Skip to main content

Page of 18
and
  1. No Access

    Chapter and Conference Paper

    Facial Action Units Intensity Estimation via Graph Relation Network

    Facial action units (AUs) intensity estimation is a fundamental task for facial expression analysis, emotion recognition and affective computing. Since AUs commonly appear in specific combinations and are high...

    Ce Wang, Fei Jiang, Ruimin Shen in Neural Information Processing (2020)

  2. No Access

    Chapter and Conference Paper

    Assessment and Application Research on the Carrying Capacity of Township Power Supply Station Based on Big Data Analysis

    At present, the grid division of township power supply stations lacks guiding opinions, the grid division principle of each unit is not unified, and the assessment of the carrying capacity of each station has ...

    Pan Weiwei, Shen Guang, Wu Yuebo in Intelligent Computing Theories and Applica… (2020)

  3. No Access

    Chapter and Conference Paper

    U-Net Neural Network Optimization Method Based on Deconvolution Algorithm

    U-net deep neural network has shown good performances in medical image segmentation analysis. Most of the existing works are a single use of upsampling algorithm or deconvolution algorithm in the expansion pat...

    Shen Li, Junhai Xu, Renhai Chen in Neural Information Processing (2020)

  4. No Access

    Chapter and Conference Paper

    CycleGAN-Based Image Translation for Near-Infrared Camera-Trap Image Recognition

    Due to its invisibility, NIR (Near-infrared) flash has been widely used to capture the images of wild animals in the night. Although the animals can be captured without notice, the gray NIR images are short of...

    Renwu Gao, Siting Zheng, Jia He, Linlin Shen in Pattern Recognition and Artificial Intelli… (2020)

  5. No Access

    Chapter and Conference Paper

    A Survey on Side-Channel Attacks of Strong PUF

    With the application domain extension and the in-depth research on physical unclonable function, the security of PUF has attracted more and more attention. Various attack methods have been emerged, among which...

    Yan Li, Jian**g Shen, Wei Liu, Wei Zou in Artificial Intelligence and Security (2020)

  6. No Access

    Chapter and Conference Paper

    A Mixed Mutual Authentication Scheme Supporting Fault-Detection in Industrial Internet of Things

    In the Industry Internet of Thing (IIoT), industrial robots and employees play very important roles in manufacturing process. However, a secure and efficient authentication scheme for industrial robot and empl...

    Gongxin Shen in Artificial Intelligence and Security (2020)

  7. No Access

    Chapter and Conference Paper

    A New Method Combining DNA Shape Features to Improve the Prediction Accuracy of Transcription Factor Binding Sites

    Identifying transcription factor (TF) binding sites (TFBSs) has play an important role in the computational inference of gene regulation. With the development of high-throughput technologies, there have been m...

    Siguo Wang, Zhen Shen, Ying He, Qinhu Zhang in Intelligent Computing Theories and Applica… (2020)

  8. No Access

    Chapter and Conference Paper

    The Study on How Influencer Marketing Can Motivate Consumer Through Interaction-Based Mobile Communication

    Compared to traditional sales model, influencer marketing motivates consumers in a totally different way in this era of mobile phone. This type of marketing uses various phenomenons hot online, such as a delic...

    Kai-Shuan Shen in HCI International 2020 – Late Breaking Pap… (2020)

  9. No Access

    Chapter and Conference Paper

    Two-Stage Learning Brain Storm Optimizer

    Brain storm optimizer (BSO), a new swarm intelligence paradigm inspired from the human brainstorming process, have received a surge of attentions. However, the original BSO easily suffers from the premature co...

    Yan Xu, **gwei Wang, Lianbo Ma in Intelligent Computing Theories and Applica… (2020)

  10. No Access

    Chapter and Conference Paper

    UAS Traffic Management in Low-Altitude Airspace Based on Three Dimensional Digital Aerial Corridor System

    With the rapid development of the unmanned aerial system, the flight environment in low-altitude airspace is becoming more and more complex, which causes some potential security risks. A variety of air traffic...

    Dengchao Feng, Pengfei Du, Huiya Shen, Zhenmin Liu in Urban Intelligence and Applications (2020)

  11. No Access

    Chapter and Conference Paper

    Automated Pancreas Segmentation Using Multi-institutional Collaborative Deep Learning

    The performance of deep learning based methods strongly relies on the number of datasets used for training. Many efforts have been made to increase the data in the medical image analysis field. However, unlike...

    Pochuan Wang, Chen Shen, Holger R. Roth in Domain Adaptation and Representation Trans… (2020)

  12. No Access

    Chapter and Conference Paper

    Prediction Analysis of Soluble Solids Content in Apples Based on Wavelet Packet Analysis and BP Neural Network

    Considering Fuji apple, the relationship between the near infrared spectrum and the soluble solids content (SSC), which is one of the important indexes to measure the internal quality of apple, is studied in t...

    **ngwei Yan, Shuhui Bi, Tao Shen, Liyao Ma in Multimedia Technology and Enhanced Learning (2020)

  13. No Access

    Chapter and Conference Paper

    Detection of High-Risk Depression Groups Based on Eye-Tracking Data

    Depression is the most common psychiatric disorder in the general population. An effective treatment of depression requires early detection. In reschedule this paper, a novel algorithm is presented based on ey...

    Simeng Lu, Shen Huang, Yun Zhang, **ujuan Zheng in Pattern Recognition and Computer Vision (2020)

  14. No Access

    Chapter and Conference Paper

    A Robust Automatic Method for Removing Projective Distortion of Photovoltaic Modules from Close Shot Images

    Partial shading and hot spots may cause power loss and sometimes irreversible damage of photovoltaic (PV) modules. In order to evaluate the power generation of PV modules, it is necessary to calculate the area...

    Yu Shen, **nyi Chen, **xia Zhang, in Pattern Recognition and Computer Vision (2020)

  15. No Access

    Chapter and Conference Paper

    Hybrid Labels for Brain Tumor Segmentation

    The accurate automatic segmentation of brain tumors enhances the probability of survival rate. Convolutional Neural Network (CNN) is a popular automatic approach for image evaluations. CNN provides excellent r...

    Parvez Ahmad, Saqib Qamar in Brainlesion: Glioma, Multiple Sclerosis, S… (2020)

  16. No Access

    Chapter and Conference Paper

    Wind Turbine Clutter Mitigation for Weather Radar by Extreme Learning Machine (ELM) Method

    Because of its overall performance, the Extreme Learning Machine (ELM) has been very concerned. This paper introduces the ELM algorithm into the clutter mitigation for weather radar, and proposes a wind turbi...

    Mingwei Shen, Xu Yao, Di Wu, Daiyin Zhu in Multimedia Technology and Enhanced Learning (2020)

  17. No Access

    Chapter and Conference Paper

    cuRadiomics: A GPU-Based Radiomics Feature Extraction Toolkit

    Radiomics is widely-used in imaging based clinical studies as a way of extracting high-throughput image descriptors. However, current tools for extracting radiomics features are generally run on CPU only, whic...

    Yining Jiao, Oihane Mayo Ijurra, Lichi Zhang in Radiomics and Radiogenomics in Neuro-oncol… (2020)

  18. No Access

    Chapter and Conference Paper

    Improving Accuracy of Mobile Robot Localization by Tightly Fusing LiDAR and DR data

    In this paper, a tightly-coupled light detection and ranging (LiDAR)/dead reckoning (DR) navigation system with uncertain sampling time is designed for mobile robot localization. The Kalman filter (KF) is used...

    Yuan Xu, Yuriy S. Shmaliy, Tao Shen in Multimedia Technology and Enhanced Learning (2020)

  19. No Access

    Chapter and Conference Paper

    Multi-model Network for Fine-Grained Cross-Media Retrieval

    With the development of Internet, the forms of web data are rapidly increasing. However, existing cross-media retrieval methods mainly focus on coarse-grained, which is far from being satisfied in practical ap...

    Jiemi Bai, Yazhou Yao, Qiong Wang, Yichao Zhou in Pattern Recognition and Computer Vision (2020)

  20. No Access

    Chapter and Conference Paper

    Research on the Optimization of Mobile Work Terminal Positioning Function Based on LBS

    In view of the weak support of GPS positioning function of mobile terminal, this paper uses in-depth research and analysis, using Unicom network auxiliary positioning service, according to the security contro...

    Pan Weiwei, Shen Guang, Wu Yuebo in Intelligent Computing Theories and Applica… (2020)

Page of 18