default search action
Songbin Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Jingang Wang, Ke Shi, Songbin Li:
Two-Stage Collaborative Sea Clutter Suppression Based on Subregion Gazing and Reconstruction. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j21]Songbin Li, Jingang Wang, Peng Liu, Ke Shi:
SANet: A Compressed Speech Encoder and Steganography Algorithm Independent Steganalysis Deep Neural Network. IEEE ACM Trans. Audio Speech Lang. Process. 32: 680-690 (2024) - [j20]Jingang Wang, Songbin Li:
Maritime Radar Target Detection Model Self-Evolution Based on Semisupervised Learning. IEEE Trans. Geosci. Remote. Sens. 62: 1-11 (2024) - 2023
- [j19]Miao Wei, Songbin Li, Peng Liu, Yongfeng Huang, Qiandong Yan, Jingang Wang, Cheng Zhang:
Frame-level steganalysis of QIM steganography in compressed speech based on multi-dimensional perspective of codeword correlations. J. Ambient Intell. Humaniz. Comput. 14(7): 8421-8431 (2023) - [j18]Jingang Wang, Songbin Li:
Maritime Radar Target Detection in Sea Clutter Based on CNN With Dual-Perspective Attention. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j17]Songbin Li, Jingang Wang, Peng Liu:
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 1476-1487 (2023) - [c7]Zhixiao Qi, Yongfeng Huang, Jinzhu Wu, Songbin Li:
FoodS and FoodIM: Food-Testing Item Recommendation Models for Two Different Users with Different Usage Abilities. ASSE 2023: 1-9 - [c6]Minhao Bai, Yongfeng Huang, Jinshuai Yang, Kaiyi Pang, Songbin Li:
Exploration of the Effectiveness and Characteristics of ChatGPT in Steganalysis Tasks. ASSE 2023: 163-170 - [c5]Kaiqiao Wang, Peng Liu, Songbin Li, Jingang Wang, Cheng Zhang:
Speech Emotion Recognition Method Based on Cross-Layer Intersectant Fusion. IAIC (2) 2023: 271-285 - [c4]Songbin Li, Xiangzhi Yang, Jingang Wang:
Sea Surface Object Detection Based on Background Dynamic Perception and Cross-Layer Semantic Interaction. ICME 2023: 72-77 - [c3]Feng Huang, Qiang Huang, Yuetong Zhao, Zhixiao Qi, Bingkun Wang, Yongfeng Huang, Songbin Li:
A Three-Stage Framework for Event-Event Relation Extraction with Large Language Model. ICONIP (14) 2023: 434-446 - 2022
- [j16]Songbin Li, Jingang Wang, Peng Liu:
General Frame-Wise Steganalysis of Compressed Speech Based on Dual-Domain Representation and Intra-Frame Correlation Leaching. IEEE ACM Trans. Audio Speech Lang. Process. 30: 2025-2035 (2022) - [c2]Peng Liu, Songbin Li, Jigang Tang:
An End-to-End Macaque Voiceprint Verification Method Based on Channel Fusion Mechanism. INTERSPEECH 2022: 1501-1505 - 2021
- [j15]Jigang Tang, Songbin Li, Peng Liu:
A review of lane detection methods based on deep learning. Pattern Recognit. 111: 107623 (2021) - [j14]Songbin Li, Jingang Wang, Peng Liu, Miao Wei, Qiandong Yan:
Detection of Multiple Steganography Methods in Compressed Speech Based on Code Element Embedding, Bi-LSTM and CNN With Attention Mechanisms. IEEE ACM Trans. Audio Speech Lang. Process. 29: 1556-1569 (2021) - 2020
- [j13]Songbin Li, Peng Liu:
Detection and Forensics of Encryption Behavior of Storage File and Network Transmission Data. IEEE Access 8: 145833-145842 (2020) - [j12]Songbin Li, Qiandong Yan, Peng Liu:
An Efficient Fire Detection Method Based on Multiscale Feature Extraction, Implicit Deep Supervision and Channel Attention Mechanism. IEEE Trans. Image Process. 29: 8467-8475 (2020)
2010 – 2019
- 2019
- [j11]Jie Yang, Peng Liu, Songbin Li:
A Common Method for Detecting Multiple Steganographies in Low-Bit-Rate Compressed Speech Based on Bayesian Inference. IEEE Access 7: 128313-128324 (2019) - 2018
- [j10]Jie Yang, Songbin Li:
Steganalysis of joint codeword quantization index modulation steganography based on codeword Bayesian network. Neurocomputing 313: 316-323 (2018) - [j9]Jie Yang, Songbin Li:
An efficient information hiding method based on motion vector space encoding for HEVC. Multim. Tools Appl. 77(10): 11979-12001 (2018) - 2017
- [j8]Hai Huang, Songbin Li:
求解2-D Strip Packing问题的u-分组优化算法 (u-Block Optimization Algorithm for 2-D Strip Packing Problem). 计算机科学 44(5): 290-293 (2017) - [j7]Peng Liu, Songbin Li, Haiqiang Wang:
Steganography in vector quantization process of linear predictive coding for low-bit-rate speech codec. Multim. Syst. 23(4): 485-497 (2017) - [j6]Peng Liu, Songbin Li, Haiqiang Wang:
Steganography integrated into linear predictive coding for low bit-rate speech codec. Multim. Tools Appl. 76(2): 2837-2859 (2017) - [j5]Songbin Li, Yizhen Jia, C.-C. Jay Kuo:
Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals. IEEE ACM Trans. Audio Speech Lang. Process. 25(5): 1011-1022 (2017) - 2015
- [j4]Songbin Li, Jiangyun Fu, Peng Liu, Yuxin Jiang:
An Information Hiding Approach Based on Integer Transform Coefficient and Virtual Space Encoding for H.264/AVC. Circuits Syst. Signal Process. 34(11): 3573-3594 (2015) - 2014
- [j3]Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai:
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream. Ann. des Télécommunications 69(7-8): 461-473 (2014) - [j2]Hui Tian, Jin Liu, Songbin Li:
Improving security of quantization-index-modulation steganography in low bit-rate speech streams. Multim. Syst. 20(2): 143-154 (2014) - 2012
- [j1]Songbin Li, Huaizhou Tao, Yongfeng Huang:
Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis. J. Zhejiang Univ. Sci. C 13(8): 624-634 (2012)
2000 – 2009
- 2009
- [c1]Songbin Li, Jun Chen, Haojiang Deng, Jinglin Wang:
A Data-Intensive Multimedia Service Invoking Method Based on SOAP Extending. SSME 2009: 571-574
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint