The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

H. Vicky Zhao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. H. Vicky Zhao, K. J. Ray Liu
    Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2005, pp:85-88 [Conf]
  2. H. Vicky Zhao, K. J. Ray Liu
    Risk minimization in traitors within traitors in multimedia forensics. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2005, pp:89-92 [Conf]
  3. Z. Jane Wang, Min Wu, H. Vicky Zhao, Wade Trappe, K. J. Ray Liu
    Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2005, v:14, n:6, pp:804-821 [Journal]
  4. H. Vicky Zhao, K. J. Ray Liu
    Fingerprint multicast in secure video streaming. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2006, v:15, n:1, pp:12-29 [Journal]
  5. H. Vicky Zhao, Min Wu, Z. Jane Wang, K. J. Ray Liu
    Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2005, v:14, n:5, pp:646-661 [Journal]
  6. W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
    Scalable Multimedia Fingerprinting Forensics with Side Information. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:2293-2296 [Conf]
  7. H. Vicky Zhao, K. J. Ray Liu
    Selfish Colluder Detection and Identification in Traitors within Traitors. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:2289-2292 [Conf]
  8. K. J. Ray Liu, H. Vicky Zhao
    Behavior Forensics in Traitors within Traitors for Scalable Multimedia. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:2285-2288 [Conf]

  9. Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics. [Citation Graph (, )][DBLP]


  10. Game-theoretic analysis of maximum-payoff multiuser collusion. [Citation Graph (, )][DBLP]


  11. Fairness dynamics in multimedia colluders' social networks. [Citation Graph (, )][DBLP]


  12. Pollution-resistant peer-to-peer live streaming using trust management. [Citation Graph (, )][DBLP]


  13. Image Source Coding Forensics via Intrinsic Fingerprints. [Citation Graph (, )][DBLP]


  14. An Efficient Key Management Scheme for Live Streaming. [Citation Graph (, )][DBLP]


  15. A game theoretic framework for incentive-based peer-to-peer live-streaming social networks. [Citation Graph (, )][DBLP]


  16. Cheat-proof cooperation strategies for wireless live streaming social networks. [Citation Graph (, )][DBLP]


  17. Time-sensitive behavior dynamics in multimedia fingerprinting social networks. [Citation Graph (, )][DBLP]


  18. Block Size Forensic Analysis in Digital Images. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002