default search action
Yue Li 0013
Person information
- affiliation: Nankai University, College of Software, Tianjin, China
- affiliation: University of Warwick, Department of Computer Science, UK
Other persons with the same name
- Yue Li — disambiguation page
- Yue Li 0001 — California Institute of Technology, Pasadena, CA, USA (and 1 more)
- Yue Li 0002 — College of William & Mary, Williamsburg, VA, USA
- Yue Li 0003 — Jilin University, Department of Information, College of Communication Engineering, Changchun, China
- Yue Li 0004 — City University of Hong Kong, Department of Mechanical and Biomedical Engineering, Hong Kong
- Yue Li 0005 — Purdue University, West Lafayette, IN, USA
- Yue Li 0006 — Nanjing University, China (and 2 more)
- Yue Li 0007 — University of Victoria, Department of Electrical and Computer Engineering, BC, Canada
- Yue Li 0008 — Hong Kong University of Science and Technology, Department of Electrical and Computer Engineering, Hong Kong
- Yue Li 0009 — Tsinghua University, Department of Electronic Engineering, Microwave and Antenna Institute, Beijing, China
- Yue Li 0010 — Donghua University, School of Computer Science and Technology, Shanghai, China (and 1 more)
- Yue Li 0011 — University of Rennes 1, France
- Yue Li 0012 — University of Karlsruhe, Germany
- Yue Li 0014 — Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA, USA
- Yue Li 0015 — Bytedance Inc., San Diego, CA, USA (and 1 more)
- Yue Li 0016 — Hunan University, School of Information Science and Engineering, Changsha, China
- Yue Li 0017 — Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory, Boston, MA, USA (and 1 more)
- Yue Li 0018 — Harbin Institute of Technology, Communications Engineering Research Center, Shenzhen, China
- Yue Li 0019 — Florida International University, School of Computing and Information Sciences, Miami, FL, USA (and 2 more)
- Yue Li 0020 — Wuhan University of Science and Engineering, Wuhan, China
- Yue Li 0021 — Heriot-Watt University, School of Mathematical and Computer Sciences, Edinburgh, UK
- Yue Li 0022 — Naval Aviation University, College of Basic Science for Aviation, Yantai, China
- Yue Li 0023 — Xi'an Jiaotong-Liverpool University, Suzhou, China (and 1 more)
- Yue Li 0024 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Yue Li 0025 — Chinese University of Hong Kong, Department of Geography and Resource Management, Hong Kong
- Yue Li 0026 — University College Dublin, School of Electrical and Electronic Engineering, Dublin, Ireland
- Yue Li 0027 — Nanjing University of Aeronautics and Astronautics, College of Automation Engineering, Nanjing, China
- Yue Li 0028 — Capital Normal University, Information Engineering College, Beijing, China
- Yue Li 0029 — University of Science and Technology Beijing, School of Computer and Communication Engineering, Beijing, China
- Yue Li 0030 — Zhejiang University, College of Electrical Engineering, Hangzhou, China
- Yue Li 0031 — Case Western Reserve University, Department of Civil Engineering, Cleveland, OH, USA (and 1 more)
- Yue Li 0032 — National University of Defense Technology, Laboratory of Science and Technology on Integrated Logistics Support, Changsha, China
- Yue Li 0033 — AIG Software, Jersey City, NJ, USA (and 1 more)
- Yue Li 0034 — University of New South Wales, UNSW, School of Electrical Engineering and Telecommunications, Sydney, Australia
- Yue Li 0035 — Télécom ParisTech, INFRES, France,
- Yue Li 0036 — University of Amsterdam, Atlas Lab, The Netherlands (and 1 more)
- Yue Li 0037 — Peking University, School of Computer Science, HCST, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j14]Wei Wang, Yimeng Chai, Yue Li:
GAGIN: generative adversarial guider imputation network for missing data. Neural Comput. Appl. 34(10): 7597-7610 (2022) - [c22]Wei Wang, Yimeng Chai, Yue Li:
A Global to Local Guiding Network for Missing Data Imputation. ICASSP 2022: 4058-4062 - [c21]Wei Wang, Dongyu Yu, Yue Li:
FIPHN: Feature-Integrated Patch-Hierarchical Network for Single Image Reflection Removal. ICPR 2022: 685-691 - [c20]Wei Wang, Ziwen Wu, Xueshuang Xiang, Yue Li:
LDGAN: Latent Determined Ensemble Helps Removing IID Data Assumption and Cross-node Sampling in Distributed GANs. ICPR 2022: 2135-2141 - [c19]Yue Li, Xuechun Han, Wei Wang:
Multi-scale Adaptive Dual Attention for Image Defocus Blur Detection. ISCAS 2022: 2328-2332 - 2021
- [c18]Wei Wang, Baohua Zhang, Tao Cui, Yimeng Chai, Yue Li:
Research on Knowledge Distillation of Generative Adversarial Networks. DCC 2021: 376 - [c17]Yue Li, Xuechun Han, Litong Ge, Fanghao Liu, Yimeng Chai, Xianchun Zhou, Wei Wang:
A Recurrent Reinforcement Learning Approach for Small Object Detection with Dynamic Refinement. IJCNN 2021: 1-8 - [c16]Wei Wang, Yimeng Chai, Ziwen Wu, Litong Ge, Xuechun Han, Baohua Zhang, Chuang Wang, Yue Li:
Generating Adversarial Patches Using Data-Driven MultiD-WGAN. ISCAS 2021: 1-5 - 2020
- [j13]Wei Wang, Chuang Wang, Tao Cui, Yue Li:
Study of Restrained Network Structures for Wasserstein Generative Adversarial Networks (WGANs) on Numeric Data Augmentation. IEEE Access 8: 89812-89821 (2020) - [c15]Wei Wang, Chuang Wang, Tao Cui, Ruohan Gong, Zuqi Tang, Xiangchun Zhou, Yue Li:
Numeric Data Augmentation using Structural Constraint Wasserstein Generative Adversarial Networks. ISCAS 2020: 1-6 - [c14]Yue Li, Xiangchun Zhou, Tao Cui, Ruohan Gong, Zuqi Tang, Chuang Wang, Wei Wang:
Video Key Object Detection Network via Reinforcement Learning. ISCAS 2020: 1-6 - [i2]Wei Wang, Yimeng Chai, Tao Cui, Chuang Wang, Baohua Zhang, Yue Li, Yi An:
Restrained Generative Adversarial Network against Overfitting in Numeric Data Augmentation. CoRR abs/2010.13549 (2020)
2010 – 2019
- 2019
- [i1]Wei Wang, Chuang Wang, Tao Cui, Yue Li:
Study of Constrained Network Structures for WGANs on Numeric Data Generation. CoRR abs/1911.01649 (2019) - 2017
- [c13]Chia-Hung Wei, Dapeng Zhang, Yue Li, Wei Wang:
Fine-Grained Categorization Based on Feature Selection. ICMLC 2017: 300-304 - 2015
- [c12]Yingxue Wu, Xi Zhao, Guiyang Xie, Yangkexin Liang, Wei Wang, Yue Li:
Multi-scale Medical Image Segmentation Based on Salient Region Detection. CCBR 2015: 624-632 - 2014
- [c11]Yinan Wang, Weirong Chen, Yue Li, Wei Wang, Chang-Tsun Li:
HPS: Histogram preserving steganography in spatial domain. IWBF 2014: 1-4 - 2012
- [j12]Chang-Tsun Li, Yue Li:
Color-Decoupled Photo Response Non-Uniformity for Digital Image Forensics. IEEE Trans. Circuits Syst. Video Technol. 22(2): 260-271 (2012) - 2011
- [j11]Yue Li:
Decomposed PRNU Library for Forensics on Photos. Int. J. Digit. Libr. Syst. 2(1): 38-51 (2011) - [j10]Yue Li, Chia-Hung Wei:
Digital Image Authentication: A Review. Int. J. Digit. Libr. Syst. 2(2): 55-78 (2011) - [j9]Yue Li:
A Survey of Digital Forensic Techniques for Digital Libraries. Int. J. Digit. Libr. Syst. 2(3): 49-66 (2011) - [j8]Yue Li, Wei Wang:
Traffic-Signs Recognition System Based on FCM and Content-Based Image Retrieval. Int. J. Digit. Libr. Syst. 2(4): 1-12 (2011) - [j7]Jinn-Ming Chang, Pai Jung Huang, Chih-Ying Gwo, Yue Li, Chia-Hung Wei:
Hierarchical Correlation of Multi-Scale Spatial Pyramid for Similar Mammogram Retrieval. Int. J. Digit. Libr. Syst. 2(4): 13-23 (2011) - [j6]Chee-Chiang Chen, Pai Jung Huang, Chih-Ying Gwo, Yue Li, Chia-Hung Wei:
Mammogram Retrieval: Image Selection Strategy of Relevance Feedback for Locating Similar Lesions. Int. J. Digit. Libr. Syst. 2(4): 45-53 (2011) - [j5]Chia-Hung Wei, Yue Li, Pai Jung Huang:
Mammogram retrieval through machine learning within BI-RADS standards. J. Biomed. Informatics 44(4): 607-614 (2011) - [c10]Yue Li, Chia-Hung Wei:
Medical image retrieval: Multiple regression models for user's search target. ICMLC 2011: 1436-1443 - 2010
- [j4]Chang-Tsun Li, Yue Li:
Progressive Exponential Clustering-Based Steganography. EURASIP J. Adv. Signal Process. 2010 (2010) - [c9]Chang-Tsun Li, Yue Li:
Digital camera identification using Colour-Decoupled photo response non-uniformity noise pattern. ISCAS 2010: 3052-3055
2000 – 2009
- 2009
- [j3]Chang-Tsun Li, Yue Li, Chia-Hung Wei:
Protection of Digital Mammograms on PACSs Using Data Hiding Techniques. Int. J. Digit. Crime Forensics 1(1): 75-88 (2009) - [j2]Chang-Tsun Li, Yue Li:
Medical Images Authentication through Repetitive Index Modulation Based Watermarking. Int. J. Digit. Crime Forensics 1(4): 32-39 (2009) - [j1]Chia-Hung Wei, Yue Li, Wing-Yin Chau, Chang-Tsun Li:
Trademark image retrieval using synthetic features for describing global shape and interior structure. Pattern Recognit. 42(3): 386-394 (2009) - [c8]Chang-Tsun Li, Yue Li:
Authenticating Medical Images through Repetitive Index Modulation Based Watermarking. e-Forensics 2009: 153-159 - [c7]Yue Li, Chang-Tsun Li:
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis. e-Forensics 2009: 166-172 - [c6]Fei Peng, Yu-Zhou Lei, Chang-Tsun Li, Yue Li:
A reversible watermarking scheme for 2D engineering graphics based on improved quantisation index modulation. ICDP 2009: 1-6 - [c5]Chang-Tsun Li, Chih-Yuan Chang, Yue Li:
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise. ISDF 2009: 19-25 - 2008
- [c4]Chang-Tsun Li, Yue Li:
Random Index Modulation Based Fragile Watermarking Scheme for Authenticating Colour Images. IIH-MSP 2008: 16-19 - 2007
- [c3]Yue Li, Chang-Tsun Li, Chia-Hung Wei:
Protection of Mammograms Using Blind Steganography and Watermarking. IAS 2007: 496-500 - [c2]Chia-Hung Wei, Yue Li, Chang-Tsun Li:
Effective Extraction of Gabor Features for Adaptive Mammogram Retrieval. ICME 2007: 1503-1506 - 2006
- [c1]Yue Li, Chang-Tsun Li:
Steganographic Scheme for VQ Compressed Images Using Progressive Exponential Clustering. AVSS 2006: 85
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint