Menghao Li

Orcid: 0000-0002-5333-7630

According to our database1, Menghao Li authored at least 28 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Imaging Chain Modeling and a Scaling Experiment for Optical Remote Sensing of Lunar Surface.
IEEE Trans. Instrum. Meas., 2024

Deep Linear Array Pushbroom Image Restoration: A Degradation Pipeline and Jitter-Aware Restoration Network.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Mobile image restoration via prior quantization.
Pattern Recognit. Lett., October, 2023

Imaging Simulation and Learning-Based Image Restoration for Remote Sensing Time Delay and Integration Cameras.
IEEE Trans. Geosci. Remote. Sens., 2023

Impact of Sound Travel Time Modeling on Sequential GNSS-Acoustic Seafloor Positioning Under Various Survey Configurations.
IEEE Trans. Geosci. Remote. Sens., 2023

Mobile Image Restoration via Prior Quantization.
CoRR, 2023

RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Iterative Robust Visual Grounding with Masked Reference based Centerpoint Supervision.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Simulative Evaluation of the Underwater Geodetic Network Configuration on Kinematic Positioning Performance.
Remote. Sens., 2022

Satellite Clock Batch Estimation Accuracy Analysis and Its Impacts on PPP.
Remote. Sens., 2022

Few-shot human motion prediction using deformable spatio-temporal CNN with parameter generation.
Neurocomputing, 2022

How does intelligent manufacturing affects enterprise innovation? The mediating role of organisational learning.
Enterp. Inf. Syst., 2022

Look in Different Views: Multi-Scheme Regression Guided Cell Instance Segmentation.
CoRR, 2022

Real-time precise measurements of ocean surface waves using GNSS variometric approach.
Int. J. Appl. Earth Obs. Geoinformation, 2022

Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Predicting Human Motion Using Key Subsequences.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
BDS Satellite Clock Prediction Considering Periodic Variations.
Remote. Sens., 2021

Financial Risk Evaluation Z-Score Model for Intelligent IoT-based Enterprises.
Inf. Process. Manag., 2021

DynaTune: Dynamic Tensor Program Optimization in Deep Neural Network Compilation.
Proceedings of the 9th International Conference on Learning Representations, 2021

Contingent Effect of Medium in Threshold-based Online Referral Programs on Users' Choice and Willingness to Participate.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Large-Scale Third-Party Library Detection in Android Markets.
IEEE Trans. Software Eng., 2020

AdaTune: Adaptive Tensor Program Compilation Made Efficient.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

2019
Impact of ECOM Solar Radiation Pressure Models on Multi-GNSS Ultra-Rapid Orbit Determination.
Remote. Sens., 2019

Adjustment of Transceiver Lever Arm Offset and Sound Speed Bias for GNSS-Acoustic Positioning.
Remote. Sens., 2019

Adaptive Frame Rate Optimization Based on Particle Swarm and Neural Network for Industrial Video Stream.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

2018
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
LibD: scalable and precise third-party library detection in android markets.
Proceedings of the 39th International Conference on Software Engineering, 2017

2015
An Approach for Mitigating Potential Threats in Practical SSO Systems.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015


  Loading...