Skip to main content

previous disabled Page of 624
and
  1. No Access

    Chapter and Conference Paper

    A Robust Detection and Correction Framework for GNN-Based Vertical Federated Learning

    Graph Neural Network based Vertical Federated Learning (GVFL) facilitates data collaboration while preserving data privacy by learning GNN-based node representations from participants holding different dimensi...

    Zhicheng Yang, **aoliang Fan, Zheng Wang in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Arbitrary Reduction of MRI Inter-slice Spacing Using Hierarchical Feature Conditional Diffusion

    Magnetic resonance (MR) images collected in 2D scanning protocols typically have large inter-slice spacing, resulting in high in-plane resolution but reduced through-plane resolution. Super-resolution techniqu...

    **n Wang, Zhenrong Shen, Zhiyun Song, Sheng Wang in Machine Learning in Medical Imaging (2024)

  3. No Access

    Chapter and Conference Paper

    Weakly Supervised Method for Domain Adaptation in Instance Segmentation

    The domain adaptation of an instance segmentation model has gained much attention. However, manual annotation is tedious and self-training contains too much pseudolabel noise. Inspired by weakly supervised met...

    Jie Sun, Yan Tian, Jialei Wang, Zhaocheng Xu, Hao Wang in Advances in Computer Graphics (2024)

  4. No Access

    Chapter and Conference Paper

    Triplet Learning for Chest X-Ray Image Search in Automated COVID-19 Analysis

    Chest radiology images such as CT scans and X-ray images have been extensively employed in computer-assisted analysis of COVID-19, utilizing various learning-based techniques. As a trending topic, image retrie...

    Linmin Wang, Qianqian Wang, **aochuan Wang in Machine Learning in Medical Imaging (2024)

  5. No Access

    Chapter and Conference Paper

    Trend and Methods of IoT Sequential Data Outlier Detection

    In recent years, the state has made great efforts to develop the transportation industry. With the continuous expansion of the transportation network and the large-scale increase of vehicles, traffic congestio...

    Yinuo Wang, Tao Shen, Siying Qu in Multimedia Technology and Enhanced Learning (2024)

  6. No Access

    Chapter and Conference Paper

    Zero-Shot Medical Information Retrieval via Knowledge Graph Embedding

    In the era of the Internet of Things (IoT), the retrieval of relevant medical information has become essential for efficient clinical decision-making. This paper introduces MedFusionRank, a novel approach to z...

    Yuqi Wang, Zeqiang Wang, Wei Wang, Qi Chen in Internet of Things of Big Data for Healthc… (2024)

  7. No Access

    Chapter and Conference Paper

    Dual-Stream Context-Aware Neural Network for Survival Prediction from Whole Slide Images

    Whole slide images (WSI) encompass a wealth of information about the tumor micro-environment, which holds prognostic value for patients’ survival. While significant progress has been made in predicting patient...

    Junxiu Gao, Shan **, Ranran Wang, Mingkang Wang in Pattern Recognition and Computer Vision (2024)

  8. No Access

    Chapter and Conference Paper

    Classification Method for Ship-Radiated Noise Based on Joint Feature Extraction

    In order to address the problem of poor recognition performance from single signal features in ship identification and to enhance the accuracy of Convolutional Neural Networks (CNNs) in underwater acoustic tar...

    Libin Du, Mingyang Liu, Zhichao Lv in Intelligent Computers, Algorithms, and App… (2024)

  9. No Access

    Chapter and Conference Paper

    Task Offloading Method for Industrial Internet of Things (IIoT) Targeting Computational Resource Management

    In the context of industrial scenarios, devices exhibit specificity and task arrival rates vary over time. Considering real-world task queuing issues and incorporating edge computing offloading and D2D offload...

    Wenhui Wang, Xuanzhe Wang, Zhenjiang Zhang in Smart Grid and Internet of Things (2024)

  10. No Access

    Chapter and Conference Paper

    Large Language Model for Geometric Algebra: A Preliminary Attempt

    Geometric algebra serves as the unified language of mathematics, physics, and engineering in the 21st century. Coinciding with the era of artificial intelligence, the utilization of a Large Language Model (LLM...

    Jian Wang, Ziqiang Wang, Han Wang, Wen Luo, Linwang Yuan in Advances in Computer Graphics (2024)

  11. No Access

    Chapter and Conference Paper

    User-Aware Prefix-Tuning Is a Good Learner for Personalized Image Captioning

    Image captioning bridges the gap between vision and language by automatically generating natural language descriptions for images. Traditional image captioning methods often overlook the preferences and charac...

    Xuan Wang, Guanhong Wang, Wenhao Chai in Pattern Recognition and Computer Vision (2024)

  12. No Access

    Chapter and Conference Paper

    Cross-channel Image Steganography Based on Generative Adversarial Network

    Traditional steganographic algorithms often suffer from issues such as low visual quality and limited resilience against steganalysis at high-capacity data embedding. To address these limitations, this paper p...

    Bin Ma, Haocheng Wang, Yong** **an, Chunpeng Wang in Digital Forensics and Watermarking (2024)

  13. No Access

    Chapter and Conference Paper

    Decoupled Contrastive Learning for Long-Tailed Distribution

    Self-supervised contrastive learning is popularly used to obtain powerful representation models. However, unlabeled data in the real world naturally exhibits a long-tailed distribution, making the traditional ...

    **aohua Chen, Yucan Zhou, Lin Wang, Dayan Wu in Pattern Recognition and Computer Vision (2024)

  14. No Access

    Chapter and Conference Paper

    PPI-NET: End-to-End Parametric Primitive Inference

    In engineering applications, line, circle, arc, and point are collectively referred to as primitives, and they play a crucial role in path planning, simulation analysis, and manufacturing. When designing CAD m...

    Liang Wang, **aogang Wang in Advances in Computer Graphics (2024)

  15. No Access

    Chapter and Conference Paper

    Power Transmission and Transformation Risk Management System Based on EWM Calculation and AHP

    Aiming at the evaluation and management of transmission project investment risk under the new power market environment, a scheme combining the analytical hierarchy process (AHP) and the entropy weight method (...

    Shengjie Wang, Weijun Wang, **aobo He in Proceedings of Innovative Computing 2024 V… (2024)

  16. Chapter and Conference Paper

    Correction to: A Survey of Control Flow Graph Recovery for Binary Code

    Qian** Wang, **angdong Li, Chong Yue, Yuchen He in Computer Applications (2024)

  17. No Access

    Chapter and Conference Paper

    Convolutional Neural Network Based on Multiple Attention Mechanisms for Hyperspectral and LiDAR Classification

    With the emergence of a large number of remote sensing data sources, how to effectively use the useful information in multi-source data for better earth observation has become an interesting but challenging pr...

    Yingying Wang, Kun Wang, Zhiming Ding in Spatial Data and Intelligence (2024)

  18. No Access

    Chapter and Conference Paper

    Convolutional Neural Network Prediction Error Algorithm Based on Block Classification Enhanced

    Reversible data hiding techniques can effectively solve the information security problem, and One crucial approach to enhance the level of reversible data hiding is to predict images with higher accuracy, ther...

    Hongtao Duan, Ruihe Ma, Songkun Wang, Yong** **an in Digital Forensics and Watermarking (2024)

  19. No Access

    Chapter and Conference Paper

    Distributional Kernel: An Effective and Efficient Means for Trajectory Retrieval

    In this paper, we propose a new and powerful way to represent trajectories and measure the distance between them using a distributional kernel. Our method has two unique properties: (i) the identity property w...

    Yuanyi Shang, Kai Ming Ting, Zi**g Wang in Advances in Knowledge Discovery and Data M… (2024)

  20. No Access

    Chapter and Conference Paper

    Damage Identification Method of Building Structure Based on Computer Vision

    Under the influence of load, earthquake, settlement and other factors, the building structure will be damaged to different degrees. If the building structure damage is not found and handled in time, it will le...

    Hongyue Zhang, **aolu Deng, Guoliang Zhang in Multimedia Technology and Enhanced Learning (2024)

previous disabled Page of 624