default search action
Hongying Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j15]Yawen Huang, Hongying Zheng, Di Xiao:
Convolutional neural networks tamper detection and location based on fragile watermarking. Appl. Intell. 53(20): 24056-24067 (2023) - [j14]Baokun Qin, Hongying Zheng, Di Xiao:
High-capacity data hiding in encrypted images based on compressive sensing and intra-block difference coding. Appl. Intell. 53(21): 26240-26254 (2023) - [j13]Xian Zhou, You Zhao, Hongying Zheng, Xiaofeng Liao:
Neurodynamic approaches with derivative feedback for sparse signal reconstruction. Neural Comput. Appl. 35(13): 9501-9515 (2023) - 2021
- [j12]Hongying Zheng, Zhiqiang Zhou, Jianyong Chen:
RLSTM: A New Framework of Stock Prediction by Using Random Noise for Overfitting Prevention. Comput. Intell. Neurosci. 2021: 8865816:1-8865816:14 (2021) - 2020
- [j11]Di Xiao, Min Li, Hongying Zheng:
Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing. Sensors 20(5): 1517 (2020) - [j10]Di Xiao, Fei Li, Mengdi Wang, Hongying Zheng:
A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery. IEEE Signal Process. Lett. 27: 296-300 (2020) - 2017
- [j9]Di Xiao, Yanping Xiang, Hongying Zheng, Yong Wang:
Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J. Vis. Commun. Image Represent. 45: 1-10 (2017) - 2015
- [j8]Di Xiao, Shulei Hu, Hongying Zheng:
A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multim. Tools Appl. 74(6): 2109-2126 (2015) - [j7]Hongying Zheng, Quan Yuan, Jianyong Chen:
A framework for protecting personal information and privacy. Secur. Commun. Networks 8(16): 2867-2874 (2015) - 2014
- [j6]Hongying Zheng, Gang Peng, Jianyong Chen, Caicai Zhang, James W. Minett, William S.-Y. Wang:
The Influence of Tone Inventory on ERP without Focal Attention: A Cross-Language Study. Comput. Math. Methods Medicine 2014: 961563:1-961563:7 (2014) - [j5]Bo Wang, Jianyong Chen, Songsong Jia, Chunli Lv, Xiaomin Wang, Hongying Zheng:
Secret sharing scheme with dynamic size of shares for distributed storage system. Secur. Commun. Networks 7(8): 1245-1252 (2014) - 2012
- [j4]James W. Minett, Hongying Zheng, Manson Cheuk-Man Fong, Lin Zhou, Gang Peng, William S.-Y. Wang:
A Chinese Text Input Brain-Computer Interface Based on the P300 Speller. Int. J. Hum. Comput. Interact. 28(7): 472-483 (2012) - 2011
- [j3]Fei Chen, Xiaofeng Liao, Tao Xiang, Hongying Zheng:
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN. Inf. Sci. 181(22): 5110-5118 (2011) - [j2]Hongying Zheng, Meiju Hou, Yu Wang:
An Efficient Hybrid Clustering-PSO Algorithm for Anomaly Intrusion Detection. J. Softw. 6(12): 2350-2360 (2011) - 2010
- [j1]Gang Peng, Hongying Zheng, Tao Gong, Ruo-Xiao Yang, Jiangping Kong, William S.-Y. Wang:
The influence of language experience on categorical perception of pitch contours. J. Phonetics 38(4): 616-624 (2010)
Conference and Workshop Papers
- 2024
- [c13]Rui Xiong, Hongying Zheng, Zongbing Wang:
A Novel Graph Neural Network Based Model for Text Classification. ICANN (7) 2024: 64-78 - 2023
- [c12]Zhenya He, Hongying Zheng, Haolun Yuan, Xianmin Zhang:
An Orientation Measurement Method for Industrial Robots Based on Laser Tracker. ICIRA (9) 2023: 273-283 - 2022
- [c11]Zichao Xu, Hongying Zheng, Jianyong Chen:
Opemod: An Optimal Performance Selection Model for Prediction of Non-stationary Financial Time Series. ICANN (1) 2022: 304-315 - [c10]Hongying Zheng, Yawen Huang, Lin Li, Di Xiao:
Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds. MMM (2) 2022: 382-393 - 2021
- [c9]Shaobo Hu, Hongying Zheng, Jianyong Chen:
A Novel Deep Reinforcement Learning Framework for Stock Portfolio Optimization. ICONIP (5) 2021: 205-212 - 2020
- [c8]Xuansheng Wang, Beidun Chen, Jianqiang Sheng, Hongying Zheng, Tangren Dan, Xianfeng Wu:
An Improved Lanczos Algorithm for Principal Component Analysis. ICCDE 2020: 70-74 - [c7]Xuansheng Wang, Weibin Zeng, Hongying Zheng, Tangren Dan, Huazhong Li, Jianqiang Sheng:
A Two-step Feature Extraction Algorithm for Face Recognition. ICCDE 2020: 154-158 - 2011
- [c6]Hongying Zheng, Ching-Pong Au, William S.-Y. Wang:
The Influence of Linguistic Background on Asymmetric Tone Perception Induced by Position of Context. ICPhS 2011: 2312-2315 - 2008
- [c5]Hongying Zheng, William S.-Y. Wang:
An ERP study on categorical perception of lexical tones and nonspeech pitches. INTERSPEECH 2008: 1096 - 2007
- [c4]Hongying Zheng, Peter W. M. Tsang, William S.-Y. Wang:
Categorical perception of Cantonese tones in context: a cross-linguistic study. INTERSPEECH 2007: 2745-2748 - [c3]Jiyun Yang, Xiaofeng Liao, Shaojiang Deng, Miao Yu, Hongying Zheng:
Neural Networks Based Image Recognition: A New Approach. ISNN (2) 2007: 724-729 - 2005
- [c2]Hongying Zheng, Lin Ni, Di Xiao:
Intrusion Detection Based on MLP Neural Networks and K-Means Algorithm. ISNN (3) 2005: 434-438 - 2004
- [c1]Gang Peng, Hongying Zheng, William S.-Y. Wang:
Tone recognition for Chinese speech: a comparative study of Mandarin and Cantonese. ISCSLP 2004: 233-236
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint