李岳(南開大學軟體學院講師)

李岳,男,博士,現為南開大學軟體學院講師,

基本介紹

  • 中文名:李岳
  • 職業:南開大學軟體學院講師
  • 性別: 男
  • 學位: 博士
人物經歷,研究方向,主要貢獻,

人物經歷

李岳
2003年本科畢業於:南開大學數學院,信息與計算專業 2005年碩士畢業於:英國諾丁漢大學,計算機與信息技術專業 2010年博士畢業於:英國華威大學,計算機系圖像處理專業 2010年3月至南開大學軟體學院參加工作至今。

研究方向

圖像特徵抽取及分析、基於圖像特徵的圖像檢索、醫療圖像分析以及圖像安全技術研究

主要貢獻

主持教育部央高校基本科研業務項目,《數字相片證據學分析的技術開發》,2010~2012
期刊文章(已投遞並被接受或已發表):
1.C.H. Wei, Y. Li, P.J. Huang*, C.Y. Gwo, and S.E. Harms “Estimation of breast density: An adaptive moment preserving method for segmentation of fibroglandular tissue in breast magnetic resonance images,” European Journal of Radiology. (SCI, 2010 IF= 2.941 3區) (accepted)
2.C. H. Wei, Y. Li, and C.~Y. Gwo, “The Use of Scale~Invariance Feature Transform Approach to Recognize and Retrieve Incomplete Shoeprints,” Journal of Forensic Sciences. (SCI, 2010 IF= 1.159 4區) (accepted)
3.P.J. Huang, C. H. Wei, and Y. Li, “Content~based mammogram retrieval: Extraction of BI~RADS features for breast tumors and calcifications,” The Breast Journal, 18(5). (SCI, 2010 IF= 1.425 3區) (accepted)
4.C. T. Li and Y. Li, “Color~Decoupled Photo Response Non~Uniformity for Digital Image Forensics,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 2, pp. 260~271, Feb 2012 (SCI 索引 2010 IF= 2.951 2區)
5. Y. Li and C. T Li, "Decomposed PRNU Library for Forensics on Photos", Digital Library System, PP 38~51, No 2, Issue 1, 2011. ISTP
6. Y. Li and Chia Hung Wei, "Digital Image Authentication: A Review", Digital Library System, PP 55~78, No 2, Issue 2, 2011.
7. Y. Li, " A Survey of Digital Forensic Techniques for Digital Libraries ", Digital Library System, PP 49~66, No 2, Issue 3, 2011.
8. C. H. Wei, Y. Li, and P.J. Huang, “Mammogram retrieval through lesion analysis and machine learning within BI~RADS standards,” Journal of Biomedical Informatics, vol. 44, no. 2, pp. 607~614. 2011. (SCI, 2010 IF= 1.719 4 區)
9. C. T Li and Y. Li, "Progressive Exponential Clustering~Based Steganography," EURASIP Journal of Advances in Signal Processing, vol. 2010, (SCI 索引 2010 IF=0.998 4區)
10. C. T. Li and Y. Li, "Medical Images Authentication through Repetitive Index Modulation Based on Watermarking," International Journal of Digital Crime and Forensics, vol. 1, no. 4, October 2009
11. C. H. Wei, Y. Li, W. Y. Chau, and C. T. Li, "Trademark Image Retrieval Using Synthetic Features for Describing Global Shape and Interior Structure," Pattern Recognition, vol. 42, no. 3, pp. 386~394, 2009 (SCI索引 IF=2.838 2區)
12. C. T. Li, Y. Li and C. H. Wei "Protection of Digital Mammograms on PACSs Using Data Hiding Techniques" International Journal of Digital Crime and Forensics, vol. 1, no. 1, pp. 75 ~ 88, January 2)

1.W. Wang, C. H. Wei, Y. Li, “A complex artificial immune system and its application on trademark recognition,” Proceedings of 2011 International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011). ongKong, 2011
2.Y. Li and C.T Li, "Optimized digital library for digital forenisc based on decomposed PRNU", 2011 International Conference on Multimedia Technology, ICMT 2011, p 610~613, 2011. (EI 索引, Hangzhou, 2011.
3.Y. Li, " A robust forensic method based on Scale~Invariance Feature Transform ", 2011 International Conference on Multimedia Technology, ICMT 2011, p 5246~5249, 2011. (EI 索引, )
4.Y. Li and C. H. Wei, "Hierarchical correlation for content~based image retrieval ", 2011 International Conference on Multimedia Technology, ICMT 2011, p 550~553, 2011. (EI 索引,)
5.Z.W. Li, C.H.Wei, Y. Li, T. Sun, “Research of shoeprint image stream retrieval algorithm with scale~invariance feature transform” 2011 International Conference on Multimedia Technology, ICMT 2011,
6.Yue Li and C. H. Wei, " Medical image retrieval: Multiple regression models for user's search target ", International Conference on Machine Learning and Cybernetics, v 4, p 1436~1443, 2011, Proceedings of 2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011, p 550~553, 2011. (EI 索引, ). Guilin, 2011
7.C. T. Li and Y. Li, "Digital Camera Identification Using Colour~Decoupled Photo Response Non~Uniformity," IEEE International Symposium on Circuits and Systems (ISCAS'10) , Paris, France, 30 May ~ 2 June 2010. pp. 3052~3055.
8.C T. Li, C.~Y. Chang and Y. Li, "On the Repudiability of Device Identification and Image Verification Using Sensor Pattern Noise," in Proc. International Conference on Information Security and Digital Forensics, London, UK, 7~8 September, 2009.
9.C. T. Li and Y. Li, "Authenticating Medical Images through Repetitive Index Modulation Based Watermarking," in Proc. International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e~Forenensics 09), Adelaide, Australia, 19 ~ 21 January, 2009.
10.C. T. Li and Y. Li, "Random Index Modulation based Fragile Watermarking Scheme for Authenticating Colour Images," in Proc. Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP~2008), Harbin, China, 15~17 August, 2008.
11.C. H. Wei, Y. Li and C. T. Li, "Effective Extraction of Gabor Features for Adaptive Mammogram Retrieval," in Proc. IEEE International Conference on Multimedia and Expo, Beijin, China, 2 ~ 5 July, 2007.
12.C. T. Li and Y. Li, "Steganographic Method for Colour Image Using Expandable Progressive Exponential Clustering," in Proc. Inaugural IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Australia, 21 ~ 23 February, 2007.
13.Y. Li and C. T. Li, "Steganographic scheme for VQ compressed images using progressive exponential clustering," in Proc. IEEE International Conference on Advanced Video and Signal based Surveillance, Sydney, Australia, 22 ~ 24 November, 2006.

相關詞條

熱門詞條

聯絡我們