default search action
Chenghai Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Lai Wei, Zhiquan Tan, Chenghai Li, Jindong Wang, Weiran Huang:
Large Language Model Evaluation via Matrix Entropy. CoRR abs/2401.17139 (2024) - [i1]Zhiquan Tan, Chenghai Li, Weiran Huang:
The Information of Large Language Model Geometry. CoRR abs/2402.03471 (2024) - 2023
- [j17]Junfeng Sun, Chenghai Li, Yafei Song, Peng Ni, Jian Wang:
Network Security Situation Prediction Based on TCAN-BiGRU Optimized by SSA and IQPSO. Comput. Syst. Sci. Eng. 47(1): 993-1021 (2023) - 2022
- [j16]Zongwei Li, Jia Song, Kai Qiao, Chenghai Li, Yanhui Zhang, Zhenyu Li:
Research on efficient feature extraction: Improving YOLOv5 backbone for facial expression detection in live streaming scenes. Frontiers Comput. Neurosci. 16 (2022) - 2021
- [j15]Yanqiang Tang, Chenghai Li:
An Online Network Intrusion Detection Model Based on Improved Regularized Extreme Learning Machine. IEEE Access 9: 94826-94844 (2021) - [j14]Qiguang He, Zhijian Wang, Yang Wang, Zijun Wang, Chenghai Li, Raja Annapooranan, Jian Zeng, Renkun Chen, Shengqiang Cai:
Electrospun liquid crystal elastomer microfiber actuator. Sci. Robotics 6(57): 9704 (2021) - [j13]Jing Zhao, Xiaoqing Guan, Chenghai Li, Quansong Mou, Zhen Chen:
Comprehensive Evaluation of Inter-Turn Short Circuit Faults in PMSM Used for Electric Vehicles. IEEE Trans. Intell. Transp. Syst. 22(1): 611-621 (2021) - 2020
- [j12]Qingshuang Hu, Chenghai Li, Yanli Lu, Song Li:
A Novel Construction and Inference Methodology of Belief Rule Base. IEEE Access 8: 209738-209749 (2020) - [j11]Chenghai Li, Siyao Chen, Qi Wang, Hao Li, Shuai Xiao, Faqi Li:
Effects of Thermal Relaxation on Temperature Elevation in Ex Vivo Tissues During High Intensity Focused Ultrasound. IEEE Access 8: 212013-212021 (2020) - [c1]Qingshuang Hu, Yibiao Fang, Yimeng Li, Chenghai Li, Zilong Wang, Yanqiang Tang, Yu Yang:
Hierarchical Network Security Situation Prediction Based on Belief Rule Base. CCRIS 2020: 207-212
2010 – 2019
- 2019
- [j10]Fangzheng Zhao, Chenghai Li, Chen Liu:
A Hyper-Chaotic Color Image Encryption Algorithm and Security Analysis. J. Comput. 14(7): 496-506 (2019) - [j9]Fangzheng Zhao, Chenghai Li, Chen Liu, Yafei Song:
Color image encryption algorithm based on hyperchaotic and security analysis. J. Electronic Imaging 28(4): 043011 (2019) - [j8]Fangzheng Zhao, Chenghai Li, Chen Liu, Yafei Song:
超混沌彩色图像加密算法优化及安全性分析 (Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm). 计算机科学 46(11A): 483-487 (2019) - [j7]Chenghai Li, Fangzheng Zhao, Chen Liu, Lei Lei, Jie Zhang:
A Hyperchaotic Color Image Encryption Algorithm and Security Analysis. Secur. Commun. Networks 2019: 8132547:1-8132547:8 (2019) - [j6]Xiaoshi Fan, Chenghai Li, Yanan Wang:
Strict intuitionistic fuzzy entropy and application in network vulnerability evaluation. Soft Comput. 23(18): 8741-8752 (2019) - 2018
- [j5]Ruikang Xing, Chenghai Li, Xiaoshi Fan:
网电空间中基于IFTS预测模型的IDS方法 (Intrusion Detection Method Based on Intuitionistic Fuzzy Time Series Forecasting Model in Cyberspace). 计算机科学 45(11): 164-168 (2018) - [j4]Ruikang Xing, Chenghai Li:
基于直觉模糊集理论的IDS方法研究 (Research on Intrusion Detection System Method Based on Intuitionistic Fuzzy Sets). 计算机科学 45(11A): 344-348 (2018) - 2016
- [j3]Chen Liang, Chenghai Li:
一种新的半监督入侵检测方法 (Novel Intrusion Detection Method Based on Semi-supervised Clustering). 计算机科学 43(5): 87-90 (2016) - [j2]Pengxu Zhou, Chenghai Li:
一种高效多授权中心云访问控制方案 (High Efficiency Multi-authority Cloud Access Control Scheme). 计算机科学 43(9): 180-183 (2016) - 2014
- [j1]Biqing Huang, Chenghai Li, Fei Tao:
A chaos control optimal algorithm for QoS-based service composition selection in cloud manufacturing system. Enterp. Inf. Syst. 8(4): 445-463 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint