Minghui Li

Orcid: 0000-0002-1735-2024

According to our database1, Minghui Li authored at least 129 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cross-scale resolution consistent network for salient object detection.
IET Image Process., August, 2024

In-use calibration: improving domain-specific fine-grained few-shot recognition.
Neural Comput. Appl., May, 2024

Toward Human Chromosome Knowledge Engine.
Cybern. Syst., April, 2024

Deep single image deraining using an asymmetric cyclic generative and adversarial framework.
Appl. Intell., April, 2024

Robotic Intracellular Pressure Measurement Based on Improved Balance Pressure Model.
IEEE Trans. Instrum. Meas., 2024

Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Large language models leverage external knowledge to extend clinical insight beyond language boundaries.
J. Am. Medical Informatics Assoc., 2024

Streamlining social media information retrieval for public health research with deep learning.
J. Am. Medical Informatics Assoc., 2024

DAMFSD: A decentralized authorization model with flexible and secure delegation.
Internet Things, 2024

An enhanced governance measure for deep synthesis applications: Addressing the moderating effect of moral sensitivity through message framing.
Inf. Manag., 2024

Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need.
CoRR, 2024

A New Era of Indoor Scene Reconstruction: A Survey.
IEEE Access, 2024

Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Transferable Adversarial Facial Images for Privacy Protection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Single Image Dehazing via Multi-Scale Large Kernel Convolutional Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2024

Rain Streak Attention Network for Single Image Deraining.
Proceedings of the International Joint Conference on Neural Networks, 2024

DarkFed: A Data-Free Backdoor Attack in Federated Learning.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

MISA: Unveiling the Vulnerabilities in Split Federated Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024

PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Focus nuance and toward diversity: exploring domain-specific fine-grained few-shot recognition.
Neural Comput. Appl., October, 2023

Acoustic Lung Imaging Utilized in Continual Assessment of Patients with Obstructed Airway: A Systematic Review.
Sensors, July, 2023

Editorial: Protein recognition and associated diseases.
Frontiers Bioinform., May, 2023

A VVC Video Steganography Based on Coding Units in Chroma Components with a Deep Learning Network.
Symmetry, 2023

Robotic Intracellular Pressure Measurement Using Micropipette Electrode.
Sensors, 2023

Norms or fun? The influence of ethical concerns and perceived enjoyment on the regulation of deepfake information.
Internet Res., 2023

Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations.
CoRR, 2023

Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training.
CoRR, 2023

Streamlining Social Media Information Retrieval for Public Health Research with Deep Learning.
CoRR, 2023

Qualifying Chinese Medical Licensing Examination with Knowledge Enhanced Generative Pre-training Model.
CoRR, 2023

Locating Nidi for High-Frequency Chest Wall Oscillation Smart Therapy via Acoustic Imaging of Lung Airways as a Spatial Network.
IEEE Access, 2023

AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

A Four-Pronged Defense Against Byzantine Attacks in Federated Learning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Multi-Parameter Air Quality Monitoring System Research Based on Back Propagation Neural Network Algorithm.
Proceedings of the 2023 International Conference on Intelligent Sensing and Industrial Automation, 2023

Modeling and Simulation of Pulmonary Acoustic Signal and Imaging for Lung Function Assessment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Understanding Public Concerned Ethic Issues and Ethical Acceptance of AI Surveillance Technology: Analysis from Social Media Data.
Proceedings of the Electronics, Communications and Networks, 2023

Preserving Privacy of Input Features Across All Stages of Collaborative Learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

The Effect of Sensor Array Design on Acoustic Imaging for Enhancing HFCWO Therapy.
Proceedings of the 20th International Multi-Conference on Systems, Signals & Devices, 2023

2022
Robotic Patch Clamp Based on Noninvasive 3-D Cell Morphology Measurement for Higher Success Rate.
IEEE Trans. Instrum. Meas., 2022

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy.
IEEE Trans. Dependable Secur. Comput., 2022

SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2022

Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis.
Symmetry, 2022

A Covariance Matrix Reconstruction Approach for Single Snapshot Direction of Arrival Estimation.
Sensors, 2022

Online Sparse Reconstruction for Scanning Radar Using Beam-Updating q-SPICE.
IEEE Geosci. Remote. Sens. Lett., 2022

Network unknown-threat detection based on a generative adversarial network and evolutionary algorithm.
Int. J. Intell. Syst., 2022

New efficient time-stepping schemes for the anisotropic phase-field dendritic crystal growth model.
Comput. Math. Appl., 2022

What drives the ethical acceptance of deep synthesis applications? A fuzzy set qualitative comparative analysis.
Comput. Hum. Behav., 2022

Kinematics Analysis and Trajectory Planning of AUBO-I5 Robot.
Proceedings of the 4th International Conference on Robotics, 2022

Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Wilderness Mapping in Northeast China Based on Deep Learning.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

A Hybrid Approach of Wavelet-based Total Variation and Wiener Filter to Denoise Adventitious Lung Sound Signal for an Accurate Assessment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2022

Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks.
IEEE Trans. Ind. Informatics, 2021

Automatic Sea-Ice Classification of SAR Images Based on Spatial and Temporal Features Learning.
IEEE Trans. Geosci. Remote. Sens., 2021

Secure Prediction of Neural Network in the Cloud.
IEEE Netw., 2021

The Nonconvex Tensor Robust Principal Component Analysis Approximation Model via the Weighted ℓ <sub>p</sub>-Norm Regularization.
J. Sci. Comput., 2021

Research on 3D geological modeling method based on multiple constraints.
Earth Sci. Informatics, 2021

Development of a simple disposable laser-induced porous graphene flexible electrode for portable wireless intelligent votammetric nanosensing of salicylic acid in agro-products.
Comput. Electron. Agric., 2021

The bright and dark sides of green customer integration (GCI): evidence from Chinese manufacturers.
Bus. Process. Manag. J., 2021

Research on Supply Chain Network Resilience Considering the Exit and Reselection of Enterprises.
IEEE Access, 2021

Robotic Visual and Electrical-guided Whole-Cell Patch Clamp.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

An Attention-Based Approach to Rule Learning in Large Knowledge Graphs.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2021 International Workshops, 2021

2020
A Wideband Beamforming Antenna Array for 802.11ac and 4.9 GHz in Modern Transportation Market.
IEEE Trans. Veh. Technol., 2020

Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools.
IEEE/ACM Trans. Netw., 2020

Fault-tolerant quantum error correction code preparation in UBQC.
Quantum Inf. Process., 2020

PremPS: Predicting the impact of missense mutations on protein stability.
PLoS Comput. Biol., 2020

A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City.
IEEE Internet Things J., 2020

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
CoRR, 2020

Numerical simulation of dynamic seeding of mesenchymal stem cells in pore structure.
Comput. Math. Appl., 2020

Design and Characterization of T/R Module for Commercial Beamforming Applications.
IEEE Access, 2020

A Zero Placement Algorithm for Synthesis of Flat Top Beam Pattern With Low Sidelobe Level.
IEEE Access, 2020

Sensor Aided Beamforming in Vehicular Environment.
Proceedings of the 2020 International Conference on UK-China Emerging Technologies, 2020

ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

3D Point Cloud Labeling Tool for Driving Automatically.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2020

2019
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum.
IEEE Trans. Mob. Comput., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Inf. Forensics Secur., 2019

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019

Finding driver mutations in cancer: Elucidating the role of background mutational processes.
PLoS Comput. Biol., 2019

Communication-Aware Container Placement and Reassignment in Large-Scale Internet Data Centers.
IEEE J. Sel. Areas Commun., 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

A novel self-adaptive grid-partitioning noise optimization algorithm based on differential privacy.
Comput. Sci. Inf. Syst., 2019

Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures.
IEEE Commun. Mag., 2019

An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing.
IEEE Access, 2019

An Auxiliary Parking Method Based on Automotive Millimeter wave SAR.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Parking Space Information Monitoring by Millimeter Wave SAR Based on Unmanned Aerial Vehicle.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

2018
Outsourced Biometric Identification With Privacy.
IEEE Trans. Inf. Forensics Secur., 2018

PremPDI estimates and interprets the effects of missense mutations on protein-DNA interactions.
PLoS Comput. Biol., 2018

InstantCryptoGram: Secure Image Retrieval Service.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Index Shard Replication Strategies for Improving Resource Utilization in Large Scale Search Engines.
Proceedings of the 47th International Conference on Parallel Processing, 2018

A Residual Convolution Neural Network for Sea Ice Classification with Sentinel-1 SAR Imagery.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

2017
Exploring background mutational processes to decipher cancer genetic heterogeneity.
Nucleic Acids Res., 2017

A Communication-Aware Container Re-Distribution Approach for High Performance VNFs.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
MutaBind estimates and interprets the effects of sequence variants on protein-protein interactions.
Nucleic Acids Res., 2016

Privacy Preservation in Social Network against Public Neighborhood Attacks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
Predicting Binding Free Energy Change Caused by Point Mutations with Knowledge-Modified MM/PBSA Method.
PLoS Comput. Biol., 2015

Optimisation Design of Coupling Region Based on SOI Micro-Ring Resonator.
Micromachines, 2015

LARSEN-ELM: Selective ensemble of extreme learning machines using LARS for blended data.
Neurocomputing, 2015

A SLA-based scheduling approach for multi-tenant cloud simulation.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

Logic Gates Based on Circular DNA Strand Displacement and a Fluorescent Agent.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2015

A Half-Subtracter Calculation Model Based on Stand Displacement Technology.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2015

2014
Improving relation descriptor extraction with word embeddings and cluster features.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Multi-level knowledge representation and retrieval of complex product design based on BOM.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

2012
Ultrasound Nondestructive Evaluation (NDE) Imaging with Transducer Arrays and Adaptive Processing.
Sensors, 2012

AUV SLAM and Experiments Using a Mechanical Scanning Forward-Looking Sonar.
Sensors, 2012

2011
Design and Application of the PID Control System of IMC, .
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Analysis and Design of System for Multi-motor Synchronous Control.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Sentiment classification via l2-norm deep belief network.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

QoS-aware service composition in multi-network environment based on genetic algorithm.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

Partially Supervised Text Classification with Multi-Level Examples.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Accurate Angle-of-Arrival Measurement Using Particle Swarm Optimization.
Wirel. Sens. Netw., 2010

Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Study on the Influence of Non-electrical Parameters on Processing Quality of WEDM-HS and Improvement Measures.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

2009
Energy Efficient Information Processing in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

2008
Research of Multipole Permanent Magnet Synchronous Motor for Gearless Oilfield Mud Pump.
Proceedings of the PACIIA 2008, 2008

Angle-of-arrival estimation for localization and communication in wireless networks.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

2007
A Refined Genetic Algorithm for Accurate and Reliable DOA Estimation with a Sensor Array.
Wirel. Pers. Commun., 2007

The Effectiveness Study of Local Maximum Feature for Chinese Unknown Word Identification.
J. Chin. Lang. Comput., 2007

Protein-protein interaction site prediction based on conditional random fields.
Bioinform., 2007

Extracting domain-specific terms from unlabeled web documents by bootstrapping and term classifiers.
Proceedings of the IEEE International Conference on Systems, 2007

A Probabilistic Approach to Syntax-based Reordering for Statistical Machine Translation.
Proceedings of the ACL 2007, 2007

2006
Effect of example weights on prediction of protein-protein interactions.
Comput. Biol. Chem., 2006

2005
Null-steering beamspace transformation design for robust data reduction.
Proceedings of the 13th European Signal Processing Conference, 2005


  Loading...