default search action
Li Kang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Li Kang 0001 — Shenzhen University, College of Electronic and Information Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Li Kang, Zhiwei Lu, Lingyu Meng, Zhijian Gao:
YOLO-FA: Type-1 fuzzy attention based YOLO detector for vehicle detection. Expert Syst. Appl. 237(Part B): 121209 (2024) - [j24]Qinna Zhu, Haibo Yu, Li Kang, Jianchao Zeng:
A Q-learning driven competitive surrogate assisted evolutionary optimizer with multiple oriented mutation operators for expensive problems. Inf. Sci. 682: 121224 (2024) - [j23]Yaxin Kang, Haibo Yu, Li Kang, Gangzhu Qiao, Dongpeng Guo, Jianchao Zeng:
A multi-role steered artificial bee colony algorithm with variable dimensionality perturbation for multimodal optimization problems. Memetic Comput. 16(2): 159-178 (2024) - [j22]Yiyun Gong, Haibo Yu, Li Kang, Chaoli Sun, Jianchao Zeng:
Enhancing surrogate-assisted evolutionary optimization for medium-scale expensive problems: a two-stage approach with unsupervised feature learning and Q-learning. Neural Comput. Appl. 36(25): 15545-15565 (2024) - [j21]Yiyun Gong, Haibo Yu, Li Kang, Gangzhu Qiao, Dongpeng Guo, Jianchao Zeng:
A surrogate-assisted evolutionary algorithm with dual restricted Boltzmann machines and reinforcement learning-based adaptive strategy selection. Swarm Evol. Comput. 89: 101629 (2024) - [j20]Zhi Chen, Jiang Duan, Li Kang, Hongyan Xu, Rui Chen, Guoping Qiu:
Generating Counterfactual Instances for Explainable Class-Imbalance Learning. IEEE Trans. Knowl. Data Eng. 36(3): 1130-1144 (2024) - [c21]Li Kang, Binbin Feng, Zhijun Ding:
Adaptive Selecting Algorithm for Runtime Types of Microservices. ICWS 2024: 1106-1108 - [i3]Jianjun Huang, Lixin Ye, Li Kang:
FedSR: A Semi-Decentralized Federated Learning Algorithm for Non-IIDness in IoT System. CoRR abs/2403.14718 (2024) - 2023
- [j19]Tao Wang, Li Kang, Jiang Duan:
A secure access control scheme with batch verification for VANETs. Comput. Commun. 205: 79-86 (2023) - [j18]Zhi Chen, Jiang Duan, Li Kang, Guoping Qiu:
Supervised Anomaly Detection via Conditional Generative Adversarial Network and Ensemble Active Learning. IEEE Trans. Pattern Anal. Mach. Intell. 45(6): 7781-7798 (2023) - [c20]Zhiwei Lu, Li Kang, Jianjun Huang:
Depthwise Convolution with Channel Mixer: Rethinking MLP in MetaFormer for Faster and More Accurate Vehicle Detection. ICANN (10) 2023: 136-147 - [c19]Yihua Guo, Li Kang, Renjun Jia, Ting Wang:
Multi-cycle Deep Recurrent Learning for Power Consumption Time Series Prediction. ICCEIC 2023: 226-230 - [c18]Junshen Zhang, Li Kang, Xuan Xie:
Recyclable garbage detection algorithm under occlusion conditions. ICMLCA 2023: 815-819 - 2022
- [j17]Li Kang, Ziqi Zhou, Jianjun Huang, Wenzhong Han:
Renal tumors segmentation in abdomen CT Images using 3D-CNN and ConvLSTM. Biomed. Signal Process. Control. 72(Part): 103334 (2022) - [j16]Holger R. Roth, Ziyue Xu, Carlos Tor-Díez, Ramon Sánchez-Jacob, Jonathan Zember, Jose Molto, Wenqi Li, Sheng Xu, Baris Turkbey, Evrim Turkbey, Dong Yang, Ahmed Harouni, Nicola Rieke, Shishuai Hu, Fabian Isensee, Claire Tang, Qinji Yu, Jan Sölter, Tong Zheng, Vitali Liauchuk, Ziqi Zhou, Jan Hendrik Moltz, Bruno Oliveira, Yong Xia, Klaus H. Maier-Hein, Qikai Li, Andreas Husch, Luyang Zhang, Vassili Kovalev, Li Kang, Alessa Hering, João L. Vilaça, Mona Flores, Daguang Xu, Bradford J. Wood, Marius George Linguraru:
Rapid artificial intelligence solutions in a pandemic - The COVID-19-20 Lung CT Lesion Segmentation Challenge. Medical Image Anal. 82: 102605 (2022) - [j15]Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu:
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation. IEEE Syst. J. 16(1): 735-746 (2022) - [j14]Zhi Chen, Jiang Duan, Li Kang, Guoping Qiu:
Class-Imbalanced Deep Learning via a Class-Balanced Ensemble. IEEE Trans. Neural Networks Learn. Syst. 33(10): 5626-5640 (2022) - [c17]Junshen Zhang, Li Kang:
Combined Image Enhancement for Recyclable Waste Object Detection In Low-Light Environment. ISCSIC 2022: 265-269 - [c16]Li Kang, Yihua Guo, Ting Wang:
Short-term Power Consumption Forecasting with Long Short Term Memory Network. RICAI 2022: 975-979 - 2021
- [j13]Tao Wang, Li Kang, Jiang Duan:
Dynamic fine-grained access control scheme for vehicular ad hoc networks. Comput. Networks 188: 107872 (2021) - [j12]Zhi Chen, Jiang Duan, Li Kang, Guoping Qiu:
A hybrid data-level ensemble to enable learning from highly imbalanced dataset. Inf. Sci. 554: 157-176 (2021) - [j11]Zeqiu Chen, Jianghui Zhou, Ruizhi Sun, Li Kang:
A new evolving mechanism of genetic algorithm for multi-constraint intelligent camera path planning. Soft Comput. 25(7): 5073-5092 (2021) - [c15]Jie Xiong, Lei Lei, Haiyan Li, Manting Huang, Li Kang, Ce Yang:
AcuEBase v1.0: an online database for analysis of acupuncture effect. BIBM 2021: 3893-3897 - [i2]Zhi Chen, Jiang Duan, Li Kang, Guoping Qiu:
Supervised Anomaly Detection via Conditional Generative Adversarial Network and Ensemble Active Learning. CoRR abs/2104.11952 (2021) - 2020
- [j10]Haibo Yu, Li Kang, Ying Tan, Chaoli Sun, Jianchao Zeng:
Truncation-learning-driven surrogate assisted social learning particle swarm optimization for computationally expensive problem. Appl. Soft Comput. 97(Part): 106812 (2020) - [j9]Li Kang, Leyou Zhang:
A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme. Int. J. Netw. Secur. 22(5): 815-827 (2020) - [j8]Jiang Duan, Li Kang, Zhi Chen, Tao Peng, Yifeng Wang:
A photo-sharing social network based on blockchain technology. Int. J. Technol. Manag. 84(1/2): 70-85 (2020) - [j7]Zhi Chen, Jiang Duan, Cheng Yang, Li Kang, Guoping Qiu:
SMLBoost-adopting a soft-margin like strategy in boosting. Knowl. Based Syst. 195: 105705 (2020)
2010 – 2019
- 2019
- [j6]Pengfei Liang, Leyou Zhang, Li Kang, Juan Ren:
Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage. J. Inf. Secur. Appl. 47: 258-266 (2019) - [c14]Li Kang, Leyou Zhang:
Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud. FCS 2019: 3-18 - 2018
- [j5]Li Kang, Xu Li, Jinhai Huo, Wenjun Huang:
Inter-Area Interference Modeling in Distributed Wireless Mobile Ad Hoc Networks. IEEE Access 6: 58510-58520 (2018) - 2016
- [i1]Shi-Long Luo, Kai Gong, Li Kang:
Identifying Influential Spreaders of Epidemics on Community Networks. CoRR abs/1601.07700 (2016) - 2015
- [c13]Yue Wu, Tianyu Jia, Bo Xia, Xinlong Ma, Li Kang, Xiaodong Yang:
Suppression of VCO pulling effects using even-harmonic quiet transmitting circuits. ESSCIRC 2015: 128-131 - 2014
- [j4]Li Kang, Xiaohu Tang, Jiafen Liu:
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability. Sci. China Inf. Sci. 57(11): 1-14 (2014) - [j3]Li Kang, Lingyun Ye, Kaichen Song:
A fast in-situ SINS and Doppler sensor calibration algorithm for underwater vehicle navigation. IEICE Electron. Express 11(23): 20140994 (2014) - [j2]Li Kang, Lingyun Ye, Kaichen Song, Yang Zhou:
Attitude Heading Reference System Using MEMS Inertial Sensors with Dual-Axis Rotation. Sensors 14(10): 18075-18095 (2014) - [c12]Kaiqiang Zhang, Li Kang, Qing Wang, Hong Chen, Dehai Zhu, Xinrong Cheng:
Ontology-Based Skills Knowledge Base Construction Method and Its Application in Educational Games. IEEE WISA 2014: 249-253 - [c11]Bo Xia, Yue Wu, Li Kang, Xinlong Ma, Xiaodong Yang:
Practical design consideration in a Bluetooth tranceiver design. MWSCAS 2014: 973-976 - 2013
- [j1]Daiyi Li, Li Kang, Xinrong Cheng, Daoliang Li, Laiqing Ji, Kaiyi Wang, Yingyi Chen:
An ontology-based knowledge representation and implement method for crop cultivation standard. Math. Comput. Model. 58(3-4): 466-473 (2013) - [c10]Li Kang, Yinhong Dong:
The algorithms for the bi-level programming location model based on the demand assigning. FSKD 2013: 999-1004 - [c9]Ding Jinwen, He Guochao, Li Kang, Dong Lanfang, Yao Chuanming, Li Feng:
A Construction Model for 3D Imaging of Scanning Acoustic Microscopy. ICIG 2013: 1-4 - 2012
- [c8]Daiyi Li, Li Kang:
Implementation and Design of Agricultural Product Cultivating Standard Ontology Database Mode. WISA 2012: 207-210 - [c7]Yuhong Guo, Li Kang, Tie Shi:
Personalized Tweet Ranking Based on AHP: A Case Study of Micro-blogging Message Ranking in T.Sina. Web Intelligence/IAT Workshops 2012: 159-163 - 2011
- [c6]Laiqing Ji, Xinrong Cheng, Li Kang, Daoliang Li, Daiyi Li, Kaiyi Wang, Yingyi Chen:
A SVM-Based Text Classification System for Knowledge Organization Method of Crop Cultivation. CCTA (1) 2011: 318-324 - 2010
- [c5]Jianmin Xu, Jinzhi Xiong, Li Kang:
A general formulation of 2nd-order Polynomial Smooth Support Vector Machines. ICNC 2010: 2212-2216
2000 – 2009
- 2008
- [c4]Lu Zhang, Li Kang, Xinrong Cheng, Guowu Jiang, Zhijia Niu:
The Acquisition of Class Definitions in the Commodity Ontology of Agricultural Means of Production. CCTA (2) 2008: 1299-1308 - 2007
- [c3]Li Kang, Xiaohu Tang, Xianhui Lu, Jia Fan:
A Tight Security Reduction Identity-Based Signature Scheme. CIS 2007: 730-734 - [c2]Mian Cai, Li Kang, Jia Jia:
A Multiple Grade Blind Proxy Signature Scheme. IIH-MSP 2007: 130-133 - 2006
- [c1]Jianqin Wang, Yong Xue, Yi Xie, Dingsheng Liu, Ruizhi Sun, Lu Yang, Ying Ding, Ya OuYang, Guangli Liu, YunLing Liu, Li Kang, Xinrong Cheng:
Study on Remotely Sensed Data Access and Integration Grid-enabled Middleware. GCC Workshops 2006: 477-481
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint