Skip to main content

Page of 165
and
  1. No Access

    Chapter and Conference Paper

    IPFR: Identity-Preserving Face Reenactment with Enhanced Domain Adversarial Training and Multi-level Identity Priors

    In the face reenactment task, identity preservation is challenging due to the leakage of driving identity and the complexity of source identity. In this paper, we propose an Identity-Preserving Face Reenactmen...

    Lei Zhu, Ge Li, Yuanqi Chen, Thomas H. Li in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Feature Selection for Malapposition Detection in Intravascular Ultrasound - A Comparative Study

    Coronary atherosclerosis is a leading cause of morbidity and mortality worldwide. It is often treated by placing stents in the coronary arteries. Inappropriately placed stents or malappositions can result in p...

    Satyananda Kashyap, Neerav Karani in Applications of Medical Artificial Intelli… (2024)

  3. No Access

    Chapter and Conference Paper

    Coarse-to-Fine Response Generation for Document Grounded Conversations

    Generating fluent and informative responses is crucial for dialogue systems. Most existing studies introduce documents as additional document to improve dialogue generation performance. However, understanding ...

    Huan Zhao, Shan Li, Bo Li, Xupeng Zha in PRICAI 2023: Trends in Artificial Intelligence (2024)

  4. No Access

    Chapter and Conference Paper

    A Review of Relationship Extraction Based on Deep Learning

    Relation extraction is a key task in natural language processing. In recent years, deep learning techniques have been widely applied in relation extraction tasks. This paper systematically reviews relation ext...

    Guolong Liao, **angyan Tang, Tian Li in Artificial Intelligence and Machine Learni… (2024)

  5. No Access

    Chapter and Conference Paper

    Design of High-Performance Broadband Power Amplifier Based on Normal Distribution Real Frequency Matching Method

    In order to improve the working bandwidth of the power amplifier and make it suitable for a variety of application scenarios, a real frequency matching method based on normal distribution generating weights is...

    Zhenbing Li, **angrui Wu, Junjie Huang, Shilin Jia in Computer Networks and IoT (2024)

  6. No Access

    Chapter and Conference Paper

    Exploring the Establishment and Implementation of a Teaching Evaluation System Based on Value-Added Assessment

    Value-added assessment (VAA) can effectively solve the existing problems of the excess of outcome-oriented evaluations and the lack of teaching evaluation feedback mechanisms in higher education, which plays a...

    Li Yang, Gang Chen, Jie Chang, **angzi Li in Computer Science and Educational Informati… (2024)

  7. No Access

    Chapter and Conference Paper

    Generalizable and Accurate 6D Object Pose Estimation Network

    6D object pose estimation is an important task in computer vision, and the task of estimating 6D object pose from a single RGB image is even more challenging. Many methods use deep learning to acquire 2D featu...

    Shouxu Fu, **aoning Li, **angdong Yu, Lu Cao in Pattern Recognition and Computer Vision (2024)

  8. No Access

    Chapter and Conference Paper

    Research on Construction of Student Academic Early Warning Model Based on Ensemble Learning

    The educational data mining technology could support teaching management and it has received more and more attention. This paper focuses on the prediction problem of student academic performance and constructs...

    **ao Li, Chen Li in Computer Science and Educational Informatization (2024)

  9. No Access

    Chapter and Conference Paper

    MLDF-Net: Metadata Based Multi-level Dynamic Fusion Network

    Computer-aided diagnosis has been widely used in the medical field, and one of the current research hotspots for aiding diagnosis is how to effectively fuse heterogeneous data such as image data and metadata. ...

    Feng Li, Enguang Zuo, Chen Chen, Cheng Chen in Pattern Recognition and Computer Vision (2024)

  10. No Access

    Chapter and Conference Paper

    MTMG: A Framework for Generating Adversarial Examples Targeting Multiple Learning-Based Malware Detection Systems

    As machine learning technology continues to advance rapidly, an increasing number of researchers are utilizing it in the field of malware detection. Despite the fact that learning-based malware detection syste...

    Lichen Jia, Yang Yang, Jiansong Li, Hao Ding in PRICAI 2023: Trends in Artificial Intellig… (2024)

  11. No Access

    Chapter and Conference Paper

    MS-UNet: Swin Transformer U-Net with Multi-scale Nested Decoder for Medical Image Segmentation with Small Training Data

    We propose a novel U-Net model named MS-UNet for the medical image segmentation task in this study. Instead of the single-layer U-Net decoder structure used in Swin-UNet and TransUnet, we specifically design a...

    Haoyuan Chen, Yufei Han, Yanyi Li, Pin Xu in Pattern Recognition and Computer Vision (2024)

  12. No Access

    Chapter and Conference Paper

    L2T-BEV: Local Lane Topology Prediction from Onboard Surround-View Cameras in Bird’s Eye View Perspective

    High definition maps (HDMaps) serve as the foundation for autonomous vehicles, encompassing various driving scenario elements, among which lane topology is critically important for vehicle perception and plann...

    Shanding Ye, Tao Li, Ruihang Li, Zhijie Pan in Pattern Recognition and Computer Vision (2024)

  13. No Access

    Chapter and Conference Paper

    Design of Push Algorithm for Individualized Course Content of College Public Art Education Online Education

    In order to improve the adaptability of online education personalized course push resources and user demand resources, and reduce the push time, a new push method is designed for online education personalized ...

    Fang Li, Jie Li in e-Learning, e-Education, and Online Training (2024)

  14. No Access

    Chapter and Conference Paper

    Construction and Evaluation of College Students’ Psychological Education Evaluation Model Based on Joint Neural Network

    The construction and evaluation of a college student psychological education evaluation model based on joint neural networks can provide personalized evaluations by analyzing the psychological characteristics ...

    **a Li, Li Qingfeng in Application of Big Data, Blockchain, and I… (2024)

  15. No Access

    Chapter and Conference Paper

    Application of Ant Colony Algorithm in Physical Education Teaching Evaluation

    Ant colony is a bionic algorithm, which is used the of finding the optimal solution in the process of solving. Ant is an example of this algorithm. It can find the in many cases. The main idea behind ant colon...

    Lei Li, Ji Lei, **a Li in Application of Big Data, Blockchain, and I… (2024)

  16. No Access

    Chapter and Conference Paper

    RICH: Robust Implicit Clothed Humans Reconstruction from Multi-scale Spatial Cues

    The pixel-aligned implicit functions (IFs) enable the reconstruction of 3D human with complete and detailed clothing from a single RGB image. To enhance robustness for poses, existing work introduce the parame...

    Yukang Lin, Ronghui Li, Kedi Lyu, Yachao Zhang in Pattern Recognition and Computer Vision (2024)

  17. No Access

    Chapter and Conference Paper

    Embedded Computing Course Design for Internet of Things and Smart Things Applications

    With the rapid advancement of IoT technology, IoT education has emerged as a new challenge in university education. A course named “Smart Hardware and Intelligent Systems” is designed to target for undergradua...

    Zhen Chen, Tian-**ao Lin, Yi-Song Zhang in Computer Science and Education. Teaching a… (2024)

  18. No Access

    Chapter and Conference Paper

    Optimization Scheduling Algorithm of Logistics Distribution Vehicles Based on Internet of Vehicles Platform

    In the phase of logistics distribution vehicle scheduling, the distribution time and travel distance of vehicles are relatively long due to the influence of the real-time change attribute characteristics of th...

    Zhuorong Li, Yongchang Yao, Haibo Zhang, Nan Li in Advanced Hybrid Information Processing (2024)

  19. No Access

    Chapter and Conference Paper

    Boundary Guided Feature Fusion Network for Camouflaged Object Detection

    Camouflaged object detection (COD) refers to the process of detecting and segmenting camouflaged objects in an environment using algorithmic techniques. The intrinsic similarity between foreground objects and ...

    Tianchi Qiu, **uhong Li, Kangwei Liu, Songlin Li in Pattern Recognition and Computer Vision (2024)

  20. No Access

    Chapter and Conference Paper

    Suzhou Garden Dynamic Image Design Based on Digital Media Programming and Sound Visualization

    As an outstanding representative of traditional Chinese garden art, Suzhou gardens are treasures of human culture. However, its interaction width and depth of dissemination in the international arena still nee...

    Muqing Liu, Zhuxuan Chen, Qingyi Li, **nlin Li in HCI International 2024 Posters (2024)

Page of 165