李岳,男,博士,現為南開大學軟體學院講師,
基本介紹
- 中文名:李岳
- 職業:南開大學軟體學院講師
- 性別: 男
- 學位: 博士
人物經歷
研究方向
主要貢獻
1.C.H. Wei, Y. Li, P.J. Huang*, C.Y. Gwo, and S.E. Harms “Estimation of breast density: An adaptive moment preserving method for segmentation of fibroglandular tissue in breast magnetic resonance images,” European Journal of Radiology. (SCI, 2010 IF= 2.941 3區) (accepted)
2.C. H. Wei, Y. Li, and C.~Y. Gwo, “The Use of Scale~Invariance Feature Transform Approach to Recognize and Retrieve Incomplete Shoeprints,” Journal of Forensic Sciences. (SCI, 2010 IF= 1.159 4區) (accepted)
3.P.J. Huang, C. H. Wei, and Y. Li, “Content~based mammogram retrieval: Extraction of BI~RADS features for breast tumors and calcifications,” The Breast Journal, 18(5). (SCI, 2010 IF= 1.425 3區) (accepted)
4.C. T. Li and Y. Li, “Color~Decoupled Photo Response Non~Uniformity for Digital Image Forensics,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 2, pp. 260~271, Feb 2012 (SCI 索引 2010 IF= 2.951 2區)
5. Y. Li and C. T Li, "Decomposed PRNU Library for Forensics on Photos", Digital Library System, PP 38~51, No 2, Issue 1, 2011. ISTP
6. Y. Li and Chia Hung Wei, "Digital Image Authentication: A Review", Digital Library System, PP 55~78, No 2, Issue 2, 2011.
7. Y. Li, " A Survey of Digital Forensic Techniques for Digital Libraries ", Digital Library System, PP 49~66, No 2, Issue 3, 2011.
8. C. H. Wei, Y. Li, and P.J. Huang, “Mammogram retrieval through lesion analysis and machine learning within BI~RADS standards,” Journal of Biomedical Informatics, vol. 44, no. 2, pp. 607~614. 2011. (SCI, 2010 IF= 1.719 4 區)
9. C. T Li and Y. Li, "Progressive Exponential Clustering~Based Steganography," EURASIP Journal of Advances in Signal Processing, vol. 2010, (SCI 索引 2010 IF=0.998 4區)
10. C. T. Li and Y. Li, "Medical Images Authentication through Repetitive Index Modulation Based on Watermarking," International Journal of Digital Crime and Forensics, vol. 1, no. 4, October 2009
11. C. H. Wei, Y. Li, W. Y. Chau, and C. T. Li, "Trademark Image Retrieval Using Synthetic Features for Describing Global Shape and Interior Structure," Pattern Recognition, vol. 42, no. 3, pp. 386~394, 2009 (SCI索引 IF=2.838 2區)
12. C. T. Li, Y. Li and C. H. Wei "Protection of Digital Mammograms on PACSs Using Data Hiding Techniques" International Journal of Digital Crime and Forensics, vol. 1, no. 1, pp. 75 ~ 88, January 2)
1.W. Wang, C. H. Wei, Y. Li, “A complex artificial immune system and its application on trademark recognition,” Proceedings of 2011 International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011). ongKong, 2011
2.Y. Li and C.T Li, "Optimized digital library for digital forenisc based on decomposed PRNU", 2011 International Conference on Multimedia Technology, ICMT 2011, p 610~613, 2011. (EI 索引, Hangzhou, 2011.
3.Y. Li, " A robust forensic method based on Scale~Invariance Feature Transform ", 2011 International Conference on Multimedia Technology, ICMT 2011, p 5246~5249, 2011. (EI 索引, )
4.Y. Li and C. H. Wei, "Hierarchical correlation for content~based image retrieval ", 2011 International Conference on Multimedia Technology, ICMT 2011, p 550~553, 2011. (EI 索引,)
5.Z.W. Li, C.H.Wei, Y. Li, T. Sun, “Research of shoeprint image stream retrieval algorithm with scale~invariance feature transform” 2011 International Conference on Multimedia Technology, ICMT 2011,
6.Yue Li and C. H. Wei, " Medical image retrieval: Multiple regression models for user's search target ", International Conference on Machine Learning and Cybernetics, v 4, p 1436~1443, 2011, Proceedings of 2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011, p 550~553, 2011. (EI 索引, ). Guilin, 2011
7.C. T. Li and Y. Li, "Digital Camera Identification Using Colour~Decoupled Photo Response Non~Uniformity," IEEE International Symposium on Circuits and Systems (ISCAS'10) , Paris, France, 30 May ~ 2 June 2010. pp. 3052~3055.
8.C T. Li, C.~Y. Chang and Y. Li, "On the Repudiability of Device Identification and Image Verification Using Sensor Pattern Noise," in Proc. International Conference on Information Security and Digital Forensics, London, UK, 7~8 September, 2009.
13.Y. Li and C. T. Li, "Steganographic scheme for VQ compressed images using progressive exponential clustering," in Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, Sydney, Australia, 22 ~ 24 November, 2006.