Xinran Li

Orcid: 0000-0003-4182-3989

According to our database1, Xinran Li authored at least 65 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cascade 2D attentional decoders with context-enhanced encoder for scene text recognition.
Neural Comput. Appl., May, 2024

Deep Learning-Based Landslide Recognition Incorporating Deformation Characteristics.
Remote. Sens., March, 2024

Robust Image Hashing in Encrypted Domain.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024

Learning State-Specific Action Masks for Reinforcement Learning.
Algorithms, 2024

2023
Diversified Cover Selection for Image Steganography.
Symmetry, November, 2023

Intelligent Crack Detection Method Based on GM-ResNet.
Sensors, October, 2023

Automatic segmentation of thyroid with the assistance of the devised boundary improvement based on multicomponent small dataset.
Appl. Intell., August, 2023

Characterizing response quantity on academic social Q&A sites: a multidiscipline comparison of linguistic characteristics of questions.
Libr. Hi Tech, July, 2023

Hierarchical Reinforcement Learning for Crude Oil Supply Chain Scheduling.
Algorithms, July, 2023

Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach.
IEEE Trans. Dependable Secur. Comput., 2023

A Scientometric Review of Mobility-on-Demand Car-Sharing Systems.
IEEE Intell. Transp. Syst. Mag., 2023

Context-aware Communication for Multi-agent Reinforcement Learning.
CoRR, 2023

Analysis on Multi-robot Relative 6-DOF Pose Estimation Error Based on UWB Range.
CoRR, 2023

Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism.
Proceedings of the IEEE International Conference on Communications, 2023

When Perceptual Authentication Hashing Meets Neural Architecture Search.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Financial Time Series Data Prediction by Combination Model Adaboost-KNN-LSTM.
Proceedings of the International Joint Conference on Neural Networks, 2023

TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

AC2C: Adaptively Controlled Two-Hop Communication for Multi-Agent Reinforcement Learning.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

2022
A Survey of ADAS Perceptions With Development in China.
IEEE Trans. Intell. Transp. Syst., 2022

Unified Performance Evaluation Method for Perceptual Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2022

A Domain-Adversarial Multi-Graph Convolutional Network for Unsupervised Domain Adaptation Rolling Bearing Fault Diagnosis.
Symmetry, 2022

Deviation Detection in Clinical Pathways Based on Business Alignment.
Sci. Program., 2022

Evaluation of string comparators for record linkage in Chinese environment.
Int. J. Wavelets Multiresolution Inf. Process., 2022

Defining Proximity Proteome of Histone Modifications by Antibody-mediated Protein A-APEX2 Labeling.
Genom. Proteom. Bioinform., 2022

Cost-Sensitive KNN Algorithm for Cancer Prediction Based on Entropy Analysis.
Entropy, 2022

Federated Reinforcement Learning Based on Multi-head Attention Mechanism for Vehicle Edge Caching.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Robust Watermarking for Neural Network Models Using Residual Network.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Perceptual Model Hashing: Towards Neural Network Model Authentication.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Neural Network Model Protection with Piracy Identification and Tampering Localization Capability.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

SWIPT-Enabled Cellular-Connected UAV: Energy Harvesting and Data Transmission.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

2021
Non-Intrusive Load Monitoring for Residential Appliances with Ultra-Sparse Sample and Real-Time Computation.
Sensors, 2021

SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Reversible data hiding in encrypted medical DICOM image.
Multim. Syst., 2021

Perceptual hashing for color images.
J. Electronic Imaging, 2021

Exploring real-time super-resolution generative adversarial networks.
Int. J. Sens. Networks, 2021

An Improved Chinese String Comparator for Bloom Filter Based Privacy-Preserving Record Linkage.
Entropy, 2021

Composition and Application of Current Advanced Driving Assistance System: A Review.
CoRR, 2021

String Comparators for Chinese-Characters-Based Record Linkages.
IEEE Access, 2021

A Control Strategy for Battery Energy Storage Systems Participating in Primary Frequency Control Considering the Disturbance Type.
IEEE Access, 2021

An Evaluation of the Quality of Answers to Academic Questions Relating to COVID-19 on Academic Social Q&A Platforms.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Compound Screening with Deep Learning for Neglected Diseases: Leishmaniasis.
Proceedings of the Machine Learning in Computational Biology Meeting, 2021

Research on Mathematical Calculation of Bridge Health Monitoring System based on BIM Model Time History Analysis.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2020
Field Weights Computation for Probabilistic Record Linkage in Presence of Missing Data.
Int. J. Pattern Recognit. Artif. Intell., 2020

Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis.
CoRR, 2020

Comparison of Linguistic Characteristics of Different Disciplines' Questions on Academic Social Q&A Sites.
Proceedings of the JCDL '20: Proceedings of the ACM/IEEE Joint Conference on Digital Libraries in 2020, 2020

Predicting Response Quantity from Linguistic Characteristics of Questions on Academic Social Q&A Sites.
Proceedings of the Digital Libraries at Times of Massive Societal Transition, 2020

Criminisi Algorithm Applied to a GelSight Fingertip Sensor for Multi-modality Perception.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2020

XSS Attack Detection Model Based on Semi-supervised Learning Algorithm with Weighted Neighbor Purity.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 2020

2019
Evolving the pulmonary nodules diagnosis from classical approaches to deep learning aided decision support: three decades development course and future prospect.
CoRR, 2019

Ultrasonic section locating method based on Hough transform.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
A new wind power prediction method based on ridgelet transforms, hybrid feature selection and closed-loop forecasting.
Adv. Eng. Informatics, 2018

Optimization Study on Outlet Pressure of Water Supply Pumping Station Based on Relative Entropy Theory.
Proceedings of the Communications, Signal Processing, and Systems, 2018

2016
Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128.
Secur. Commun. Networks, 2016

Improved Results of Impossible Differential Cryptanalysis on Reduced FOX.
Comput. J., 2016

2015
Multiple Impossible Differential Cryptanalysis on Reduced FOX.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Two improved homomorphic MAC schemes in network coding.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes.
Proceedings of the Information Security Practice and Experience, 2014

An empiric weight computation for record linkage using linearly combined fields' similarity scores.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

An Adaptive Step Detection Algorithm Based on the State Machine.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Study on Distribution Coefficient in Regulation Services with Energy Storage System.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

Implementation of an extended Fellegi-Sunter probabilistic record linkage method using the Jaro-Winkler string comparator.
Proceedings of IEEE-EMBS International Conference on Biomedical and Health Informatics, 2014

2013
An Authentication Scheme for Subspace Codes over Network Based on Linear Codes
CoRR, 2013

Security Analysis on "An Authentication Code Against Pollution Attacks in Network Coding"
CoRR, 2013

2011
Correlated evolution of transcription factors and their binding sites.
Bioinform., 2011


  Loading...