default search action
Xiaowei Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Yewei Gu, Xianfeng Zhao, Xiaowei Yi:
RLVC: Robust and Lightweight Voice Conversion Using Cross-Adaptive Instance Normalization. ICME 2024: 1-6 - [c22]Kangwei Liu, Xiaowei Yi, Xianfeng Zhao:
ProDub: Progressive Growing of Facial Dubbing Networks for Enhanced Lip Sync and Fidelity. ICME 2024: 1-6 - 2023
- [c21]Jinghong Zhang, Xiaowei Yi, Xianfeng Zhao:
A Compressed Synthetic Speech Detection Method with Compression Feature Embedding. INTERSPEECH 2023: 5376-5380 - [c20]Yewei Gu, Xianfeng Zhao, Xiaowei Yi:
Robust Feature Decoupling in Voice Conversion by Using Locality-Based Instance Normalization. INTERSPEECH 2023: 5471-5475 - [c19]Houchen Pu, Xiaowei Yi, Bowen Yang, Xianfeng Zhao, Changjun Liu:
Inversion Image Pairs for Anti-forensics in the Frequency Domain. IWDW 2023: 180-193 - 2022
- [j8]Jie Li, Chuli Hu, Xiaowei Yi, Ke Wang, Nengcheng Chen:
OCAGraph: An effective observation capability association model for Earth observation sensor planning. Int. J. Appl. Earth Obs. Geoinformation 114: 103038 (2022) - [j7]Yunzhao Yang, Xiaowei Yi, Xianfeng Zhao, Jinghong Zhang:
A fast and secure MP3 steganographic scheme with multi-domain. Signal Process. 190: 108332 (2022) - [j6]Ziyu Liu, Xiaowei Yi, Xianfeng Zhao, Yunzhao Yang:
Content-Aware Robust JPEG Steganography for Lossy Channels Using LPCNet. IEEE Signal Process. Lett. 29: 2253-2257 (2022) - [c18]Zhenyu Zhang, Xianfeng Zhao, Xiaowei Yi:
Improving Robustness of Speech Anti-Spoofing System Using Resnext with Neighbor Filters. ICME 2022: 1-6 - [c17]Yewei Gu, Xianfeng Zhao, Xiaowei Yi, Junchao Xiao:
Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder. IWDW 2022: 53-67 - 2021
- [c16]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
Fake Speech Detection Using Residual Network with Transformer Encoder. IH&MMSec 2021: 13-22 - [c15]Zhenyu Zhang, Yewei Gu, Xiaowei Yi, Xianfeng Zhao:
FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection. IWDW 2021: 117-131 - [i2]Zhenyu Zhang, Yewei Gu, Xiaowei Yi, Xianfeng Zhao:
FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection. CoRR abs/2110.09441 (2021) - [i1]Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao, Xiaowei Yi:
Vision Transformer Based Video Hashing Retrieval for Tracing the Source of Fake Videos. CoRR abs/2112.08117 (2021) - 2020
- [j5]Yuntao Wang, Xiaowei Yi, Xianfeng Zhao:
MP3 steganalysis based on joint point-wise and block-wise correlations. Inf. Sci. 512: 1118-1133 (2020) - [j4]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
An AAC steganography scheme for adaptive embedding with distortion minimization model. Multim. Tools Appl. 79(37-38): 27777-27790 (2020) - [j3]Yunzhao Yang, Haibo Yu, Xianfeng Zhao, Xiaowei Yi:
An Adaptive Double-Layered Embedding Scheme for MP3 Steganography. IEEE Signal Process. Lett. 27: 1984-1988 (2020) - [c14]Yewei Gu, Xianfeng Zhao, Chen Gong, Xiaowei Yi:
Deepfake Video Detection Using Audio-Visual Consistency. IWDW 2020: 168-180 - [d1]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
GAN based synthesized audio dataset. IEEE DataPort, 2020
2010 – 2019
- 2019
- [j2]Xiaowei Yi, Kun Yang, Xianfeng Zhao, Yuntao Wang, Haibo Yu:
AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model. IEEE Trans. Inf. Forensics Secur. 14(8): 2217-2231 (2019) - [c13]Yuntao Wang, Xiaowei Yi, Xianfeng Zhao, Ante Su:
RHFCN: : Fully CNN-based Steganalysis of MP3 with Rich High-pass Filtering. ICASSP 2019: 2627-2631 - [c12]Chen Gong, Xiaowei Yi, Xianfeng Zhao, Yi Ma:
Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position. IH&MMSec 2019: 2-13 - [c11]Yunzhao Yang, Yuntao Wang, Xiaowei Yi, Xianfeng Zhao, Yi Ma:
Defining Joint Embedding Distortion for Adaptive MP3 Steganography. IH&MMSec 2019: 14-24 - [c10]Jinghong Zhang, Xiaowei Yi, Xianfeng Zhao, Yun Cao:
Light Multiscale Conventional Neural Network for MP3 Steganalysis. IWDW 2019: 43-56 - [c9]Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao:
Improving Audio Steganalysis Using Deep Residual Networks. IWDW 2019: 57-70 - 2018
- [c8]Yuntao Wang, Kun Yang, Xiaowei Yi, Xianfeng Zhao, Zhoujun Xu:
CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain. IH&MMSec 2018: 55-65 - [c7]Chen Gong, Xiaowei Yi, Xianfeng Zhao:
Pitch Delay Based Adaptive Steganography for AMR Speech Stream. IWDW 2018: 275-289 - 2017
- [c6]Kun Yang, Xiaowei Yi, Xianfeng Zhao, Linna Zhou:
Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution. IWDW 2017: 202-216 - 2014
- [j1]Xiaowei Yi, Gang Zheng, Mingyu Li, Hengtai Ma, Changwen Zheng:
Efficient authentication of scalable media streams over wireless networks. Multim. Tools Appl. 71(3): 1913-1935 (2014) - [c5]Yong Fu, Xiaowei Yi, Hengtai Ma, Xiaowei Yi:
An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding. MFI 2014: 1-7 - [c4]Yong Fu, Xiaowei Yi, Hengtai Ma, Xiaowei Yi:
An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding. MFI 2014: 1-7 - [c3]Hengtai Ma, Xiaowei Yi, Xiaohui Wu, Dingfeng Gu, Hui Pan, Changwen Zheng:
A capacity self-adaption information hiding algorithm based on RS code. MFI 2014: 1-8 - 2013
- [c2]Xiaowei Yi, Yong Fu, Hengtai Ma, Changwen Zheng:
Joint FEC codes and hash chains for optimizing authentication of JPEG2000 image streaming. ICME 2013: 1-6 - 2012
- [c1]Xiaowei Yi, Mingyu Li, Gang Zheng, Changwen Zheng:
Quality-Optimized Authentication of Scalable Media Streams with Flexible Transcoding over Wireless Networks. MUSIC 2012: 148-153
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint