default search action
Lihong Ma 0002
Person information
- affiliation: South China University of Technology, School of Electronic and Information Engineering, Guangzhou, China
Other persons with the same name
- Lihong Ma 0001 — University of Hagen, Faculty of Mathematics and Computer Science
- Lihong Ma 0003 — Hebei University of Science and Technology, School of Economics and Management, China
- Lihong Ma 0004 — Peking Union Medical College, Beijing, China (and 1 more)
- Lihong Ma 0005 — High School Attached to Zhejiang University, Hangzhou, China
- Lihong Ma 0006 — Hainan Power Grid Co., Ltd., Haikou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Tianming Xie, Jing Tian, Lihong Ma:
A vision-based hand hygiene monitoring approach using self-attention convolutional neural network. Biomed. Signal Process. Control. 76: 103651 (2022) - [j9]Hesen Feng, Lihong Ma, Jing Tian:
A Dynamic Convolution Kernel Generation Method Based on Regularized Pattern for Image Super-Resolution. Sensors 22(11): 4231 (2022) - [j8]Tianming Xie, Zhonghao Zhang, Jing Tian, Lihong Ma:
Focal DETR: Target-Aware Token Design for Transformer-Based Object Detection. Sensors 22(22): 8686 (2022) - [c22]Borun Lai, Lihong Ma, Jing Tian:
Gated Cross Word-Visual Attention-Driven Generative Adversarial Networks for Text-to-Image Synthesis. ACCV (7) 2022: 88-100 - 2021
- [c21]Yashi Su, Lihong Ma, Jing Tian:
Image Inpainting Using Edge Structure Aware Hierarchical Guidance. ICME 2021: 1-6 - 2020
- [c20]Longxi Li, Hesen Feng, Bing Zheng, Lihong Ma, Jing Tian:
DID: A Nested Dense in Dense Structure with Variable Local Dense Blocks for Super-Resolution Image Reconstruction. ICPR 2020: 2582-2589 - [c19]Xiaoping Huang, Lihong Ma, Jing Tian:
A Novel Weakly-Supervised Proposal Method Based on Vector Perceptron and Unbalanced Action-Background Self-supervised Boundary Inferring. TENCON 2020: 1221-1226
2010 – 2019
- 2019
- [j7]Lei Li, Mian Guo, Lihong Ma, Huiyun Mao, Quansheng Guan:
Online Workload Allocation via Fog-Fog-Cloud Cooperation to Reduce IoT Task Service Delay. Sensors 19(18): 3830 (2019) - 2018
- [j6]Lei Li, Min Feng, Lianwen Jin, Shenjin Chen, Lihong Ma, Jiakai Gao:
Domain Knowledge Embedding Regularization Neural Networks for Workload Prediction and Analysis in Cloud Computing. J. Inf. Technol. Res. 11(4): 137-154 (2018) - [c18]Lei Li, Lihong Ma, Jing Tian:
TDP: Temporal Dynamic Pooling - A New Method for Temporal Action Localization. SMC 2018: 2517-2522 - 2017
- [c17]Renlong Pan, Lihong Ma, Yupeng Zhan, Shaozhi Cai:
A Novel Orientation-Context Descriptor and Locality-Preserving Fisher Discrimination Dictionary Learning for Action Recognition. DICTA 2017: 1-8 - [c16]Shaozhi Cai, Lihong Ma, Fuping Zhong, Renlong Pan:
Tag propagation by using multi-view NMF consistent matrix for image annotation. ISPACS 2017: 519-524 - [c15]Yupeng Zhan, Lihong Ma, Chunling Yang:
Pseudo trajectories eliminating and pyramid clustering: Optimizing dense trajectories for action recognition. RCAR 2017: 62-67 - 2016
- [c14]Weisheng Liao, Yin Huang, Lihong Ma:
Best structure-recovering method with dictionary allocation and inconsistent HR-LR mapping. ICARCV 2016: 1-6 - 2013
- [c13]Jianhui Li, Lihong Ma, Xingjun Tan:
Latticed Corner Detector Driven by Best-Fit Differentials in Arbitrary Rational Directions. Asia International Conference on Modelling and Simulation 2013: 143-148 - 2012
- [c12]Chunyan Zeng, Lihong Ma, Ming-hui Du, Jing Tian:
Adaptive sparsity reconstruction method for ultrasonic images based on compressive sensing. ICARCV 2012: 1364-1368 - [c11]Xianming Lv, Lihong Ma, Jing Tian:
An Improved YASS Approach Using Irregular Host-Blocks and Modified Quantization Index Modulation. IIH-MSP 2012: 309-312 - [c10]Chunyan Zeng, Lihong Ma, Ming-hui Du, Jing Tian:
Regularized sequential selection and backtracking removal for CS atom matching. MMSP 2012: 209-214 - 2011
- [j5]Jing Tian, Lihong Ma, Weiyu Yu:
Ant colony optimization for wavelet-based image interpolation using a three-component exponential mixture model. Expert Syst. Appl. 38(10): 12514-12520 (2011) - [j4]Jing Tian, Weiyu Yu, Li Chen, Lihong Ma:
Image Edge Detection Using Variation-Adaptive Ant Colony Optimization. Trans. Comput. Collect. Intell. 5: 27-40 (2011) - [c9]Lihong Ma, Xingjun Tan, Jing Tian:
An iterative strategy to approach corners using a new saliency measurement. ICASSP 2011: 1021-1024 - 2010
- [j3]Jing Tian, Li Chen, Lihong Ma:
A wavelet-domain non-parametric statistical approach for image denoising. IEICE Electron. Express 7(18): 1409-1415 (2010) - [j2]Lihong Ma, Dong Yu, Gang Wei, Jing Tian, Hanqing Lu:
Adaptive Spread-Transform Dither Modulation Using a New Perceptual Model for Color Image Watermarking. IEICE Trans. Inf. Syst. 93-D(4): 843-857 (2010) - [j1]Jing Tian, Weiyu Yu, Lihong Ma:
AntShrink: Ant colony optimization for image shrinkage. Pattern Recognit. Lett. 31(13): 1751-1758 (2010) - [c8]ChunYi Lin, Lihong Ma, Jianyu Chen:
Semantic modeling for multi-level medical image semantics retrieval. IWACI 2010: 480-485
2000 – 2009
- 2008
- [c7]Yuan Yuan, Lihong Ma, Hanqing Lu:
Image Segmentation Based on Supernodes and Region Size Estimation. ACIVS 2008: 686-695 - [c6]Lihong Ma, Dong Yu, Hanqing Lu:
Adaptive Spread-Transform Dither Modulation for Color Image Watermarking. GLOBECOM 2008: 2164-2168 - [c5]Dong Yu, Lihong Ma, Guoxi Wang, Hanqing Lu:
Adaptive spread-transform dither modulation using an improved luminance-masked threshold. ICIP 2008: 449-452 - 2007
- [c4]Lihong Ma, Xiaoyan Liu, Hanqing Lu:
Differential energy modulation: Novel video labeling scheme for content fidelity and easy rate control. SMC 2007: 1135-1140 - 2006
- [c3]Decong Yu, Lihong Ma, Hanqing Lu, Zhiqing Chen:
Fusion Method of Fingerprint Quality Evaluation: From the Local Gabor Feature to the Global Spatial-Frequency Structures. ACIVS 2006: 776-785 - [c2]Lihong Ma, Shengmin Jiang, Yu Zhang, ChunYi Lin, Hanqing Lu:
Craniofacial Landmark Detection by Layered Diffusion and Dilated Skeleton Maps. ICARCV 2006: 1-5 - [c1]Lihong Ma, Guifeng Cheng, Zhijian Wu, Xiaoxi Luo, Hanqing Lu:
Phase-only transform based shaping for error concealment coding. MobiMedia 2006: 11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint