Can He
Orcid: 0000-0002-7462-8402
According to our database1,
Can He
authored at least 30 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Robotica, 2024
Enhancing fusarium head blight detection in wheat crops using hyperspectral indices and machine learning classifiers.
Comput. Electron. Agric., 2024
2023
A framework combined stacking ensemble algorithm to classify crop in complex agricultural landscape of high altitude regions with Gaofen-6 imagery and elevation data.
Int. J. Appl. Earth Obs. Geoinformation, August, 2023
Evaluation of Three Land Surface Temperature Products From Landsat Series Using in Situ Measurements.
IEEE Trans. Geosci. Remote. Sens., 2023
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023
CoRR, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Evaluation of Diverse Convolutional Neural Networks and Training Strategies for Wheat Leaf Disease Identification with Field-Acquired Photographs.
Remote. Sens., 2022
Comput. Secur., 2022
Reliability assessment of a multi-state distribution network under cost and spoilage considerations.
Ann. Oper. Res., 2022
2021
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems.
Peer-to-Peer Netw. Appl., 2021
J. Inf. Secur. Appl., 2021
SocialGuard: An adversarial example based privacy-preserving technique for social images.
J. Inf. Secur. Appl., 2021
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 32nd IEEE International Conference on Application-specific Systems, 2021
2020
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020
DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations.
CoRR, 2020
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system.
Comput. Secur., 2020
Complex., 2020
Capacity Reliability Calculation and Sensitivity Analysis for a Stochastic Transport Network.
IEEE Access, 2020
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
2017
A Particle Swarm Optimization Technique-Based Parametric Wavelet Thresholding Function for Signal Denoising.
Circuits Syst. Signal Process., 2017
Proceedings of the Machine Learning and Intelligent Communications, 2017
2015
A New Image Decomposition and Reconstruction Approach - Adaptive Fourier Decomposition.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015
2013
A Combined Optimal Sensor Placement Strategy for the Structural Health Monitoring of Bridge Structures.
Int. J. Distributed Sens. Networks, 2013