Haichao Shi

Orcid: 0000-0001-8846-1853

According to our database1, Haichao Shi authored at least 28 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Masked Face Transformer.
IEEE Trans. Inf. Forensics Secur., 2024

Denoised Dual-Level Contrastive Network for Weakly-Supervised Temporal Sentence Grounding.
Proceedings of the Computational Visual Media - 12th International Conference, 2024

2023
ProGraph: Robust Network Traffic Identification With Graph Propagation.
IEEE/ACM Trans. Netw., June, 2023

AdapNet: Adaptability Decomposing Encoder-Decoder Network for Weakly Supervised Action Recognition and Localization.
IEEE Trans. Neural Networks Learn. Syst., April, 2023

StochasticFormer: Stochastic Modeling for Weakly Supervised Temporal Action Localization.
IEEE Trans. Image Process., 2023

Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers.
IEEE Trans. Inf. Forensics Secur., 2023

OW-TAL: Learning Unknown Human Activities for Open-World Temporal Action Localization.
Pattern Recognit., 2023

Learning Cross-modality Information Bottleneck Representation for Heterogeneous Person Re-Identification.
CoRR, 2023

Rumor Detection with Diverse Counterfactual Evidence.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

2022
Action Shuffling for Weakly Supervised Temporal Localization.
IEEE Trans. Image Process., 2022

BECT Spike Detection Algorithm Based on Optimal Template Matching and Morphological Feature Selection.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Consistent Sub-Decision Network for Low-Quality Masked Face Recognition.
IEEE Signal Process. Lett., 2022

TwinNet: Twin Structured Knowledge Transfer Network for Weakly Supervised Action Localization.
Int. J. Autom. Comput., 2022

Dynamic Graph Modeling for Weakly-Supervised Temporal Action Localization.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Weakly-supervised action localization via embedding-modeling iterative optimization.
Pattern Recognit., 2021

SAPS: Self-Attentive Pathway Search for weakly-supervised action localization with background-action augmentation.
Comput. Vis. Image Underst., 2021

Flexible Non-Autoregressive Extractive Summarization with Threshold: How to Extract a Non-Fixed Number of Summary Sentences.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
DistilSum: : Distilling the Knowledge for Extractive Summarization.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Multi-Instance Multi-Label Action Recognition and Localization Based on Spatio-Temporal Pre-Trimming for Untrimmed Videos.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Active semi-supervised learning based on self-expressive correlation with generative adversarial networks.
Neurocomputing, 2019

Weakly-Supervised Action Recognition and Localization via Knowledge Transfer.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning.
Proceedings of the Computational Science - ICCS 2019, 2019

Learning Transferable Self-Attentive Representations for Action Recognition in Untrimmed Videos with Weak Supervision.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Synchronization Detection and Recovery of Steganographic Messages with Adversarial Learning.
CoRR, 2018

Image captioning based on deep reinforcement learning.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018

2017
SSGAN: Secure Steganography Based on Generative Adversarial Networks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

2016
The Seamless Integration Achievement of the Actual Situation of the Scene.
Trans. Edutainment, 2016


  Loading...