


default search action
Hongjie He
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Hongjie He 0001
— Tsinghua University, Beijing, China - Hongjie He 0002
— Xidian University, Xi'an, China - Hongjie He 0003
— University of Waterloo, Waterloo, Ontario, Canada - Hongjie He 0005
— Southwest Jiaotong University, Chengdu, Sichuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j11]Muqadar Ali, Hongjie He, Abid Hussain, Mao Niaxiong, Mehboob Hussain:
Towards verifiable updatable attribute-based Boolean keywords search sharing of PHRs in cloud environment. Clust. Comput. 28(13): 856 (2025)
[j10]Hongjie He, Tianwen Hu, Sheng Xu, Hong Xu, Lin Song, Zhongpei Sun:
PPDM-YOLO: A Lightweight Algorithm for SAR Ship Image Target Detection in Complex Environments. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 18: 22690-22705 (2025)
[c10]Yaolin Yang, Hongjie He:
Reversible Data Hiding in Encrypted Images Based on Variational Lossless Compression and Dual Encryption. ICASSP 2025: 1-5
[i1]Hongjie He, Xu Pan, Yudong Yao:
CF-CAM: Cluster Filter Class Activation Mapping for Reliable Gradient-Based Interpretability. CoRR abs/2504.00060 (2025)- 2024
[j9]Xiaotao Huang, Xingbin Chen, Ning Zhang, Hongjie He, Sang Feng
:
ADM-SLAM: Accurate and Fast Dynamic Visual SLAM with Adaptive Feature Point Extraction, Deeplabv3pro, and Multi-View Geometry. Sensors 24(11): 3578 (2024)
[c9]Yuwei Cai
, Hongjie He, Zhimeng He:
Loss Functions Analysis of Performance Improvements in Single-Image Super-Resolution. IGARSS 2024: 3138-3141
[c8]Zhimeng He, Yuwei Cai
, Hongjie He, Xinyan Xian, Brian Barrett:
An Enhanced Trans-Involution Network for Building Footprint Extraction from High Resolution Orthoimagery. IGARSS 2024: 10030-10034- 2022
[c7]Hongjie He, Bin Xia, Yinghong Guo, Manlin Wang:
Design and Analysis of Probabilistic Shaping for Polar Coded Communication Systems with Finite Blocklength. VTC Fall 2022: 1-6- 2020
[j8]Omer Hemida
, Hongjie He:
A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multim. Tools Appl. 79(25-26): 18695-18725 (2020)
[j7]Fares Khelaifi, Hongjie He:
Perceptual image hashing based on structural fractal features of image coding and ring partition. Multim. Tools Appl. 79(27-28): 19025-19044 (2020)
2010 – 2019
- 2016
[j6]Run-Wen Xu, Li-Xin Guo, Hongjie He, Wei Liu:
A Hybrid FEM/MoM Technique for 3-D Electromagnetic Scattering From a Dielectric Object Above a Conductive Rough Surface. IEEE Geosci. Remote. Sens. Lett. 13(3): 314-318 (2016)
[j5]Xiaoyan Li
, Hongjie He, Ruxin Wang, Jun Cheng:
Superpixel-guided nonlocal means for image denoising and super-resolution. Signal Process. 124: 173-183 (2016)
[c6]Hongjie He, Baolong Guo, Yunyi Yan
:
Area Estimation for Triple Modular Redundancy Field Programmable Gate Arrays. ECC 2016: 249-256- 2015
[j4]Xiaoyan Li
, Hongjie He, Ruxin Wang, Dacheng Tao
:
Single Image Superresolution via Directional Group Sparsity and Directional Features. IEEE Trans. Image Process. 24(9): 2874-2888 (2015)
[c5]Guochang Zhou, Baolong Guo, Xiang Gao, Jing Ma, Hongjie He, Yunyi Yan
:
A FPGA Power Estimation Method Based on an Improved BP Neural Network. IIH-MSP 2015: 251-254- 2012
[j3]Hongjie He, Jiashu Zhang:
Cryptanalysis on majority-voting based self-recovery watermarking scheme. Telecommun. Syst. 49(2): 231-238 (2012)- 2011
[j2]Hongjie He, Jiashu Zhang, Heng-Ming Tai
:
A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. Multim. Tools Appl. 52(2-3): 307-324 (2011)
2000 – 2009
- 2009
[c4]Hongjie He, Jiashu Zhang, Heng-Ming Tai
:
Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. Information Hiding 2009: 132-145- 2008
[c3]Hongjie He, Jiashu Zhang, Heng-Ming Tai:
Block-Chain Based Fragile Watermarking Scheme with Superior Localization. Information Hiding 2008: 147-160- 2007
[j1]Miao Yu, Hongjie He, Jiashu Zhang:
A digital authentication watermarking scheme for JPEG images with superior localization and security. Sci. China Ser. F Inf. Sci. 50(3): 491-509 (2007)- 2006
[c2]Ling Xie, Jiashu Zhang, Hongjie He:
NDFT-based Audio Watermarking Scheme with High Security. ICPR (4) 2006: 270-273
[c1]Hongjie He, Jiashu Zhang, Heng-Ming Tai:
A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. IWDW 2006: 422-432
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-28 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







