Ning Lv

Orcid: 0000-0003-4091-714X

Affiliations:
  • Xidian University, School of Electronic Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
  • Xidian Hangzhou Institute of Technology, Hangzhou, China


According to our database1, Ning Lv authored at least 25 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Multisource Image Matching Method Based on Contrastive Network With Similarity Weighting.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2025

2024
Contrastive Learning of Multimodal Consistency Feature Representation for Remote Sensing Image Registration.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Prominent Structure-Guided Feature Representation for SAR and Optical Image Registration.
IEEE Geosci. Remote. Sens. Lett., 2024

A Structure Consistency Generative Adversarial Network for SAR-Optical Image Registration.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2024

2023
Edge Consistency Feature Extraction Method for Multi-Source Image Registration.
Remote. Sens., October, 2023

Residual Attention Mechanism for Remote Sensing Target Hiding.
Remote. Sens., October, 2023

A hybrid-attention semantic segmentation network for remote sensing interpretation in land-use surveillance.
Int. J. Mach. Learn. Cybern., February, 2023

3D Object Detection Method Based on CA Sampling and Local Attention Feature Encoding.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2023

2022
Popularity Incentive Caching for Vehicular Named Data Networking.
IEEE Trans. Intell. Transp. Syst., 2022

Adaptive Registration for Optical and SAR Images With a Scale-Constrained Matching Method.
IEEE Geosci. Remote. Sens. Lett., 2022

An edge intelligence empowered flooding process prediction using Internet of things in smart city.
J. Parallel Distributed Comput., 2022

Water Gauge Image Augmentation based on Generative Adversarial Network.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2022

Using Contour Loss Constraint in Satellite Image Interpretation of Construction Disturbance.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

2021
Remote Sensing Data Augmentation Through Adversarial Training.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

Encoding Spectral-Spatial Features for Hyperspectral Image Classification in the Satellite Internet of Things System.
Remote. Sens., 2021

Remote Sensing Image Augmentation Based on Text Description for Waterside Change Detection.
Remote. Sens., 2021

Residual Attention Mechanism for Construction Disturbance Detection from Satellite Image.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
Smart-Contract-Based Economical Platooning in Blockchain-Enabled Urban Internet of Vehicles.
IEEE Trans. Ind. Informatics, 2020

A Secure Content Sharing Scheme Based on Blockchain in Vehicular Named Data Networks.
IEEE Trans. Ind. Informatics, 2020

An Intelligent Path Planning Scheme of Autonomous Vehicles Platoon Using Deep Reinforcement Learning on Network Edge.
IEEE Access, 2020

Illegal Constructions Detection in Remote Sensing Images based on Multi-scale Semantic Segmentation.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

2019
CRML: A Convolution Regression Model With Machine Learning for Hydrology Forecasting.
IEEE Access, 2019

Clothing Images Attributes Classification Based on Deep Neural Network.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

2018
Deep Learning and Superpixel Feature Extraction Based on Contractive Autoencoder for Change Detection in SAR Images.
IEEE Trans. Ind. Informatics, 2018

2009
An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...