​
Login / Signup
Lili Tang
ORCID
Publication Activity (10 Years)
Years Active: 2008-2024
Publications (10 Years): 7
Top Topics
Learning Models
Fuzzy Inference
Nonsubsampled Contourlet Transform
Image Fusion
Top Venues
Soft Comput.
Remote. Sens.
Appl. Intell.
Multim. Tools Appl.
</>
Publications
</>
Xinjie Gu
,
Gang Liu
,
Xiangbo Zhang
,
Lili Tang
,
Xihong Zhou
,
Weifang Qiu
Infrared-Visible Synthetic Data from Game Engine for Image Fusion Improvement.
IEEE Trans. Games
16 (2) (2024)
Xiao Wang
,
Gang Liu
,
Lili Tang
,
Durga Prasad Bavirisetti
,
Gang Xiao
ICWGAN-GP: an image fusion method based on infrared compensator and wasserstein generative adversarial network with gradient penalty.
Appl. Intell.
53 (22) (2023)
Lili Tang
,
Jialiang Xie
,
Dongrui Wu
An interval type-2 fuzzy edge detection and matrix coding approach for color image adaptive steganography.
Multim. Tools Appl.
81 (27) (2022)
Yiqin Qiu
,
Hui Tian
,
Lili Tang
,
Wojciech Mazurczyk
,
Chin-Chen Chang
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
J. Inf. Secur. Appl.
68 (2022)
Yan Liu
,
Sha Zhang
,
Jiahua Zhang
,
Lili Tang
,
Yun Bai
Assessment and Comparison of Six Machine Learning Models in Estimating Evapotranspiration over Croplands Using Remote Sensing and Meteorological Factors.
Remote. Sens.
13 (19) (2021)
Lili Tang
,
Dongrui Wu
,
Honghui Wang
,
Mingzhi Chen
,
Jia-Liang Xie
An adaptive fuzzy inference approach for color image steganography.
Soft Comput.
25 (16) (2021)
Zhao Xu
,
Gang Liu
,
Gang Xiao
,
Lili Tang
,
Yanhui Li
JCa2Co: A joint cascade convolution coding network based on fuzzy regional characteristics for infrared and visible image fusion.
IET Comput. Vis.
15 (7) (2021)
Lili Tang
,
Deyong Hu
,
Xiaojuan Li
,
Jian Lian
Change detection of landslides and debris in south Taiwan after "Morakot" typhoon based on HJ-1-B Satellite images.
IGARSS
(2010)
Lili Tang
,
Shengjie Niu
,
Shuxian Fan
,
Xiaofeng Xu
,
Saihua Jin
,
Jie Xu
Observational study of content of Hg in fog water relative to air pollution in suburbs of Nanjing.
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
(2008)