default search action
Canghong Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Xiaojie Li, Xin Fei, Zhe Yan, Hongping Ren, Canghong Shi, Xian Zhang, Imran Mumtaz, Yong Luo, Xi Wu:
CAGAN: Classifier-augmented generative adversarial networks for weakly-supervised COVID-19 lung lesion localisation. IET Comput. Vis. 18(1): 1-14 (2024) - [j17]Xiangyi Liu, Xiaojie Li, Xianhua Niu, Canghong Shi, Ling Xiong, Qian Qing, Yushi Liu, Tianyu Yang:
Robust audio watermarking algorithm resisting cropping based on SIFT transform. Multim. Tools Appl. 83(14): 40657-40676 (2024) - [j16]Xiangyi Liu, Xiaojie Li, Canghong Shi, Xianhua Niu, Ling Xiong:
A novel SVD-based adaptive robust audio watermarking algorithm. Multim. Tools Appl. 83(27): 69443-69465 (2024) - 2023
- [j15]Xin Fei, Xiaojie Li, Canghong Shi, Hongping Ren, Imran Mumtaz, Jun Guo, Yu Wu, Yong Luo, Jiancheng Lv, Xi Wu:
Dual-feature Fusion Attention Network for Small Object Segmentation. Comput. Biol. Medicine 160: 106985 (2023) - [j14]Yang Zhang, Xian Zhang, Canghong Shi, Xi Wu, Xiaojie Li, Jing Peng, Kunlin Cao, Jiancheng Lv, Jiliu Zhou:
Pluralistic Face Inpainting With Transformation of Attribute Information. IEEE Trans. Multim. 25: 7967-7979 (2023) - [c11]Dongyu Wang, Canghong Shi, Junrong Li, Jiaxin Gan, Xianhua Niu, Ling Xiong:
M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC. IAIC (1) 2023: 220-234 - 2022
- [j13]Yuqi Song, Xiaojie Li, Canghong Shi, Shihao Feng, Xin Wang, Yong Luo, Xi Wu:
Rethinking CAM in Weakly-Supervised Semantic Segmentation. IEEE Access 10: 126440-126450 (2022) - [j12]Yongpeng Ren, Hongping Ren, Canghong Shi, Xian Zhang, Xi Wu, Xiaojie Li, Jiancheng Lv, Jiliu Zhou, Imran Mumtaz:
Multistage semantic-aware image inpainting with stacked generator networks. Int. J. Intell. Syst. 37(2): 1599-1617 (2022) - [j11]Juan Chen, Peng Chen, Xianhua Niu, Zongling Wu, Ling Xiong, Canghong Shi:
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning. J. Cloud Comput. 11: 90 (2022) - [j10]Xian Zhang, Xin Wang, Canghong Shi, Zhe Yan, Xiaojie Li, Bin Kong, Siwei Lyu, Bin Zhu, Jiancheng Lv, Youbing Yin, Qi Song, Xi Wu, Imran Mumtaz:
DE-GAN: Domain Embedded GAN for High Quality Face Image Inpainting. Pattern Recognit. 124: 108415 (2022) - [j9]Canghong Shi, Yongpeng Ren, Xiaojie Li, Imran Mumtaz, Zhiheng Jin, Hongping Ren:
Image outpainting guided by prior structure information. Pattern Recognit. Lett. 164: 112-118 (2022) - [c10]Zhe Yan, Canghong Shi, Xiaojie Li, Baolei Xu:
CAM-Guided Spatially Denormalization for Lesion Weakly-Supervised Localization. DSIT 2022: 1-6 - [c9]Juan Chen, Zongling Wu, Lei Wu, Yunni Xia, Yang Wang, Ling Xiong, Canghong Shi:
Hybrid Decision Based Multi-Agent Deep Reinforcement learning for Task Offloading in Collaborative Edge-Cloud Computing. HPCC/DSS/SmartCity/DependSys 2022: 228-235 - 2021
- [j8]Xian Zhang, Canghong Shi, Xin Wang, Xi Wu, Xiaojie Li, Jiancheng Lv, Imran Mumtaz:
Face inpainting based on GAN by facial prediction and fusion as guidance information. Appl. Soft Comput. 111: 107626 (2021) - [j7]Canghong Shi, Hongxia Wang, Yi Hu, Xiaojie Li:
A novel NMF-based authentication scheme for encrypted speech in cloud computing. Multim. Tools Appl. 80(17): 25773-25798 (2021) - 2020
- [j6]Canghong Shi, Xiaojie Li, Hongxia Wang:
A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries. IEEE Access 8: 22249-22265 (2020) - [j5]Canghong Shi, Xiaojie Li, Jiancheng Lv, Jing Yin, Imran Mumtaz:
Robust geodesic based outlier detection for class imbalance problem. Pattern Recognit. Lett. 131: 428-434 (2020) - [j4]Feng Guo, Canghong Shi, Xiaojie Li, Xi Wu, Jiliu Zhou, Jiancheng Lv:
Image segmentation of nasopharyngeal carcinoma using 3D CNN with long-range skip connection and multi-scale feature pyramid. Soft Comput. 24(16): 12671-12680 (2020) - [i1]Xian Zhang, Xin Wang, Bin Kong, Youbing Yin, Qi Song, Siwei Lyu, Jiancheng Lv, Canghong Shi, Xiaojie Li:
Domain Embedded Multi-model Generative Adversarial Networks for Image-based Face Inpainting. CoRR abs/2002.02909 (2020)
2010 – 2019
- 2019
- [j3]Canghong Shi, Hongxia Wang, Yi Hu, Qing Qian, Hong Zhao:
A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing. KSII Trans. Internet Inf. Syst. 13(5): 2588-2609 (2019) - [c8]Xianyu Wu, Canghong Shi, Xiaojie Li, Jia He, Xi Wu, Jiancheng Lv, Jiliu Zhou:
PWGAN: wasserstein GANs with perceptual loss for mode collapse. ACM TUR-C 2019: 151:1-151:7 - [c7]Chao Luo, Canghong Shi, Xian Zhang, Jing Peng, Xiaojie Li, Yucheng Chen:
AMCNet: Attention-Based Multiscale Convolutional Network for DCM MRI Segmentation. COMPSAC (2) 2019: 434-439 - [c6]Xianyu Wu, Shihao Feng, Xiaojie Li, Jing Yin, Jiancheng Lv, Canghong Shi:
TL-GAN: Generative Adversarial Networks with Transfer Learning for Mode Collapse (S). SEKE 2019: 723-777 - 2018
- [j2]Dongmei Niu, Hongxia Wang, Minquan Cheng, Canghong Shi:
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction. Secur. Commun. Networks 2018: 2516324:1-2516324:12 (2018) - [j1]Qing Qian, Hongxia Wang, Xingming Sun, Yunhe Cui, Huan Wang, Canghong Shi:
Speech authentication and content recovery scheme for security communication and storage. Telecommun. Syst. 67(4): 635-649 (2018) - [c5]Feng Guo, Canghong Shi, Xiaojie Li, Jia He, Xi Wu:
Outlier Detection Based on the Data Structure. IJCNN 2018: 1-6 - 2016
- [c4]Qing Qian, Hongxia Wang, Canghong Shi, Huan Wang:
An efficient content authentication scheme in encrypted speech based on integer wavelet transform. APSIPA 2016: 1-8 - [c3]Canghong Shi, Hongxia Wang, Qing Qian, Huan Wang:
Privacy Protection of Digital Speech Based on Homomorphic Encryption. ICCCS (1) 2016: 365-376 - [c2]Huan Wang, Hongxia Wang, Canghong Shi:
An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT. ICCCS (2) 2016: 417-429 - [c1]Qing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang, Canghong Shi:
Speech Authentication and Recovery Scheme in Encrypted Domain. IWDW 2016: 46-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint