default search action
Can He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Ghulam Mustafa, Hengbiao Zheng, Imran Haider Khan, Jie Zhu, Tao Yang, Aiguo Wang, Bowen Xue, Can He, Haiyan Jia, Guoqiang Li, Tao Cheng, Weixing Cao, Yan Zhu, Xia Yao:
Enhancing fusarium head blight detection in wheat crops using hyperspectral indices and machine learning classifiers. Comput. Electron. Agric. 218: 108663 (2024) - [j17]Can He, Lingxiao Meng, Zhirui Sun, Jiankun Wang, Max Q.-H. Meng:
FabricFolding: learning efficient fabric folding without expert demonstrations. Robotica 42(4): 1281-1296 (2024) - 2023
- [j16]Zhiyuan Ma, Wei Li, Timothy A. Warner, Can He, Xue Wang, Yu Zhang, Caili Guo, Tao Cheng, Yan Zhu, Weixing Cao, Xia Yao:
A framework combined stacking ensemble algorithm to classify crop in complex agricultural landscape of high altitude regions with Gaofen-6 imagery and elevation data. Int. J. Appl. Earth Obs. Geoinformation 122: 103386 (2023) - [j15]Mingfu Xue, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - [j14]Mingfu Xue, Chengxiang Yuan, Can He, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks. IEEE Trans. Emerg. Top. Comput. 11(1): 153-169 (2023) - [j13]Mengmeng Wang, Can He, Zhengjia Zhang, Tian Hu, Sibo Duan, Kaniska Mallick, Hua Li, Xiuguo Liu:
Evaluation of Three Land Surface Temperature Products From Landsat Series Using in Situ Measurements. IEEE Trans. Geosci. Remote. Sens. 61: 1-19 (2023) - [i8]Can He, Lingxiao Meng, Jiankun Wang, Max Q.-H. Meng:
FabricFolding: Learning Efficient Fabric Folding without Expert Demonstrations. CoRR abs/2303.06587 (2023) - 2022
- [j12]Yi-Feng Niu, Can He, Deqiang Fu:
Reliability assessment of a multi-state distribution network under cost and spoilage considerations. Ann. Oper. Res. 309(1): 189-208 (2022) - [j11]Mingfu Xue, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. Comput. Secur. 118: 102726 (2022) - [j10]Jiale Jiang, Haiyan Liu, Chen Zhao, Can He, Jifeng Ma, Tao Cheng, Yan Zhu, Weixing Cao, Xia Yao:
Evaluation of Diverse Convolutional Neural Networks and Training Strategies for Wheat Leaf Disease Identification with Field-Acquired Photographs. Remote. Sens. 14(14): 3446 (2022) - [j9]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models. IEEE Trans. Dependable Secur. Comput. 19(3): 1562-1578 (2022) - 2021
- [j8]Mingfu Xue, Chengxiang Yuan, Can He, Jian Wang, Weiqiang Liu:
NaturalAE: Natural and robust physical adversarial examples for object detectors. J. Inf. Secur. Appl. 57: 102694 (2021) - [j7]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An adversarial example based privacy-preserving technique for social images. J. Inf. Secur. Appl. 63: 102993 (2021) - [j6]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems. Peer-to-Peer Netw. Appl. 14(3): 1458-1474 (2021) - [c6]Shihang Wang, Jianghan Zhu, Qi Wang, Can He, Terry Tao Ye:
Customized Instruction on RISC-V for Winograd-Based Convolution Acceleration. ASAP 2021: 65-68 - [c5]Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. TrustCom 2021: 620-626 - [i7]Mingfu Xue, Shichang Sun, Can He, Yushu Zhang, Jian Wang, Weiqiang Liu:
ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples. CoRR abs/2103.01527 (2021) - [i6]Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. CoRR abs/2104.07395 (2021) - 2020
- [j5]Yi-Feng Niu, Xiu-Zhen Xu, Can He, Dong Ding, Zhi-Zhong Liu:
Capacity Reliability Calculation and Sensitivity Analysis for a Stochastic Transport Network. IEEE Access 8: 133161-133169 (2020) - [j4]Xiu-Zhen Xu, Yi-Feng Niu, Can He:
A Minimal Path-Based Method for Computing Multistate Network Reliability. Complex. 2020: 8060794:1-8060794:10 (2020) - [j3]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system. Comput. Secur. 99: 102046 (2020) - [c4]Can He, Mingfu Xue, Jian Wang, Weiqiang Liu:
Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems. ACM TUR-C 2020: 231-235 - [c3]Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. TrustCom 2020: 975-982 - [i5]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. CoRR abs/2011.13560 (2020) - [i4]Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations. CoRR abs/2011.13564 (2020) - [i3]Mingfu Xue, Chengxiang Yuan, Can He, Jian Wang, Weiqiang Liu:
Robust and Natural Physical Adversarial Examples for Object Detectors. CoRR abs/2011.13692 (2020) - [i2]Mingfu Xue, Chengxiang Yuan, Can He, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. CoRR abs/2011.13696 (2020) - [i1]Mingfu Xue, Can He, Zhiyu Wu, Jian Wang, Zhe Liu, Weiqiang Liu:
3D Invisible Cloak. CoRR abs/2011.13705 (2020)
2010 – 2019
- 2017
- [j2]Xun Zhang, Juelong Li, Jianchun Xing, Ping Wang, Qiliang Yang, Can He:
A Particle Swarm Optimization Technique-Based Parametric Wavelet Thresholding Function for Signal Denoising. Circuits Syst. Signal Process. 36(1): 247-269 (2017) - [c2]Hongxu Zheng, Jianlun Wang, Can He:
Clustering Analysis Based on Segmented Images. MLICOM (1) 2017: 57-75 - 2015
- [c1]Can He, Liming Zhang, Xiangjian He, Wenjing Jia:
A New Image Decomposition and Reconstruction Approach - Adaptive Fourier Decomposition. MMM (2) 2015: 227-236 - 2013
- [j1]Can He, Jianchun Xing, Juelong Li, Qiliang Yang, Ronghao Wang, Xun Zhang:
A Combined Optimal Sensor Placement Strategy for the Structural Health Monitoring of Bridge Structures. Int. J. Distributed Sens. Networks 9 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint