scispace - formally typeset
X

Xia Li

Researcher at Shenzhen University

Publications -  22
Citations -  342

Xia Li is an academic researcher from Shenzhen University. The author has contributed to research in topics: Convolutional neural network & Deep learning. The author has an hindex of 8, co-authored 22 publications receiving 236 citations. Previous affiliations of Xia Li include The Chinese University of Hong Kong.

Papers
More filters
Journal ArticleDOI

SCOM: Spatiotemporal Constrained Optimization for Salient Object Detection

TL;DR: A novel model for video salient object detection called spatiotemporal constrained optimization model (SCOM), which exploits spatial and temporal cues, as well as a local constraint, to achieve a global saliency optimization.
Journal ArticleDOI

Compression of Phase-Only Holograms with JPEG Standard and Deep Learning

TL;DR: Simulation and experimental results reveal that the proposed “JPEG + deep learning” hologram compression scheme can achieve satisfactory reconstruction results for a computer-generated phase-only hologram after compression.
Proceedings ArticleDOI

Multi-modal metric learning for vehicle re-identification in traffic surveillance environment

TL;DR: A multi-modal metric learning architecture to fuse deep features and hand-crafted ones in an end-to-end optimization network, which achieves a more robust and discriminative feature representation for vehicle re-identification.
Journal ArticleDOI

Is QR code an optimal data container in optical encryption systems from an error-correction coding perspective?

TL;DR: An alternative 2D barcode scheme based on Bose-Chaudhuri-Hocquenghem (BCH) coding is designed, which demonstrates substantially better average channel capacity than QR code in numerical simulated optical cryptosystems.
Journal ArticleDOI

Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation

TL;DR: A special ciphertext-only attack (COA) scenario to the traditional double random phase encoding (DRPE) technique is proposed based on plaintext shifting that reveals a severe security flaw of DRPE systems when minor position shifting of the plaintext occurs.