Chen Li

According to our database1, Chen Li authored at least 15 papers between 2017 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Shape Description and Retrieval Using Included-Angular Ternary Pattern.
J. Inf. Process. Syst., 2019

Unified multi-scale method for fast leaf classification and retrieval using geometric information.
IET Image Process., 2019

2018
Opportunistic NOMA-Based Massive MIMO Precoding for 5G New Radio.
Wirel. Commun. Mob. Comput., 2018

On the Secrecy Capacity of 5G MmWave Small Cell Networks.
IEEE Wirel. Commun., 2018

Face Recognition Based on the Combination of Enhanced Local Texture Feature and DBN under Complex Illumination Conditions.
J. Inf. Process. Syst., 2018

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information.
J. Inf. Process. Syst., 2018

Local Feature Based CNN for Face Recognition.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Study of Physical Layer Security in mmWave Satellite Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Design of Fast Iris Authentication System Based on Android Platform.
Proceedings of the 2018 2nd International Conference on Big Data and Internet of Things, 2018

Human Identification Based on Deep Feature and Transfer Learning.
Proceedings of the 2018 2nd International Conference on Big Data and Internet of Things, 2018

2017
A cloud-based monitoring system via face recognition using Gabor and CS-LBP features.
J. Supercomput., 2017

Face Recognition Based on Enhanced CSLBP.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Facial Feature Based Secure Information Transmission.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

Human Body and Face Detection based Anti-shoulder Attack System on ATM.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

A DCT-based Information Hiding Method for Network Authentication.
Proceedings of the International Conference on Big Data and Internet of Things, 2017


  Loading...