Haifeng Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
AdaER: An adaptive experience replay approach for continual lifelong learning.
Neurocomputing, March, 2024

On the Security of Key-Aggregate Searchable Encryption.
J. Cyber Secur. Mobil., 2024

SAR-AE-SFP: SAR Imagery Adversarial Example in Real Physics domain with Target Scattering Feature Parameters.
CoRR, 2024

AllSpark: a multimodal spatiotemporal general model.
CoRR, 2024

2023
Question-guided feature pyramid network for medical visual question answering.
Expert Syst. Appl., 2023

MSFormer: A Skeleton-multiview Fusion Method For Tooth Instance Segmentation.
CoRR, 2023

BCE-Net: Reliable Building Footprints Change Extraction based on Historical Map and Up-to-Date Images using Contrastive Learning.
CoRR, 2023

Variational Graph Autoencoder Based on High-Order Attention Mechanism.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Attention Based Spatial-Temporal Dynamic Interact Network for Traffic Flow Forecasting.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

HoPP: Hardware-Software Co-Designed Page Prefetching for Disaggregated Memory.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

MARB: Bridge the Semantic Gap between Operating System and Application Memory Access Behavior.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

A receptive field transfer strategy using layer-aligned distillation learning for multivariate fault signal denoising.
Proceedings of the CAA Symposium on Fault Detection, 2023

A method for fusing multiple sources for noise reduction in a strong noise environment.
Proceedings of the CAA Symposium on Fault Detection, 2023

2022
Image Segmentation with Adaptive Spatial Priors from Joint Registration.
SIAM J. Imaging Sci., September, 2022

Unifying Obstacle Detection, Recognition, and Fusion Based on the Polarization Color Stereo Camera and LiDAR for the ADAS.
Sensors, 2022

Context-guided entropy minimization for semi-supervised domain adaptation.
Neural Networks, 2022

Growth charts of brain morphometry for preschool children.
NeuroImage, 2022

Contrast-enhanced ultrasound improves the potency of fine-needle aspiration in thyroid nodules with high inadequate risk.
BMC Medical Imaging, 2022

Applying Ollivier-Ricci curvature to indicate the mismatch of travel demand and supply in urban transit network.
Int. J. Appl. Earth Obs. Geoinformation, 2022

Network Structure Embedding Method Based on Role Domain Feature.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2022

Emotion Recognition Based on Representation Dissimilarity Matrix.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2022

Learning Spatial-Preserved Skeleton Representations for Few-Shot Action Recognition.
Proceedings of the Computer Vision - ECCV 2022, 2022

Development of a Generic Mesh Converter for Numerical Simulations.
Proceedings of the Methods and Applications for Modeling and Simulation of Complex Systems, 2022

2021
A method to evaluate task-specific importance of spatio-temporal units based on explainable artificial intelligence.
Int. J. Geogr. Inf. Sci., 2021

Event-Based Consensus Control to Multi-Agent System By Using Model Free Adaptive Control.
Proceedings of the 2021 International Conference on Security, 2021

Scalable On-Switch Rate Limiters for the Cloud.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Research on the Application of Computer Statistics Technology in the Educational Information Management System of Colleges and Universities.
Proceedings of the CIPAE 2021: 2nd International Conference on Computers, 2021

2020
Volume preserving image segmentation with entropy regularized optimal transport and its applications in deep learning.
J. Vis. Commun. Image Represent., 2020

Consensus tracking for nonlinear multi-agent systems with unknown disturbance by using model free adaptive iterative learning control.
Appl. Math. Comput., 2020

2019
Volume Preserving Image Segmentation with Entropic Regularization Optimal Transport and Its Applications in Deep Learning.
CoRR, 2019

Make Page Coloring more Efficient on Slice-Based Three-Level Cache.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

A Comparative Study on Machine Learning Approaches to Thunderstorm Gale Identification.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

Towards Multi-Controller Placement for SDN Based on Density Peaks Clustering.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
PTAT: An Efficient and Precise Tool for Tracing and Profiling Detailed TLB Misses.
ACM Trans. Embed. Comput. Syst., 2018

On the Fundamental Limit of Multipath Matching Pursuit.
IEEE J. Sel. Top. Signal Process., 2018

Automatic fast double KNN classification algorithm based on ACC and hierarchical clustering for big data.
Int. J. Commun. Syst., 2018

Inverse Perron Values and Connectivity of a Uniform Hypergraph.
Electron. J. Comb., 2018

Modeling and Evaluation on through-metal Power Transfer Using Piezoelectric Transducer.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

A New Monkey Algorithm Combining Inertia Step and Cooperation Strategy.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

Model-Free Adaptive Fault-Tolerant Control with Measurement Disturbance.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

2017
A Robust Rectification Algorithm for the Vision Navigation System of the Planetary Rover.
Trans. Edutainment, 2017

A High-Efficiency 3D-DOA Estimation Algorithm for Unknown Sources Number.
J. Inf. Hiding Multim. Signal Process., 2017

A New Authenticated Key Agreement Protocol based on Extended Chebyshev Maps.
J. Inf. Hiding Multim. Signal Process., 2017

An Improved Pigeon-Inspired Optimization for Clustering Analysis Problems.
Int. J. Comput. Intell. Appl., 2017

Towards robust and optimal image stitching for pavement crack inspection and mapping.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Modeling and simulation of unified power flow controller based on modular multilevel converters.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Mentally Imagined Item Captures Attention During Visual Search.
Proceedings of the Engineering Psychology and Cognitive Ergonomics: Performance, Emotion and Situation Awareness, 2017

2016
Improved analysis of SP and CoSaMP under total perturbations.
EURASIP J. Adv. Signal Process., 2016

Face recognition technology research and implementation based on mobile phone system.
Proceedings of the 12th International Conference on Natural Computation, 2016

An algorithm to discover the approximate probabilistic frequent itemsets with sampling method.
Proceedings of the 12th International Conference on Natural Computation, 2016

Median-Oriented Bat Algorithm for Function Optimization.
Proceedings of the Intelligent Computing Theories and Application, 2016

An Fruit Fly Optimization Algorithm with Dimension by Dimension Improvement.
Proceedings of the Intelligent Computing Theories and Application, 2016

Extracting Keywords of UAVs Wireless Communication Protocols Based on Association Rules Learning.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
一种结合线性时序逻辑和故障树的软件安全验证方法 (Method Combining Linear Temporal Logic and Fault Tree for Software Safety Verification).
计算机科学, 2015

Building Handwriting Recognizers by Leveraging Skeletons of Both Offline and Online Samples.
Proceedings of the 13th International Conference on Document Analysis and Recognition, 2015

Software Vulnerability Detection Based on Code Coverage and Test Cost.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Protocol Reverse Engineering Using LDA and Association Analysis.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
Balancing reducer workload for skewed data using sampling-based partitioning.
Comput. Electr. Eng., 2014

The Time Course of Selective Consolidation on Visual Working Memory.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2014

2013
The research about PV/wind hybrid energy considering grid security constraints.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Automatic classification for vulnerability based on machine learning.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Knowledge set theory: a knowledge representation method based on extenics.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

Software Defect Prediction Using Dynamic Support Vector Machine.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Equivalence of MSE and MaxEnt as objective function of PCA.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

2011
Integrative Analysis of Many Weighted Co-Expression Networks Using Tensor Computation.
PLoS Comput. Biol., 2011

A Service-Oriented Architecture for Proactive Geospatial Information Services.
Future Internet, 2011

An Intelligent Vehicle Monitoring System Based on Internet of Things.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Min-Conflict Heuristic-Based Web Service Chain Reconfiguration Approach.
Intell. Inf. Manag., 2010

Expert Anti-Evaluation Model Based on Matter-Element Analysis in Fund Project Peer-Review System.
Intell. Inf. Manag., 2010

Image super-resolution with sparse representation prior on primitive patches.
Proceedings of the Visual Communications and Image Processing 2010, 2010

Characteristics of Soil Environment Variation in Oasis-Desert Ecotone in the Process of Oasis Growth.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Sensitivity analysis of multilayer percetron based on elastic function.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications.
J. Syst. Softw., 2009

Key detection through pitch class distribution model and ANN.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Research on the Design of the Categorization System for Moving Information in Video Stream and Its Implementation.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A joint multi-country, multi-culture and multi-disciplinary master programme on software engineering plus X.
Proceedings of the First ACM Summit on Computing Education in China, 2008

An Improved Diverse Density Algorithm for Multiple Overlapped Instances.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Participatory Learning Based Semi-Supervised Classification.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
A Quantile Method for Sizing Optical Maps.
J. Comput. Biol., 2007

Systematic discovery of functional modules and context-specific functional annotation of human genome.
Proceedings of the Proceedings 15th International Conference on Intelligent Systems for Molecular Biology (ISMB) & 6th European Conference on Computational Biology (ECCB), 2007

An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Integrative missing value estimation for microarray data.
BMC Bioinform., 2006

A Multiscale and Multidirectional Image Denoising Algorithm Based on Contourlet Transform.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Novel Blind Watermarking Algorithm in Contourlet Domain.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Developing a Software Engineering Curriculum for the Emerging Software Industry in China.
Proceedings of the 19th Conference on Software Engineering Education and Training (CSEE&T 2006), 2006

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Multiple Watermarking Using Hadamard Transform.
Proceedings of the Advances in Web-Age Information Management, 2005

A Blind Image Watermarking Using for Copyright Protection and Tracing.
Proceedings of the Intelligence and Security Informatics, 2005

A Novel Watermarking Algorithm Based on SVD and Zernike Moments.
Proceedings of the Intelligence and Security Informatics, 2005

A Novel Watermarking Scheme Based on Independent Component Analysis.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2002
State Sharing in a Hybrid Neuro-Markovian On-Line Handwriting Recognition System through a Simple Hierarchical Clustering Algorithm.
Proceedings of the 4th IEEE International Conference on Multimodal Interfaces (ICMI 2002), 2002

Data Driven Design of an ANN/HMM System for On-line Unconstrained Handwritten Character Recognition.
Proceedings of the 4th IEEE International Conference on Multimodal Interfaces (ICMI 2002), 2002


  Loading...