tree KH Yap, Z Li, DJ Zhang, ZK Ng 20th ACM International Conference on Multimedia, 1001-1004, 2012 | 14 | 2012 |
Content and context boosting for mobile landmark recognition Z Li, KH Yap IEEE Signal Processing Letters 19 (8), 459-462, 2012 | 14 | 2012 |
Progressive learning algorithm for efficient person re-identification Z Li, H Shao, L Niu, N Xue 2020 25th International Conference on Pattern Recognition (ICPR), 16-23, 2021 | 13 | 2021 |