Li-Hua Li

Orcid: 0000-0001-6327-885X

Affiliations:
  • Chaoyang Univesity of Technology, Taiwan


According to our database1, Li-Hua Li authored at least 34 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Ensemble Learning based on CNN and Transformer Models for Leaf Diseases Classification.
Proceedings of the 18th International Conference on Ubiquitous Information Management and Communication, 2024

2023
STB: synthetic minority oversampling technique for tree-boosting models for imbalanced datasets of intrusion detection systems.
PeerJ Comput. Sci., 2023

Combining Classifiers for Deep Learning Mask Face Recognition.
Inf., 2023

Disease Identification in Potato Leaves using Swin Transformer.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

Boundary-Seeking GAN Approach to Improve Classification of Intrusion Detection Systems Based on Machine Learning Model.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

Compact Convolutional Transformer based on Sharpness-Aware Minimization for Image Classification.
Proceedings of the 12th International Conference on Awareness Science and Technology, 2023

2022
Combining Conditional Generative Adversarial Networks and YOLOv4 for Mango Classification.
Proceedings of the International Conference on Technologies and Applications of Artificial Intelligence, 2022

An Improved Intrusion Detection Systems using BGAN.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022

MLP-Mixer Approach for Corn Leaf Diseases Classification.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022

2021
Comparing the Impact of Service Quality on Customers' Repurchase Intentions Based on Statistical Methods and Artificial Intelligence-Taking an Automotive Aftermarket (AM) Parts Sales Company as an Example.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

A Feature Selection Based DNN for Intrusion Detection System.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

2019
A Machine Learning Approach for Detection Plant Disease: Taking Orchid as Example.
Proceedings of the ICVISP 2019: 3rd International Conference on Vision, 2019

Modeling and Prediction of Time-Series-A Case Study with Forex Data.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

Comparing the efficiency of innovative teaching through digital mobile e-learning based on a DEA meta-frontier model.
Proceedings of the 10th International Conference on E-Education, 2019

2018
Feature Selection on Credit Risk Prediction for Peer-to-Peer Lending.
Proceedings of the New Frontiers in Artificial Intelligence, 2018

2017
Micro-lending Default Awareness Using Artificial Neural Network.
Proceedings of the 2nd International Conference on Multimedia Systems and Signal Processing, 2017

A simplified method for improving the performance of product recommendation with sparse data.
Proceedings of the IEEE 8th International Conference on Awareness Science and Technology, 2017

2011
A Personalized Pair-Recommendation Approach Using Mobile Message Ontology.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Using Ontology for Personalized Mobile Message Computation.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A multi-stage collaborative filtering approach for mobile recommendation.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2005
Improvement of signature scheme based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

A Study on Dynamic Bargaining Strategy under Time Constraints and with Incomplete Information.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

2004
Cryptanalysis of an efficient secure group signature scheme.
ACM SIGOPS Oper. Syst. Rev., 2004

A key authentication scheme with non-repudiation.
ACM SIGOPS Oper. Syst. Rev., 2004

Discovering Inter-document Connectivity by Applying Topic Analysis Techniques.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Automated Negotiation in Multiple e-Marketplaces by Using Learning Personalized Mobile Shopping Agents.
Proceedings of the International Conference on Artificial Intelligence, 2004

2003
A new remote user authentication scheme for multi-server architecture.
Future Gener. Comput. Syst., 2003

Generalization of proxy signature-based on discrete logarithms.
Comput. Secur., 2003

A new key authentication scheme based on discrete logarithms.
Appl. Math. Comput., 2003

2002
A remote user authentication scheme using hash functions.
ACM SIGOPS Oper. Syst. Rev., 2002

2001
A remote password authentication scheme for multiserver architecture using neural networks.
IEEE Trans. Neural Networks, 2001

A simple micro-payment scheme.
J. Syst. Softw., 2001

2000
A new remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2000

1991
High-resolution multipath time delay estimation using a neural network.
Proceedings of the 1991 International Conference on Acoustics, 1991


  Loading...