default search action
Shenghong Li 0001
Person information
- affiliation: Shanghai Jiaotong University, Department of Electric and Electronic Engineering, China
- affiliation (PhD 1999): Beijing University of Posts and Telecommunications, China
Other persons with the same name
- Shenghong Li (aka: Sheng-Hong Li) — disambiguation page
- Shenghong Li 0002 — CSIRO, Data61, Australia (and 1 more)
- Shenghong Li 0003 (aka: Sheng-Hong Li 0003) — Huzhou University, Department of Mathematics, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Yongkang Jiang, Gaolei Li, Shenghong Li, Ying Guo:
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift. Comput. Secur. 139: 103706 (2024) - [j67]Ge Ren, Jun Wu, Gaolei Li, Shenghong Li, Mohsen Guizani:
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services. IEEE Trans. Dependable Secur. Comput. 21(2): 600-617 (2024) - [j66]Yongkang Jiang, Gaolei Li, Shenghong Li, Ying Guo, Kai Zhou:
Crowdsourcing Malware Family Annotation: Joint Class-Determined Tag Extraction and Weakly-Tagged Sample Inference. IEEE Trans. Netw. Serv. Manag. 21(4): 4763-4776 (2024) - [c62]Hongying Zhang, Gaolei Li, Shenghong Li, Hongfu Liu, Shuo Wang, Jianhua Li:
How to Efficiently Manage Critical Infrastructure Vulnerabilities? Toward Large Code-graph Models. LAMPS@CCS 2024: 25-34 - [c61]Ge Ren, Gaolei Li, Shenghong Li, Libo Chen, Kui Ren:
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token. NDSS 2024 - [c60]Hua Ding, Lixing Chen, Shenghong Li, Yang Bai, Pan Zhou, Zhe Qu:
Divide, Conquer, and Coalesce: Meta Parallel Graph Neural Network for IoT Intrusion Detection at Scale. WWW 2024: 1656-1667 - 2023
- [j65]Zhicong Yan, Shenghong Li, Zhongli Duan, Yuanyuan Zhao:
Robust deep semi-supervised learning with label propagation and differential privacy. Frontiers Comput. Sci. 5 (2023) - [j64]Gaolei Li, Jun Wu, Shenghong Li, Wu Yang, Changlian Li:
Multitentacle Federated Learning Over Software-Defined Industrial Internet of Things Against Adaptive Poisoning Attacks. IEEE Trans. Ind. Informatics 19(2): 1260-1269 (2023) - [j63]Wenwen Xia, Yuchen Li, Shenghong Li:
Graph Neural Point Process for Temporal Interaction Prediction. IEEE Trans. Knowl. Data Eng. 35(5): 4867-4879 (2023) - [j62]Wenwen Xia, Yuchen Li, Shenghong Li:
On the Substructure Countability of Graph Neural Networks. IEEE Trans. Knowl. Data Eng. 35(11): 11681-11692 (2023) - [c59]Zhicong Yan, Shenghong Li, Ruijie Zhao, Yuan Tian, Yuanyuan Zhao:
DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation. AsiaCCS 2023: 731-745 - [c58]Yongkang Jiang, Gaolei Li, Shenghong Li:
TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental Parsing. DSN 2023: 193-200 - [i5]Zhicong Yan, Shenghong Li, Ruijie Zhao, Yuan Tian, Yuanyuan Zhao:
DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation. CoRR abs/2306.08009 (2023) - 2022
- [j61]Xudie Ren, Shenghong Li, Hao Ge:
A parameter-free learning automaton scheme. Frontiers Neurorobotics 16 (2022) - [j60]Ying Guo, Chong Di, Shenghong Li:
A novel reduced parameter s-model of estimator learning automata in the switching non-stationary environment. Neural Comput. Appl. 34(9): 6811-6824 (2022) - [j59]Ying Guo, Shenghong Li:
A multi-Markovian switching-based strategy for solving the stochastic point location problem. Neural Comput. Appl. 34(9): 6825-6846 (2022) - [c57]Wenwen Xia, Yuchen Li, Wentian Guo, Shenghong Li:
Efficient Navigation for Constrained Shortest Path with Adaptive Expansion Control. ICDM 2022: 588-597 - 2021
- [j58]Jinchao Huang, Tong Li, Yidong Yuan, Shenghong Li:
M-GBDT2NN: A more generalized framework of GBDT2NN for online update. Ad Hoc Networks 112: 102361 (2021) - [j57]Chong Di, Fangqi Li, Shenghong Li, Jianwei Tian:
Bayesian inference based learning automaton scheme in Q-model environments. Appl. Intell. 51(10): 7453-7468 (2021) - [j56]Jinchao Huang, Guofu Li, Jianwei Tian, Shenghong Li:
Accurate Interpretation of the Online Learning Model for 6G-Enabled Internet of Things. IEEE Internet Things J. 8(20): 15228-15239 (2021) - [j55]Zhicong Yan, Jun Wu, Gaolei Li, Shenghong Li, Mohsen Guizani:
Deep Neural Backdoor in Semi-Supervised Learning: Threats and Countermeasures. IEEE Trans. Inf. Forensics Secur. 16: 4827-4842 (2021) - [j54]Chong Di, Qilian Liang, Fangqi Li, Shenghong Li, Fucai Luo:
An Efficient Parameter-Free Learning Automaton Scheme. IEEE Trans. Neural Networks Learn. Syst. 32(11): 4849-4863 (2021) - [c56]Zhicong Yan, Gaolei Li, Yuan Tian, Jun Wu, Shenghong Li, Mingzhe Chen, H. Vincent Poor:
DeHiB: Deep Hidden Backdoor Attack on Semi-supervised Learning via Adversarial Perturbation. AAAI 2021: 10585-10593 - [c55]Wenwen Xia, Yuchen Li, Jianwei Tian, Shenghong Li:
Forecasting Interaction Order on Temporal Graphs. KDD 2021: 1884-1893 - [c54]Wenwen Xia, Yuchen Li, Jun Wu, Shenghong Li:
DeepIS: Susceptibility Estimation on Social Networks. WSDM 2021: 761-769 - [i4]Ge Ren, Jun Wu, Gaolei Li, Shenghong Li:
Automatically Lock Your Neural Networks When You're Away. CoRR abs/2103.08472 (2021) - 2020
- [j53]Xudie Ren, Fucai Luo, Shenghong Li:
Mixed geometric loss for bounding box regression in object detection. J. Electronic Imaging 29(5): 053005 (2020) - [j52]Haonan Guo, Shenghong Li, Kaiyue Qi, Ying Guo, Zhengwu Xu:
Learning Automata Based Competition Scheme to Train Deep Neural Networks. IEEE Trans. Emerg. Top. Comput. Intell. 4(2): 151-158 (2020) - [j51]Chong Di, Fangqi Li, Shenghong Li:
Sensor Deployment for Wireless Sensor Networks: A Conjugate Learning Automata-Based Energy-Efficient Approach. IEEE Wirel. Commun. 27(5): 80-87 (2020) - [c53]Yongkang Jiang, Shenghong Li, Tong Li:
EM Meets Malicious Data: A Novel Method for Massive Malware Family Inference. ICBDT 2020: 74-79 - [c52]Wenwen Xia, Fangqi Li, Shenghong Li:
Gaussian Process Bandits for Online Influence Maximization. ICDM (Workshops) 2020: 106-113 - [i3]Jinchao Huang, Guofu Li, Zhicong Yan, Fucai Luo, Shenghong Li:
Joint learning of interpretation and distillation. CoRR abs/2005.11638 (2020) - [i2]Fangqi Li, Chong Di, Shenghong Li:
Influence Maximization on Dynamic Social Networks with Conjugate Learning Automata. CoRR abs/2010.10950 (2020) - [i1]Qianqian Pan, Jun Wu, Xi Zheng, Jianhua Li, Shenghong Li, Athanasios V. Vasilakos:
Leveraging AI and Intelligent Reflecting Surface for Energy-Efficient Communication in 6G IoT. CoRR abs/2012.14716 (2020)
2010 – 2019
- 2019
- [j50]Chong Di, Shenghong Li, Fangqi Li, Kaiyue Qi:
A Novel Framework for Learning Automata: A Statistical Hypothesis Testing Approach. IEEE Access 7: 27911-27922 (2019) - [j49]Haonan Guo, Shilin Wang, Jianxun Fan, Shenghong Li:
Learning Automata Based Incremental Learning Method for Deep Neural Networks. IEEE Access 7: 41164-41171 (2019) - [j48]Wenwen Xia, Chong Di, Haonan Guo, Shenghong Li:
Reinforcement Learning Based Stochastic Shortest Path Finding in Wireless Sensor Networks. IEEE Access 7: 157807-157817 (2019) - [j47]Chong Di, Bo Zhang, Qilian Liang, Shenghong Li, Ying Guo:
Learning Automata-Based Access Class Barring Scheme for Massive Random Access in Machine-to-Machine Communications. IEEE Internet Things J. 6(4): 6007-6017 (2019) - [j46]Ying Guo, Shenghong Li:
A Non-Monte-Carlo Parameter-Free Learning Automata Scheme Based on Two Categories of Statistics. IEEE Trans. Cybern. 49(12): 4153-4166 (2019) - [j45]Bin Li, Weisi Guo, Haijun Zhang, Chenglin Zhao, Shenghong Li, Arumugam Nallanathan:
Spectrum Detection and Link Quality Assessment for Heterogeneous Shared Access Networks. IEEE Trans. Veh. Technol. 68(2): 1431-1445 (2019) - [c51]Haiwei An, Chong Di, Shenghong Li:
Weight-Assignment Last-Position Elimination-Based Learning Automata. CSPS 2019: 348-354 - [c50]Weikai Sun, Yinghua Ma, Shenghong Li, Shiyi Zhang:
Similar Cluster Based Continuous Bag-of-Words for Word Vector Training. CSPS 2019: 911-918 - [c49]Hui Zhan, Shenghong Li, Haonan Guo:
A Deep Deformable Convolutional Method for Age-Invariant Face Recognition. CSPS 2019: 2029-2037 - [c48]Shiyi Zhang, Yinghua Ma, Shenghong Li, Weikai Sun:
Collaborative Attention Network for Natural Language Inference. CSPS 2019: 2343-2349 - [c47]Chong Di, Fangqi Li, Kaiyue Qi, Shenghong Li:
Maximizing Influence on Social Networks with Conjugate Learning Automata. GLOBECOM 2019: 1-6 - [c46]Xiao Yang, Xiuzhen Chen, Jin Ma, Shenghong Li:
An Information Diffusion Path Construction Algorithm Based on User Characteristics and Text Characteristics. ICMLC 2019: 1-7 - [c45]Yongkang Jiang, Shenghong Li, Yue Wu, Futai Zou:
A Novel Image-Based Malware Classification Model Using Deep Learning. ICONIP (2) 2019: 150-161 - 2018
- [j44]Jinchao Huang, Lin Zhu, Qilian Liang, Bo Fan, Shenghong Li:
Efficient Classification of Distribution-Based Data for Internet of Things. IEEE Access 6: 69279-69287 (2018) - [j43]Jinchao Huang, Lin Zhu, Bo Fan, Yihong Chen, Wen Jiang, Shenghong Li:
Large-Scale Price Interval Prediction at OTA Sites. IEEE Access 6: 69807-69817 (2018) - [j42]Haonan Guo, Shenghong Li, Bin Li, Yinghua Ma, Xudie Ren:
A New Learning Automata-Based Pruning Method to Train Deep Neural Networks. IEEE Internet Things J. 5(5): 3263-3269 (2018) - [c44]Chong Di, Mingda Guo, Jinchao Huang, Shenghong Li:
A Double Competitive Strategy-Based Learning Automata Algorithm. CSPS (3) 2018: 34-41 - [c43]Shuai Feng, Haonan Guo, Jichao Yang, Zhengwu Xu, Shenghong Li:
A Learning Automata-Based Compression Scheme for Convolutional Neural Network. CSPS (3) 2018: 42-49 - [c42]Zhuoran Han, Shenghong Li:
Research on Machine Translation Model Based on Neural Network. CSPS (3) 2018: 244-251 - [c41]Zhicong Yan, Shuai Feng, Fangqi Li, Zhengwu Xu, Shenghong Li:
A Multi-view Deep Learning Approach for Detecting Threats on 3D Human Body. CSPS (3) 2018: 286-294 - [c40]Haonan Guo, Zhicong Yan, Jichao Yang, Shenghong Li:
An Incremental Scheme with Weight Pruning to Train Deep Neural Network. CSPS (3) 2018: 295-302 - [c39]Yu Su, Kaiyue Qi, Chong Di, Yinghua Ma, Shenghong Li:
Learning Automata Based Feature Selection for Network Traffic Intrusion Detection. DSC 2018: 622-627 - [c38]Yichen Li, Yinghua Ma, Mingda Guo, Shenghong Li:
Anomaly Detection for Power Grid Flow Patterns Based on the Multi-restricted Boltzmann Machines. DSC 2018: 628-633 - 2017
- [j41]Shenghong Li, Mengwei Sun, Ying-Chang Liang, Bin Li, Chenglin Zhao:
Spectrum Sensing for Cognitive Radios With Unknown Noise Variance and Time-variant Fading Channels. IEEE Access 5: 21992-22003 (2017) - [j40]Ying Guo, Hao Ge, Shenghong Li:
A set of novel continuous action-set reinforcement learning automata models to optimize continuous functions. Appl. Intell. 46(4): 845-864 (2017) - [j39]Hao Ge, Jianhua Li, Shenghong Li, Wen Jiang, Yifan Wang:
A novel parallel framework for pursuit learning schemes. Neurocomputing 228: 198-204 (2017) - [j38]Ying Guo, Hao Ge, Shenghong Li:
A loss function based parameterless learning automaton scheme. Neurocomputing 260: 331-340 (2017) - [j37]Yuchen Liu, Aixin Zhang, Shenghong Li, Junhua Tang, Jianhua Li:
A lightweight authentication scheme based on self-updating strategy for space information network. Int. J. Satell. Commun. Netw. 35(3): 231-248 (2017) - [j36]Ying Guo, Shenghong Li, Wen Jiang, Bo Zhang, Yinghua Ma:
Learning automata-based algorithms for solving the stochastic shortest path routing problems in 5G wireless communication. Phys. Commun. 25: 376-385 (2017) - [c37]Chong Di, Yu Su, Zhuoran Han, Shenghong Li:
Learning Automata Based SVM for Intrusion Detection. CSPS 2017: 2067-2074 - [c36]Zhuoran Han, Shenghong Li:
Opportunistic Routing Algorithm Based on Estimator Learning Automata. CSPS 2017: 2486-2492 - [c35]Hao Ge, Jinchao Huang, Chong Di, Jianhua Li, Shenghong Li:
Learning Automata Based Approach for Influence Maximization Problem on Social Networks. DSC 2017: 108-117 - [c34]Yan Zhang, Chong Di, Zhuoran Han, Yichen Li, Shenghong Li:
An Adaptive Honeypot Deployment Algorithm Based on Learning Automata. DSC 2017: 521-527 - [c33]Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang, Jianhua Li:
A Novel Image Classification Method with CNN-XGBoost Model. IWDW 2017: 378-390 - 2016
- [j35]Hao Ge, Yifan Wang, Shenghong Li, Chun Lung Philip Chen, Ying Guo:
A cooperative framework of learning automata and its application in tutorial-like system. Neurocomputing 188: 311-318 (2016) - [j34]Wen Jiang, Bin Li, Shenghong Li, Yuanyan Tang, Chun Lung Philip Chen:
A new prospective for Learning Automata: A machine learning approach. Neurocomputing 188: 319-325 (2016) - [j33]Yuxin Zhao, Shenghong Li, Feng Jin:
Identification of influential nodes in social networks with community structure based on label propagation. Neurocomputing 210: 34-44 (2016) - [j32]Lifan Zhao, Lu Wang, Guoan Bi, Shenghong Li, Lei Yang, Haijian Zhang:
Structured sparsity-driven autofocus algorithm for high-resolution radar imagery. Signal Process. 125: 376-388 (2016) - [j31]Shenghong Li, Hao Ge, Ying-Chang Liang, Feng Zhao, Jianhua Li:
Estimator Goore Game based quality of service control with incomplete information for wireless sensor networks. Signal Process. 126: 77-86 (2016) - [j30]Wen Jiang, De-Shuang Huang, Shenghong Li:
Random Walk-Based Solution to Triple Level Stochastic Point Location Problem. IEEE Trans. Cybern. 46(6): 1438-1451 (2016) - [j29]Shiying Han, Ying-Chang Liang, Boon-Hee Soong, Shenghong Li:
Dynamic Broadband Spectrum Refarming for OFDMA Cellular Systems. IEEE Trans. Wirel. Commun. 15(9): 6203-6214 (2016) - [c32]Jinchao Huang, Yan Yan, Ying Guo, Shenghong Li:
A New Scheme Based on HSSL for Solving the Stochastic Point Location Problem. DSC 2016: 209-214 - [c31]Ying Guo, Hao Ge, Jinchao Huang, Shenghong Li:
A General Strategy for Solving the Stochastic Point Location Problem by Utilizing the Correlation of Three Adjacent Nodes. DSC 2016: 215-221 - [c30]Xu-Die Ren, Hao-Nan Guo, Guan-Chen He, Xu Xu, Chong Di, Sheng-Hong Li:
Convolutional Neural Network Based on Principal Component Analysis Initialization for Image Classification. DSC 2016: 329-334 - [c29]Wen Jiang, Hao Ge, Tianrong Wu, Fanming Wang, Shenghong Li:
Pursuit Estimator Learning Automata Based Approach for Online Event Pattern Tracking. DSC 2016: 637-641 - [c28]Hao Ge, Haiyu Huang, Yulin Li, Shenghong Li, Jianhua Li:
Two Approaches on Accelerating Bayesian Two Action Learning Automata. ICIC (3) 2016: 239-247 - 2015
- [j28]Hao Ge, Wen Jiang, Shenghong Li, Jianhua Li, Yifan Wang, Yuchun Jing:
A novel estimator based learning automata algorithm. Appl. Intell. 42(2): 262-275 (2015) - [j27]Yuxin Zhao, Shenghong Li, Jia Hou:
Link Quality Prediction via a Neighborhood-Based Nonnegative Matrix Factorization Model for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 828493:1-828493:8 (2015) - [j26]Shenghong Li, Hao Lou, Wen Jiang, Junhua Tang:
Detecting community structure via synchronous label propagation. Neurocomputing 151: 1063-1075 (2015) - [j25]Yuxin Zhao, Wen Jiang, Shenghong Li, Yinghua Ma, Guiyang Su, Xiang Lin:
A cellular learning automata based algorithm for detecting community structure in complex networks. Neurocomputing 151: 1216-1226 (2015) - [j24]Shan Luo, Xiumei Li, Shenghong Li, Guoan Bi:
Adaptive Interference Suppression Based on Lv Distribution for DSSS Communications. J. Circuits Syst. Comput. 24(1): 1550012:1-1550012:27 (2015) - [j23]Bin Li, Shenghong Li, Arumugam Nallanathan, Chenglin Zhao:
Deep Sensing for Future Spectrum and Location Awareness 5G Communications. IEEE J. Sel. Areas Commun. 33(7): 1331-1344 (2015) - [j22]Mengwei Sun, Shenghong Li, Bin Li, Chenglin Zhao:
Spectrum Sensing for Self-Organizing Network in the Presence of Time-Variant Multipath Flat Fading Channels and Unknown Noise Variance. Mob. Networks Appl. 20(4): 435-448 (2015) - [j21]Yujin Zhang, Chenglin Zhao, Yiming Pi, Shenghong Li, Shilin Wang:
Image-splicing forgery detection based on local binary patterns of DCT coefficients. Secur. Commun. Networks 8(14): 2386-2395 (2015) - [j20]Rong Du, Chenglin Zhao, Feng Zhao, Shenghong Li:
Strategies of network coding against nodes conspiracy attack. Secur. Commun. Networks 8(14): 2396-2403 (2015) - [j19]Lu Wang, Chunru Wan, Shenghong Li, Guoan Bi:
Harmonic tonal detectors based on the BOGA. Signal Process. 106: 215-230 (2015) - [j18]Bin Li, Shenghong Li, Arumugam Nallanathan, Yijiang Nan, Chenglin Zhao, Zheng Zhou:
Deep Sensing for Next-Generation Dynamic Spectrum Sharing: More Than Detecting the Occupancy State of Primary Spectrum. IEEE Trans. Commun. 63(7): 2442-2457 (2015) - [j17]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li:
Passive Image-Splicing Detection by a 2-D Noncausal Markov Model. IEEE Trans. Circuits Syst. Video Technol. 25(2): 185-199 (2015) - [j16]Bin Li, Shenghong Li, Jia Hou, Junqiang Fu, Chenglin Zhao, Arumugam Nallanathan:
A Bayesian Approach for Adaptively Modulated Signals Recognition in Next-Generation Communications. IEEE Trans. Signal Process. 63(16): 4359-4372 (2015) - [c27]Xinyi Guo, Wen Jiang, Hao Ge, Shenghong Li:
A New Learning Automata Algorithm for Selection of Optimal Subset. ICIC (1) 2015: 693-702 - 2014
- [j15]Yuxin Zhao, Shenghong Li, Shilin Wang:
Agglomerative Clustering Based on Label Propagation for Detecting Overlapping and Hierarchical Communities in Complex Networks. Adv. Complex Syst. 17(6) (2014) - [j14]Shenghong Li, Guoan Bi:
Time domain averaging and correlation-based improved spectrum sensing method for cognitive radio. EURASIP J. Adv. Signal Process. 2014: 46 (2014) - [j13]Shi-Lin Wang, Alan Wee-Chung Liew, Shenghong Li, Yu-Jin Zhang, Jianhua Li:
Detection of shifted double JPEG compression by an adaptive DCT coefficient model. EURASIP J. Adv. Signal Process. 2014: 101 (2014) - [j12]Rong Du, Chenglin Zhao, Shenghong Li, Jian Li:
Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation. EURASIP J. Wirel. Commun. Netw. 2014: 5 (2014) - [j11]Bo Su, Quanqiao Yuan, Shilin Wang, Chenglin Zhao, Shenghong Li:
Enhanced state selection Markov model for image splicing detection. EURASIP J. Wirel. Commun. Netw. 2014: 7 (2014) - [j10]Jian Li, Shenghong Li:
Interference of Cognitive Wireless Networks on Rayleigh and Rice Fading Channels. Int. J. Distributed Sens. Networks 10 (2014) - [j9]Wen Jiang, Shenghong Li:
A general method for P-model FSSA learning in triple level environment. Neurocomputing 137: 150-156 (2014) - [j8]Wen Jiang, Chenglin Zhao, Sheng-Hong Li, Lawson Chen:
A new Learning Automata based approach for online tracking of event patterns. Neurocomputing 137: 205-211 (2014) - [j7]Yujin Zhang, Shenghong Li, Shilin Wang, Yun-Qing Shi:
Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns. IEEE Signal Process. Lett. 21(3): 275-279 (2014) - [j6]Jian Li, Shenghong Li, Feng Zhao, Rong Du:
Co-Channel Interference Modeling in Cognitive Wireless Networks. IEEE Trans. Commun. 62(9): 3114-3128 (2014) - [c26]Yueguo Zhang, Lili Dong, Shenghong Li, Jianhua Li:
Abnormal crowd behavior detection using interest points. BMSB 2014: 1-4 - [c25]Xudong Zhao, Jianhua Li, Shilin Wang, Shenghong Li:
A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection. ICME 2014: 1-6 - 2013
- [j5]Guoan Bi, Sanjit K. Mitra, Shenghong Li:
Sampling rate conversion based on DFT and DCT. Signal Process. 93(2): 476-486 (2013) - [c24]Yueguo Zhang, Lili Dong, Jianhua Li, Shenghong Li, Zhiyong John Gao:
A complex network-based approach to estimating the number of people in video surveillance. BMSB 2013: 1-4 - [c23]Tongtong Tao, Hao Ge, Guixian Cai, Shenghong Li:
Adaptive Step Searching for Solving Stochastic Point Location Problem. ICIC (1) 2013: 192-198 - [c22]Daqing Zhang, Shenghong Li, Kongjin Yang, Yuchun Jing:
An error concealment adaptive framework for intra-frames. ICIP 2013: 1880-1884 - [c21]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, Quanqiao Yuan:
Image splicing detection based on noncausal Markov model. ICIP 2013: 4462-4466 - [c20]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, Xiang Lin:
A Distributed Scheme for Image Splicing Detection. IWDW 2013: 314-325 - 2012
- [j4]Xiumei Li, Guoan Bi, Shenghong Li:
On uncertainty principle of the local polynomial Fourier transform. EURASIP J. Adv. Signal Process. 2012: 120 (2012) - [j3]Xudong Zhao, Shenghong Li, Shilin Wang, Jianhua Li, Kongjin Yang:
Optimal chroma-like channel design for passive color image splicing detection. EURASIP J. Adv. Signal Process. 2012: 240 (2012) - [c19]Fang Wang, Aixin Zhang, Jianhua Li, Shenghong Li:
Perceptual Compressive Sensing Scheme Based on Human Vision System. ACIS-ICIS 2012: 351-355 - [c18]Yuxin Zhao, Shenghong Li, Xiuzhen Chen:
Community Detection Using Label Propagation in Entropic Order. CIT 2012: 18-24 - [c17]Yueguo Zhang, Lili Dong, Shenghong Li, Jianhua Li:
A complex network-based approach for interest point detection in images. BMSB 2012: 1-4 - [c16]Xiuzhen Chen, Jianhua Li, Shenghong Li, Yanan Wang:
Hierarchical activeness state evaluation model for BBS network community. CHINACOM 2012: 206-211 - [c15]Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li:
Countering Universal Image Tampering Detection with Histogram Restoration. IWDW 2012: 282-289 - 2011
- [j2]Junhua Tang, Sisi Dai, Jianhua Li, Shenghong Li:
Gossip-based scalable directed diffusion for wireless sensor networks. Int. J. Commun. Syst. 24(11): 1418-1430 (2011) - [j1]Xiuzhen Chen, Shenghong Li, Jianhua Li, Zhiyuan Zhang:
Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork. J. Comput. Networks Commun. 2011: 150762:1-150762:9 (2011) - [c14]Liangxiu Li, Shenghong Li, Xiuzhen Chen:
A new genetics-based diffusion model for social networks. CASoN 2011: 76-81 - [c13]Zhiyuan Zhang, Aixin Zhang, Jianhua Li, Shenghong Li:
An efficient angle-based shape matching approach towards object recognition. ICME 2011: 1-5 - [c12]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li:
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection. IWDW 2011: 243-256 - [c11]Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li:
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection. IWDW 2011: 376-386 - 2010
- [c10]Xudong Zhao, Jianhua Li, Shenghong Li, Shilin Wang:
Detecting Digital Image Splicing in Chroma Spaces. IWDW 2010: 12-22 - [c9]Xuping Zheng, Aixin Zhang, Shenghong Li, Bo Jin, Junhua Tang:
Interleaving Embedding Scheme for ECC-Based Multimedia Fingerprinting. IWDW 2010: 211-223
2000 – 2009
- 2008
- [c8]Jian Li, Bo Su, Shenghong Li, Shilin Wang, Danhong Yao:
A Semi-fragile Watermark Scheme Based on the Logistic Chaos Sequence and Singular Value Decomposition. IDEAL 2008: 57-64 - 2007
- [c7]Ming Zhao, Shilin Wang, Shenghong Li, Xiang Li, Zhi Xue:
Feature Analysis and Classification for Filtering Junk Information in Animation. ICNC (3) 2007: 551-555 - 2006
- [c6]Shenghong Li, Lili Cui, Jong-Uk Choi, Xuenan Cui:
An Audio Copyright Protection Schemes Based on SMM in Cepstrum Domain. SSPR/SPR 2006: 923-927 - 2005
- [c5]Shi-Lin Wang, Hong Hui, Shenghong Li, Hao Zhang, Yong-yu Shi, Wen-tao Qu:
Exploring Content-Based and Image-Based Features for Nude Image Detection. FSKD (2) 2005: 324-328 - [c4]Qiang Sun, Jianhua Li, Xinran Liang, Shenghong Li:
Using Double-Layer One-Class Classification for Anti-jamming Information Filtering. ISNN (3) 2005: 361-366 - 2004
- [c3]Qiang Li, Jianhua Li, Xiang Li, Shenghong Li:
Evaluation Incompleteness of Knowledge in Data Mining. AWCC 2004: 278-284 - 2001
- [c2]Sheng-Hong Li, Hong-Wen Zhu:
Harmonic retrieval in mixed non-Gaussian and gaussian ARMA noises using higher-order statistics. ISCAS (2) 2001: 113-116
1990 – 1999
- 1999
- [c1]Shenghong Li, Zemin Liu:
A general CAC approach using novel ant algorithm training based neural network. IJCNN 1999: 1885-1888
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint