Longlong Li

Orcid: 0000-0001-7390-3647

According to our database1, Longlong Li authored at least 35 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Research on taper thread's compensation algorithm based on machine vision considering the inclined state effect and tooth profile distortion.
Multim. Tools Appl., December, 2023

Student Learning Behavior Recognition Incorporating Data Augmentation with Learning Feature Representation in Smart Classrooms.
Sensors, October, 2023

Design and experiment of a binocular vision-based canopy volume extraction system for precision pesticide application by UAVs.
Comput. Electron. Agric., October, 2023

Students' Classroom Behavior Detection System Incorporating Deformable DETR with Swin Transformer and Light-Weight Feature Pyramid Network.
Syst., July, 2023

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing.
Frontiers Inf. Technol. Electron. Eng., January, 2023

Fake and Dishonest Participant Immune Secret Image Sharing.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Photovoltaic Panel Defect Detection Based on Ghost Convolution with BottleneckCSP and Tiny Target Prediction Head Incorporating YOLOv5.
CoRR, 2023

2022
CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN.
Sensors, 2022

Meaningful secret image sharing resist to typical image processing of shadows.
Multim. Tools Appl., 2022

Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes.
J. Vis. Commun. Image Represent., 2022

A Support Vector Machine Based Prediction on Sensitivity to Coal Ash Blast for Different Degrees of Deterioration.
J. Sensors, 2022

Renewal of secret and shadows in secret image sharing.
IET Inf. Secur., 2022

A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain.
Entropy, 2022

Hierarchical Amplitude-Aware Permutation Entropy-Based Fault Feature Extraction Method for Rolling Bearings.
Entropy, 2022

Research on virtual Ackerman steering model based navigation system for tracked vehicles.
Comput. Electron. Agric., 2022

A General Steganalysis Method of QR Codes.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

2021
Robust Secret Image Sharing Resistant to Noise in Shares.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Data Hiding Based on Mini Program Code.
Secur. Commun. Networks, 2021

Evaluation of Deep Learning Segmentation Models for Detection of Pine Wilt Disease in Unmanned Aerial Vehicle Images.
Remote. Sens., 2021

BAT: real-time inaudible sound capture with smartphones.
Multim. Tools Appl., 2021

Feasibility Analysis Model of Transformation from Real Economy to Virtual Economy Based on Association Rule Algorithm.
Mob. Inf. Syst., 2021

Effects of application height and crosswind on the crop spraying performance of unmanned helicopters.
Comput. Electron. Agric., 2021

Robust Secret Image Sharing Scheme Against Noise in Shadow Images.
IEEE Access, 2021

The K-Core Decomposition Algorithm Under the Framework of GraphBLAS.
Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021

2020
Secret image sharing with separate shadow authentication ability.
Signal Process. Image Commun., 2020

On the Value of Order Number and Power in Secret Image Sharing.
Secur. Commun. Networks, 2020

Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes.
Multim. Tools Appl., 2020

High-accuracy, high-resolution downwash flow field measurements of an unmanned helicopter for precision agriculture.
Comput. Electron. Agric., 2020

Numerical simulation of the downwash flow field and droplet movement from an unmanned helicopter for crop spraying.
Comput. Electron. Agric., 2020

Improved wavelet domain centroid-based adaptive audio steganography.
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020

2019
A new spray deposition pattern measurement system based on spectral analysis of a fluorescent tracer.
Comput. Electron. Agric., 2019

Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem.
IEEE Access, 2019

Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption.
IEEE Access, 2019

2015
Leaf classification using multiple feature analysis based on semi-supervised clustering.
J. Intell. Fuzzy Syst., 2015

Implementation of weighted summation type fractional Fourier transform on FPGA.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015


  Loading...