×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Faculty of Science and Tech...
1
Research outside affiliate...
14
Authors
WANG Tian
11
WANG Qingguo
3
CHEN Jiaxing
1
Document Type
Journal article
12
Conference paper
3
Patent
1
Date Issued
2025
2
2019
2
2018
1
2017
2
2016
3
2015
6
More...
Language
英语English
15
中文Chinese
1
Indexed By
SCIE
10
CPCI-S
3
ESCI
2
Funding Organization
Keyword
Steganography
6
Steganalysis
4
Voice over IP
3
Covert communication
2
Markov chain
2
steganography
2
More...
Source Publication
Signal Processing
2
2016 1st IEEE International...
1
Computer Communications
1
IEEE/CAA Journal of Automat...
1
ISA Transactions
1
International Journal of In...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 16
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Recursive hierarchical parametric identification of Wiener-Hammerstein systems based on initial value optimization
Journal article
ISA Transactions,2025, volume: 158, pages: 697-714
Authors:
Li, Qiangya
;
Liu, Tao
;
Na, Jing
;
Shang, Chao
;
Tan, Yonghong
Favorite
  |  
View/Download:39/0
  |  
Submit date:2025/05/06
Adaptive forgetting factors
Auxiliary model
Initial value optimization
Recursive hierarchical least-squares
Wiener-Hammerstein system
Deep Reinforcement Learning Algorithm with Long Short-Term Memory Network for Optimizing Unmanned Aerial Vehicle Information Transmission
Journal article
Mathematics,2025, volume: 13, issue: 1
Authors:
He, Yufei
;
Hu, Ruiqi
;
Liang, Kewei
;
Liu, Yonghong
;
Zhou, Zhiyuan
Favorite
  |  
View/Download:4/0
  |  
Submit date:2025/03/10
deep reinforcement learning (DRL)
long short-term memory (LSTM)
nonconvex optimization
optimal control
unmanned aerial vehicle (UAV)
Discrepant gut microbiota markers for the classification of obesity-related metabolic abnormalities
Journal article
Scientific Reports,2019, volume: 9, issue: 1
Authors:
Zeng, Qiang
;
Li, Dongfang
;
He, Yuan
;
Li, Yinhu
;
Yang, Zhenyu
Favorite
  |  
View/Download:8/0
  |  
Submit date:2022/05/18
Novel identification approach for nonlinear systems with hysteresis
Journal article
Nonlinear Dynamics,2019, volume: 95, issue: 2, pages: 1053-1066
Authors:
Nie, Zhuoyun
;
Liu, Ruijuan
;
Wang, Qingguo
;
Guo, Dongsheng
;
Ma, Yijing
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/07/14
Bouc–Wen model
Hysteresis
Nonlinear system identification
Steganalysis of inactive voice-over-IP frames based on poker test
Journal article
Symmetry,2018, volume: 10, issue: 8
Authors:
Liu, Jie
;
Tian, Hui
;
Chang, Chin Chen
;
Wang, Tian
;
Chen, Yonghong
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/12/02
G.723.1
Inactive frame
Poker test
Steganalysis
Voice over Internet Protocol (VoIP)
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs
Journal article
Signal Processing,2017, volume: 134, pages: 9-22
Authors:
Tian, Hui
;
Wu, Yanpeng
;
Chang, Chin Chen
;
Huang, Yongfeng
;
Chen, Yonghong
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Adaptive boosting
Adaptive multi-rate speech
Pulse-pair statistical characteristics
Steganalysis
Steganography
Support vector machine
Distributed steganalysis of compressed speech
Journal article
Soft Computing,2017, volume: 21, issue: 3, pages: 795-804
Authors:
Tian, Hui
;
Wu, Yanpeng
;
Cai, Yiqiao
;
Huang, Yongfeng
;
Liu, Jin
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/12/02
Compressed speech
Covert communication
Steganalysis
Steganography
Voice over IP
A novel secure message delivery and authentication method for vehicular ad hoc networks
Conference paper
2016 1st IEEE International Conference on Computer Communication and the Internet, ICCCI 2016, Wuhan, CHINA, OCT 13-15, 2016
Authors:
Liu, Huaijin
;
Chen, Yonghong
;
Tian, Hui
;
Wang, Tian
;
Cai, Yiqiao
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/12/02
aggregate MAC
authentication
dissemination
security
VANET
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics
Journal article
Security and Communication Networks,2016, volume: 9, issue: 15, pages: 2934-2944
Authors:
Tian, Hui
;
Wu, Yanpeng
;
Chang, Chin Chen
;
Huang, Yongfeng
;
Liu, Jin
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/12/02
analysis-by-synthesis speech
fixed codebook index
Markov chain
steganalysis
steganography
Identification and PID control for a class of delay fractional-order systems
Journal article
IEEE/CAA Journal of Automatica Sinica,2016, volume: 3, issue: 4, pages: 463-476
Authors:
Nie, Zhuoyun
;
Wang, Qingguo
;
Liu, Ruijuan
;
Lan, Yonghong
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/07/15
Fractional-order system
identification
PID control
time delay
Titanium billet heating furnace