His primary areas of investigation include Artificial intelligence, Computer vision, Pattern recognition, Computer network and Wireless sensor network. In the field of Artificial intelligence, his study on Image segmentation, Feature extraction and Support vector machine overlaps with subjects such as License. His study in Feature extraction is interdisciplinary in nature, drawing from both Denial-of-service attack, Data mining and Network security.
His work carried out in the field of Computer vision brings together such families of science as Discriminative model and Benchmark. The concepts of his Pattern recognition study are interwoven with issues in Wireless, Algorithm, Robustness and Character recognition. His Computer network research is multidisciplinary, incorporating perspectives in Computer security and Cloud computing security.
Artificial intelligence, Computer vision, Pattern recognition, Pixel and Feature extraction are his primary areas of study. His study in Machine learning extends to Artificial intelligence with its themes. His study in the field of Histogram, Edge detection, Feature detection and Image texture is also linked to topics like Spiral.
The study incorporates disciplines such as Contextual image classification, Robustness and Benchmark in addition to Pattern recognition. His Pixel research integrates issues from Image resolution and Object detection. His Feature study typically links adjacent topics like Data mining.
Xiangjian He mostly deals with Artificial intelligence, Pattern recognition, Benchmark, Deep learning and The Internet. His study in the field of Feature, Feature extraction and Image segmentation also crosses realms of Encoder. In his work, Channel is strongly intertwined with Image, which is a subfield of Feature extraction.
Xiangjian He works mostly in the field of Pattern recognition, limiting it down to topics relating to Pixel and, in certain cases, Noisy text and Convolution, as a part of the same area of interest. As part of one scientific family, he deals mainly with the area of Benchmark, narrowing it down to issues related to the Feature, and often Structure. His The Internet study also includes
Xiangjian He mainly investigates Artificial intelligence, Pattern recognition, Benchmark, Computer network and Authentication. In his study, he carries out multidisciplinary Artificial intelligence and Context research. Xiangjian He combines subjects such as Tracking, Convolution and Outlier with his study of Pattern recognition.
His Benchmark research is multidisciplinary, relying on both Image resolution, Feature, Pruning, Pixel and Eye tracking. He has researched Computer network in several fields, including Information privacy and Upload. His Authentication study integrates concerns from other disciplines, such as Quality of service, Multimedia, Wireless ad hoc network, Wireless sensor network and Node.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Deep Learning Techniques for Medical Image Segmentation: Achievements and Challenges
Mohammad Hesam Hesamian;Wenjing Jia;Xiangjian He;Paul J. Kennedy.
Journal of Digital Imaging (2019)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Mohammed A. Ambusaidi;Xiangjian He;Priyadarsi Nanda;Zhiyuan Tan.
IEEE Transactions on Computers (2016)
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
Zhiyuan Tan;Aruna Jamdagni;Xiangjian He;Priyadarsi Nanda.
IEEE Transactions on Parallel and Distributed Systems (2014)
Learning-Based License Plate Detection Using Global and Local Features
Huaifeng Zhang;Wenjing Jia;Xiangjian He;Qiang Wu.
international conference on pattern recognition (2006)
Region-based license plate detection
Wenjing Jia;Huaifeng Zhang;Xiangjian He.
Journal of Network and Computer Applications (2007)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Zhiyuan Tan;Aruna Jamdagni;Xiangjian He;Priyadarsi Nanda.
IEEE Transactions on Computers (2015)
PASCCC: Priority-based application-specific congestion control clustering protocol
Mian Ahmad Jan;Mian Ahmad Jan;Priyadarsi Nanda;Xiangjian He;Ren Ping Liu.
Computer Networks (2014)
A Sybil attack detection scheme for a forest wildfire monitoring application
Mian Ahmad Jan;Mian Ahmad Jan;Priyadarsi Nanda;Xiangjian He;Ren Ping Liu.
Future Generation Computer Systems (2018)
Mean shift for accurate license plate localization
Wenjing Jia;Huaifeng Zhang;Xiangjian He;M. Piccardi.
ieee intelligent transportation systems (2005)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Mian Ahmad Jan;Priyadarsi Nanda;Xiangjian He;Zhiyuan Tan.
trust security and privacy in computing and communications (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Technology Sydney
Florida State University
University of Technology Sydney
National Tsing Hua University
Hong Kong Polytechnic University
Swinburne University of Technology
Khalifa University
Chinese Academy of Sciences
Beijing University of Posts and Telecommunications
University of Technology Sydney
National Taiwan University
Kodak (France)
University of Utah
Xiamen University
Kasetsart University
Royal Children's Hospital
Memorial Sloan Kettering Cancer Center
Goddard Space Flight Center
Ames Research Center
University of Southern California
Scripps Research Institute
University of California, San Diego
Freie Universität Berlin
University of Cape Town
University of Wisconsin–Madison
University of Warwick