default search action
Lihua Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Chen Li, Ziniu Lin, Lihua Tian, Bin Zhang:
A scheduling algorithm based on critical factors for heterogeneous multicore processors. Concurr. Comput. Pract. Exp. 36(7) (2024) - [j25]Xu Liang, Chen Li, Lihua Tian:
Generative adversarial network for semi-supervised image captioning. Comput. Vis. Image Underst. 249: 104199 (2024) - [j24]Heyu Xing, Lihua Tian, Mingyuan Cao, Chen Li:
A multi-embedding domain video steganography algorithm based on TU partitioning and intra prediction mode. Neurocomputing 575: 127247 (2024) - [j23]Xu Liang, Chen Li, Lihua Tian:
Clustering-based mask recovery for image captioning. Neurocomputing 599: 128127 (2024) - [j22]Heyu Xing, Lihua Tian, Chen Li:
A high capacity video steganography based on intra luma and chroma modes. Multim. Tools Appl. 83(15): 44193-44216 (2024) - [j21]Yixiao Xiang, Lihua Tian, Chen Li:
A Domain Adaptive Semantic Segmentation Method Using Contrastive Learning and Data Augmentation. Neural Process. Lett. 56(2): 74 (2024) - [j20]Haowei Chen, Chen Li, Jiajing Liang, Lihua Tian:
A Dialogues Summarization Algorithm Based on Multi-task Learning. Neural Process. Lett. 56(3): 160 (2024) - [j19]Chen Li, Zhuotong Liu, Sijie Li, Ziniu Lin, Lihua Tian:
Variable length deep cross-modal hashing based on Cauchy probability function. Wirel. Networks 30(5): 3607-3617 (2024) - [c37]Kailei Cheng, Lihua Tian, Chen Li:
LaWNet: Audio-Visual Emotion Recognition by Listening and Watching. IJCNN 2024: 1-8 - 2023
- [j18]Botong Zhang, Lihua Tian, Chen Li, Yi Yang:
Heatmap and edge guidance network for salient object detection. Comput. Electr. Eng. 105: 108525 (2023) - [j17]Xue Zhang, Chen Li, Lihua Tian:
Advanced audio coding steganography algorithm with distortion minimization model based on audio beat. Comput. Electr. Eng. 106: 108580 (2023) - [j16]Hongmei Li, Lihua Tian, Chen Li:
Multi-task melody extraction using feature optimization and CRNN-CRF. Comput. Electr. Eng. 107: 108605 (2023) - [j15]Yutao Song, Chen Li, Lihua Tian, Hui Song:
A reinforcement learning based job scheduling algorithm for heterogeneous computing environment. Comput. Electr. Eng. 107: 108653 (2023) - [c36]Chen Li, Yu Li, Hui Song, Lihua Tian:
Deep Semi-Supervised Learning With Contrastive Learning in Large Vocabulary Automatic Chord Recognition. CCWC 2023: 1065-1069 - [c35]Wenzheng Li, Lihua Tian, Zhigang Sun, Li Xiao:
Image Sample Generation of Stator Surface Defects Based on Layer Mask Blending Generative Adversarial Network. ICCAI 2023: 258-265 - 2022
- [j14]Ziniu Lin, Chen Li, Lihua Tian, Bin Zhang:
A scheduling algorithm based on reinforcement learning for heterogeneous environments. Appl. Soft Comput. 130: 109707 (2022) - [j13]Yi Yang, Lihua Tian, Chen Li, Botong Zhang:
Multi-scale depth classification network for monocular depth estimation. Comput. Electr. Eng. 102: 108206 (2022) - [c34]Xinchen Xie, Chen Li, Lihua Tian:
Feature Fusion Network Based on Hybrid Attention for Semantic Segmentation. AIIoT 2022: 9-14 - [c33]Wenqiang Wang, Lihua Tian, Chen Li:
Multistage 3D Hand Pose Estimation Algorithm Based on Skeleton Points. ICCT 2022: 1571-1575 - [c32]Xi Qi, Lihua Tian, Chen Li, Hui Song, Jiahui Yan:
Singing Melody Extraction Based on Combined Frequency-Temporal Attention and Attentional Feature Fusion with Self-Attention. ISM 2022: 220-227 - [c31]Ke Cao, Lihua Tian, Qiwei Li, Hao Chen, Chen Li, Yu Fan, Jianwei Ye, Weimin Yu:
A Stagewise Deep Learning Framework for Tooth Instance Segmentation in CBCT Images. PRICAI (1) 2022: 415-425 - 2021
- [j12]Chen Li, Yajun Liang, Hongmei Li, Lihua Tian:
Main melody extraction from polyphonic music based on frequency amplitude and multi-octave relation. Comput. Electr. Eng. 90: 106985 (2021) - [j11]Tian Yuan, Chen Li, Lihua Tian, Guo Li:
RM-IQA: A new no-reference image quality assessment framework based on range mapping method. Comput. Electr. Eng. 96(Part): 107508 (2021) - [j10]Zhuotong Liu, Chen Li, Lihua Tian:
Deep hashing based on triplet labels and quantitative regularization term with exponential convergence. Concurr. Comput. Pract. Exp. 33(15) (2021) - [j9]Xiangxiang Cui, Shi Chang, Chen Li, Bin Kong, Lihua Tian, Hongqiang Wang, Peng Huang, Meng Yang, Yenan Wu, Zhongyu Li:
DEAttack: A differential evolution based attack method for the robustness evaluation of medical image segmentation. Neurocomputing 465: 38-52 (2021) - [c30]Yusheng Bi, Lihua Tian, Chen Li:
Interactive Attention Network for Chinese Address Element Recognition. UEMCON 2021: 390-395 - 2020
- [j8]Lihua Tian, Hangtao Dai, Chen Li:
A Semi-fragile Video Watermarking Algorithm Based On Chromatic Residual DCT. Multim. Tools Appl. 79(3-4): 1759-1779 (2020) - [j7]Hanjian Song, Lihua Tian, Chen Li:
Action temporal detection method based on confidence curve analysis. Multim. Tools Appl. 79(45-46): 34471-34488 (2020) - [j6]Mingyuan Cao, Lihua Tian, Chen Li:
A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264. Sensors 20(18): 5242 (2020) - [j5]Chen Li, Yi Yang, Kai Liu, Lihua Tian:
A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC. Wirel. Commun. Mob. Comput. 2020: 8848553:1-8848553:11 (2020) - [c29]Kun Li, Chen Li, Lihua Tian:
Matrix Factorization for Video Recommendation Based on Instantaneous User Interest. EITCE 2020: 596-601 - [c28]Yiyao Wang, Lihua Tian, Chen Li:
An Improved Text Classification Model Based on Memory Convolution Neural Network. ICCAI 2020: 19-23 - [c27]Chen Li, Xue Zhang, Tao Luo, Lihua Tian:
Audio Steganography Algorithm Based on Genetic Algorithm for MDCT Coefficient Adjustment for AAC. ISM 2020: 111-112
2010 – 2019
- 2019
- [c26]Chen Li, Yamei Sun, Xuebo Meng, Lihua Tian:
Homologous Audio Copy-move Tampering Detection Method Based on Pitch. ICCT 2019: 530-534 - [c25]Yajun Liang, Chen Li, Lihua Tian:
Melody extraction from polyphonic music based on the amplitude relation. ICMSSP 2019: 84-88 - [p1]Xingyu Liu, Lihua Tian, Chen Li:
Discrete Hashing Based on Point-Wise Supervision and Inner Product. Cognitive Internet of Things 2019: 333-341 - 2018
- [c24]Chen Li, Feiyang Wang, Lihua Tian, Hui Song, Xuebo Meng:
A Voice Activity Detection Method Based on DWT-MVNPDF. ICCAIS 2018: 17-21 - [c23]Tianyang Du, Lihua Tian, Chen Li:
Image Copy-Move Forgery Detection Based on SIFT-BRISK. ICCAIS 2018: 141-145 - [c22]Xinran Bai, Chen Li, Lihua Tian, Hui Song:
Dynamic Hand Gesture Recognition Based On Depth Information. ICCAIS 2018: 216-221 - [c21]Wenjing Zhang, Lihua Tian, Chen Li, Haojia Li:
A SSD-based Crowded Pedestrian Detection Method. ICCAIS 2018: 222-226 - [c20]Zhe Yang, Lihua Tian, Chen Li:
Gradual Shot Detection employing Automatic White Balance Method. ICMSSP 2018: 71-74 - [c19]Chuang Wu, Lihua Tian, Chen Li:
Pixel-wise binary classification network for salient object detection. ICMV 2018: 1104124 - [c18]Xuebo Meng, Chen Li, Lihua Tian:
Detecting Audio Splicing Forgery Algorithm Based on Local Noise Level Estimation. ICSAI 2018: 861-865 - [c17]Hanjian Song, Lihua Tian, Chen Li:
3D Convolutional Network Based Foreground Feature Fusion. ISM 2018: 253-258 - 2017
- [c16]Jiapeng Zhao, Chen Li, Lihua Tian, Jihua Zhu:
FPFH-based graph matching for 3D point cloud registration. ICMV 2017: 106960M - [c15]Xin Ma, Lihua Tian, Chen Li:
Salient Object Detection via Region Shape Feature Contrast and Saliency Fusion. ICVIP 2017: 25-28 - [c14]Xi Liu, Chen Li, Lihua Tian:
Hand Gesture Recognition Based on Wavelet Invariant Moments. ISM 2017: 459-464 - [c13]Yuan Wang, Lihua Tian, Chen Li:
LBP-SVD Based Copy Move Forgery Detection Algorithm. ISM 2017: 553-556 - [c12]Mi Zhang, Lihua Tian, Chen Li:
Key Frame Extraction Based on Entropy Difference and Perceptual Hash. ISM 2017: 557-560 - [c11]Zhe Yang, Lihua Tian, Chen Li:
A Fast Video Shot Boundary Detection Employing OTSU's Method and Dual Pauta Criterion. ISM 2017: 583-586 - 2016
- [c10]Mingyuan Cao, Chen Li, Zongze Wu, Lihua Tian, Shaoyi Du:
Novel Robust Audio Watermarking Scheme against Synchronization Attacks. ICIMCS 2016: 9-13 - [c9]Huashan Qian, Lihua Tian, Chen Li:
Robust Blind Image Watermarking Algorithm Based On Singular Value Quantization. ICIMCS 2016: 277-280 - [c8]Lihua Tian, Shanmin Pang, Chen Li:
Multiple Cartesian K-Medoids for a Fine Quantization. ICPADS 2016: 1216-1220 - [c7]Jiaxu Ling, Lihua Tian, Chen Li:
3D Human Activity Recognition Using Skeletal Data from RGBD Sensors. ISVC (2) 2016: 133-142 - 2015
- [j4]Lihua Tian, Nanning Zheng, Jianru Xue, Ce Li:
Authentication and copyright protection watermarking scheme for H.264 based on visual saliency and secret sharing. Multim. Tools Appl. 74(9): 2991-3011 (2015) - [j3]Lu Li, Jianru Xue, Xiaofeng Wang, Lihua Tian:
A robust approach to detect digital forgeries by exploring correlation patterns. Pattern Anal. Appl. 18(2): 351-365 (2015) - 2012
- [c6]Ce Li, Yannan Zhou, Chengsu Ouyang, Lihua Tian:
X-ray image enhancement based on fuzzy sure entropy in LabVIEW. BMEI 2012: 395-398 - 2011
- [j2]Lihua Tian, Nanning Zheng, Jianru Xue, Ce Li, Xiaofeng Wang:
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection. Signal Process. Image Commun. 26(8-9): 427-437 (2011) - [c5]Lihua Tian, Nanning Zheng, Jianru Xue:
A blind and spatial-temporal based video watermarking for H.264/AVC. ACPR 2011: 598-602 - [c4]Lu Li, Jianru Xue, Xiaofeng Wang, Lihua Tian:
A Robust Approach to Detect Tampering by Exploring Correlation Patterns. CAIP (2) 2011: 515-522 - [c3]Lihua Tian, Huitao Liu, Feng Luan, Yuan Gao:
QSPR Study on the prediction of ionization potential of various organic compounds by heuristic method and radial basis function neural network. ICNC 2011: 199-202 - 2010
- [j1]Xiaofeng Wang, Nanning Zheng, Lihua Tian:
Hash key-based video encryption scheme for H.264/AVC. Signal Process. Image Commun. 25(6): 427-437 (2010)
2000 – 2009
- 2009
- [c2]Xuguang Lan, Jianru Xue, Lihua Tian, Wei Hu, Tao Xu, Nanning Zheng:
A Peer-to-Peer Architecture for Live Streaming with DRM. CCNC 2009: 1-5 - 2008
- [c1]Lihua Tian, Nanning Zheng, Jianru Xue, Tao Xu:
A CAVLC-Based Blind Watermarking Method for H.264/AVC Compressed Video. APSCC 2008: 1295-1299
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint