Canghong Shi

Orcid: 0000-0002-5188-6230

According to our database1, Canghong Shi authored at least 29 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust audio watermarking algorithm resisting cropping based on SIFT transform.
Multim. Tools Appl., April, 2024

CAGAN: Classifier-augmented generative adversarial networks for weakly-supervised COVID-19 lung lesion localisation.
IET Comput. Vis., February, 2024

2023
Dual-feature Fusion Attention Network for Small Object Segmentation.
Comput. Biol. Medicine, June, 2023

Pluralistic Face Inpainting With Transformation of Attribute Information.
IEEE Trans. Multim., 2023

M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC.
IAIC (1), 2023

2022
Image outpainting guided by prior structure information.
Pattern Recognit. Lett., 2022

DE-GAN: Domain Embedded GAN for High Quality Face Image Inpainting.
Pattern Recognit., 2022

Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning.
J. Cloud Comput., 2022

Multistage semantic-aware image inpainting with stacked generator networks.
Int. J. Intell. Syst., 2022

Rethinking CAM in Weakly-Supervised Semantic Segmentation.
IEEE Access, 2022

Hybrid Decision Based Multi-Agent Deep Reinforcement learning for Task Offloading in Collaborative Edge-Cloud Computing.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

CAM-Guided Spatially Denormalization for Lesion Weakly-Supervised Localization.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

2021
A novel NMF-based authentication scheme for encrypted speech in cloud computing.
Multim. Tools Appl., 2021

Face inpainting based on GAN by facial prediction and fusion as guidance information.
Appl. Soft Comput., 2021

2020
Image segmentation of nasopharyngeal carcinoma using 3D CNN with long-range skip connection and multi-scale feature pyramid.
Soft Comput., 2020

Robust geodesic based outlier detection for class imbalance problem.
Pattern Recognit. Lett., 2020

Domain Embedded Multi-model Generative Adversarial Networks for Image-based Face Inpainting.
CoRR, 2020

A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries.
IEEE Access, 2020

2019
A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2019

TL-GAN: Generative Adversarial Networks with Transfer Learning for Mode Collapse (S).
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

AMCNet: Attention-Based Multiscale Convolutional Network for DCM MRI Segmentation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

PWGAN: wasserstein GANs with perceptual loss for mode collapse.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018

Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction.
Secur. Commun. Networks, 2018

Outlier Detection Based on the Data Structure.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2016
Speech Authentication and Recovery Scheme in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Privacy Protection of Digital Speech Based on Homomorphic Encryption.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An efficient content authentication scheme in encrypted speech based on integer wavelet transform.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016


  Loading...