Can He

Orcid: 0000-0002-7462-8402

According to our database1, Can He authored at least 28 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A framework combined stacking ensemble algorithm to classify crop in complex agricultural landscape of high altitude regions with Gaofen-6 imagery and elevation data.
Int. J. Appl. Earth Obs. Geoinformation, August, 2023

Evaluation of Three Land Surface Temperature Products From Landsat Series Using in Situ Measurements.
IEEE Trans. Geosci. Remote. Sens., 2023

Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023

ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023

FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations.
CoRR, 2023

2022
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models.
IEEE Trans. Dependable Secur. Comput., 2022

Evaluation of Diverse Convolutional Neural Networks and Training Strategies for Wheat Leaf Disease Identification with Field-Acquired Photographs.
Remote. Sens., 2022

PTB: Robust physical backdoor attacks against deep neural networks in real world.
Comput. Secur., 2022

Reliability assessment of a multi-state distribution network under cost and spoilage considerations.
Ann. Oper. Res., 2022

2021
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems.
Peer-to-Peer Netw. Appl., 2021

NaturalAE: Natural and robust physical adversarial examples for object detectors.
J. Inf. Secur. Appl., 2021

SocialGuard: An adversarial example based privacy-preserving technique for social images.
J. Inf. Secur. Appl., 2021

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples.
CoRR, 2021

Robust Backdoor Attacks against Deep Neural Networks in Real Physical World.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Customized Instruction on RISC-V for Winograd-Based Convolution Acceleration.
Proceedings of the 32nd IEEE International Conference on Application-specific Systems, 2021

2020
3D Invisible Cloak.
CoRR, 2020

Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020

Robust and Natural Physical Adversarial Examples for Object Detectors.
CoRR, 2020

DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations.
CoRR, 2020

LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system.
Comput. Secur., 2020

A Minimal Path-Based Method for Computing Multistate Network Reliability.
Complex., 2020

Capacity Reliability Calculation and Sensitivity Analysis for a Stochastic Transport Network.
IEEE Access, 2020

Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2017
A Particle Swarm Optimization Technique-Based Parametric Wavelet Thresholding Function for Signal Denoising.
Circuits Syst. Signal Process., 2017

Clustering Analysis Based on Segmented Images.
Proceedings of the Machine Learning and Intelligent Communications, 2017

2015
A New Image Decomposition and Reconstruction Approach - Adaptive Fourier Decomposition.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

2013
A Combined Optimal Sensor Placement Strategy for the Structural Health Monitoring of Bridge Structures.
Int. J. Distributed Sens. Networks, 2013


  Loading...