Longlong Li
Orcid: 0000-0001-7390-3647
According to our database1,
Longlong Li
authored at least 44 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
SLBDetection-Net: Towards closed-set and open-set student learning behavior detection in smart classroom of K-12 education.
Expert Syst. Appl., 2025
2024
Sensors, April, 2024
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Multi-Scale Deformable Transformers for Student Learning Behavior Detection in Smart Classroom.
CoRR, 2024
Fine-grained method for determining size and velocity distribution patterns of flat-fan nozzle-atomised droplets based on phase doppler interferometer.
Comput. Electron. Agric., 2024
Comput. Electron. Agric., 2024
Proceedings of the 5th International Conference on Machine Learning and Computer Application, 2024
2023
Research on taper thread's compensation algorithm based on machine vision considering the inclined state effect and tooth profile distortion.
Multim. Tools Appl., December, 2023
Student Learning Behavior Recognition Incorporating Data Augmentation with Learning Feature Representation in Smart Classrooms.
Sensors, October, 2023
Design and experiment of a binocular vision-based canopy volume extraction system for precision pesticide application by UAVs.
Comput. Electron. Agric., October, 2023
Students' Classroom Behavior Detection System Incorporating Deformable DETR with Swin Transformer and Light-Weight Feature Pyramid Network.
Syst., July, 2023
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing.
Frontiers Inf. Technol. Electron. Eng., January, 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
Photovoltaic Panel Defect Detection Based on Ghost Convolution with BottleneckCSP and Tiny Target Prediction Head Incorporating YOLOv5.
CoRR, 2023
2022
Multim. Tools Appl., 2022
Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes.
J. Vis. Commun. Image Represent., 2022
A Support Vector Machine Based Prediction on Sensitivity to Coal Ash Blast for Different Degrees of Deterioration.
J. Sensors, 2022
A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain.
Entropy, 2022
Hierarchical Amplitude-Aware Permutation Entropy-Based Fault Feature Extraction Method for Rolling Bearings.
Entropy, 2022
Research on virtual Ackerman steering model based navigation system for tracked vehicles.
Comput. Electron. Agric., 2022
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
Evaluation of Deep Learning Segmentation Models for Detection of Pine Wilt Disease in Unmanned Aerial Vehicle Images.
Remote. Sens., 2021
Feasibility Analysis Model of Transformation from Real Economy to Virtual Economy Based on Association Rule Algorithm.
Mob. Inf. Syst., 2021
Effects of application height and crosswind on the crop spraying performance of unmanned helicopters.
Comput. Electron. Agric., 2021
Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021
2020
Signal Process. Image Commun., 2020
Secur. Commun. Networks, 2020
Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes.
Multim. Tools Appl., 2020
High-accuracy, high-resolution downwash flow field measurements of an unmanned helicopter for precision agriculture.
Comput. Electron. Agric., 2020
Numerical simulation of the downwash flow field and droplet movement from an unmanned helicopter for crop spraying.
Comput. Electron. Agric., 2020
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020
2019
A new spray deposition pattern measurement system based on spectral analysis of a fluorescent tracer.
Comput. Electron. Agric., 2019
Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem.
IEEE Access, 2019
Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption.
IEEE Access, 2019
2015
Leaf classification using multiple feature analysis based on semi-supervised clustering.
J. Intell. Fuzzy Syst., 2015
Proceedings of the Seventh International Conference on Digital Image Processing, 2015