Остановите войну!
for scientists:
default search action
Li-Hua Li
Person information
- affiliation: Chaoyang Univesity of Technology, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Li-Hua Li, Radius Tanone:
Ensemble Learning based on CNN and Transformer Models for Leaf Diseases Classification. IMCOM 2024: 1-6 - 2023
- [j12]Wen-Chang Cheng, Hung-Chou Hsiao, Yung-Fa Huang, Li-Hua Li:
Combining Classifiers for Deep Learning Mask Face Recognition. Inf. 14(7): 421 (2023) - [j11]Li-Hua Li, Ramli Ahmad, Radius Tanone, Alok Kumar Sharma:
STB: synthetic minority oversampling technique for tree-boosting models for imbalanced datasets of intrusion detection systems. PeerJ Comput. Sci. 9: e1580 (2023) - [c21]Li-Hua Li, Radius Tanone:
Compact Convolutional Transformer based on Sharpness-Aware Minimization for Image Classification. iCAST 2023: 129-135 - [c20]Ramli Ahmad, Li-Hua Li, Alok Kumar Sharma, Radius Tanone:
Boundary-Seeking GAN Approach to Improve Classification of Intrusion Detection Systems Based on Machine Learning Model. IMCOM 2023: 1-5 - [c19]Li-Hua Li, Radius Tanone:
Disease Identification in Potato Leaves using Swin Transformer. IMCOM 2023: 1-5 - 2022
- [c18]Li-Hua Li, Radius Tanone:
MLP-Mixer Approach for Corn Leaf Diseases Classification. ACIIDS (2) 2022: 204-215 - [c17]Ramli Ahmad, Li-Hua Li, Alok Kumar Sharma:
An Improved Intrusion Detection Systems using BGAN. ICCE-TW 2022: 13-14 - [c16]Li-Hua Li, Ling-Qi Jiang, Yu-Fang Peng, Ye-Shan Liu, Kai-Lun Chung:
Combining Conditional Generative Adversarial Networks and YOLOv4 for Mango Classification. TAAI 2022: 54-59 - 2021
- [c15]Li-Hua Li, Ramli Ahmad, Wen-Chung Tsai, Alok Kumar Sharma:
A Feature Selection Based DNN for Intrusion Detection System. IMCOM 2021: 1-8 - [c14]Li-Hua Li, Chang-Yu Lai:
Comparing the Impact of Service Quality on Customers' Repurchase Intentions Based on Statistical Methods and Artificial Intelligence-Taking an Automotive Aftermarket (AM) Parts Sales Company as an Example. IMCOM 2021: 1-8
2010 – 2019
- 2019
- [c13]Fu-Hsiang Kuo, Li-Hua Li, Chang-Yu Lai, Yu-Sheng Chu:
Comparing the efficiency of innovative teaching through digital mobile e-learning based on a DEA meta-frontier model. IC4E 2019: 270-275 - [c12]Yi Chen Shiao, Goutam Chakraborty, Shin-Fu Chen, Li-Hua Li, Rung Ching Chen:
Modeling and Prediction of Time-Series-A Case Study with Forex Data. iCAST 2019: 1-5 - [c11]Li-Hua Li, Yu-Sheng Chu, Jui-Yuan Chu, Shian-Hau Guo:
A Machine Learning Approach for Detection Plant Disease: Taking Orchid as Example. ICVISP 2019: 43:1-43:6 - 2018
- [c10]Shin-Fu Chen, Goutam Chakraborty, Li-Hua Li:
Feature Selection on Credit Risk Prediction for Peer-to-Peer Lending. JSAI-isAI Workshops 2018: 5-18 - 2017
- [c9]Li-Hua Li, Fu-Ming Lee, Bo-Liang Chen, Shin-Fu Chen:
A simplified method for improving the performance of product recommendation with sparse data. iCAST 2017: 318-323 - [c8]Li-Hua Li, Chi-Tien Lin, Shin-Fu Chen:
Micro-lending Default Awareness Using Artificial Neural Network. ICMSSP 2017: 56-60 - 2011
- [c7]Li-Hua Li, Fu-Ming Lee, Tsung-Jen Pu, Chih-Wei Chen:
A Personalized Pair-Recommendation Approach Using Mobile Message Ontology. ICGEC 2011: 53-56 - 2010
- [c6]Li-Hua Li, Fu-Ming Lee, Yu-Chien Chou, Tsung-Jen Pu:
Using Ontology for Personalized Mobile Message Computation. AINA 2010: 1255-1262
2000 – 2009
- 2009
- [c5]Li-Hua Li, Fu-Ming Lee, Yu-Chun Chen, Chieh-Yu Cheng:
A multi-stage collaborative filtering approach for mobile recommendation. ICUIMC 2009: 88-97 - 2005
- [j10]Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:
Improvement of signature scheme based on factoring and discrete logarithms. Appl. Math. Comput. 161(1): 49-54 (2005) - [c4]Fu-Ming Lee, Li-Hua Li, Pao-Hsiao Chen:
A Study on Dynamic Bargaining Strategy under Time Constraints and with Incomplete Information. IAT 2005: 640-645 - 2004
- [j9]Min-Shiang Hwang, Li-Hua Li, Cheng-Chi Lee:
A key authentication scheme with non-repudiation. ACM SIGOPS Oper. Syst. Rev. 38(3): 75-78 (2004) - [j8]Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang:
Cryptanalysis of an efficient secure group signature scheme. ACM SIGOPS Oper. Syst. Rev. 38(4): 66-69 (2004) - [c3]Fu-Ming Lee, Li-Hua Li, Yao-Chang Liu:
Automated Negotiation in Multiple e-Marketplaces by Using Learning Personalized Mobile Shopping Agents. IC-AI 2004: 777-783 - [c2]Fu-Ming Lee, Li-Hua Li, Chi-Hsu Chen:
Discovering Inter-document Connectivity by Applying Topic Analysis Techniques. IKE 2004: 293-298 - 2003
- [j7]Cheng-Chi Lee, Min-Shiang Hwang, Li-Hua Li:
A new key authentication scheme based on discrete logarithms. Appl. Math. Comput. 139(2-3): 343-349 (2003) - [j6]Li-Hua Li, Shiang-Feng Tzeng, Min-Shiang Hwang:
Generalization of proxy signature-based on discrete logarithms. Comput. Secur. 22(3): 245-255 (2003) - [j5]Iuon-Chang Lin, Min-Shiang Hwang, Li-Hua Li:
A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19(1): 13-22 (2003) - 2002
- [j4]Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang:
A remote user authentication scheme using hash functions. ACM SIGOPS Oper. Syst. Rev. 36(4): 23-29 (2002) - 2001
- [j3]Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li:
A simple micro-payment scheme. J. Syst. Softw. 55(3): 221-229 (2001) - [j2]Li-Hua Li, Iuon-Chang Lin, Min-Shiang Hwang:
A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Networks 12(6): 1498-1504 (2001) - 2000
- [j1]Min-Shiang Hwang, Li-Hua Li:
A new remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46(1): 28-30 (2000)
1990 – 1999
- 1991
- [c1]Zhen-Ya He, Li-Hua Li:
High-resolution multipath time delay estimation using a neural network. ICASSP 1991: 1469-1472
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint