Skip to main content

previous disabled Page of 683
and
  1. No Access

    Chapter and Conference Paper

    Emphasizing Boundary-Positioning and Leveraging Multi-scale Feature Fusion for Camouflaged Object Detection

    Camouflaged object detection (COD) aims to identify objects that blend in with their surroundings and have numerous practical applications. However, COD is a challenging task due to the high similarity between...

    Songlin Li, **uhong Li, Zhe Li, Boyuan Li in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Research on Intelligent Manufacturing Training System Based on Industrial Metaverse

    Skilled human resource becomes an essential resource for implementing intelligent manufacturing in the new era, prompting high demands on Intelligent Manufacturing Training (IMT). Empowering the effective IMT,...

    Yuqi Zhou, Tan Li, Bohu Li, Gang Wu in Methods and Applications for Modeling and … (2024)

  3. No Access

    Chapter and Conference Paper

    Empowering Work-Life Harmony: Introducing a Porsche-Inspired Voice Digital Assistants Tailored for Women

    With the rapid increase in the personalized demands for in-car voice assistants in the Generation Z era, innovation in digital assistants (DA) becomes crucial to better meet the growing needs of human-vehicle ...

    Fenghua Tang, Yifang Li, Ke Xu, Tingting Guo in Design, User Experience, and Usability (2024)

  4. No Access

    Chapter and Conference Paper

    KGCN-DDA: A Knowledge Graph Based GCN Method for Drug-Disease Association Prediction

    Exploring the potential efficacy of a drug is a valid approach for drug discovery with shorter development times and lower costs. Recently, several computational drug repositioning methods have been introduced...

    Hongyu Kang, Li Hou, Jiao Li, Qin Li in Intelligent Computers, Algorithms, and Applications (2024)

  5. No Access

    Chapter and Conference Paper

    Multimodal Rumor Detection by Using Additive Angular Margin with Class-Aware Attention for Hard Samples

    Currently, several factors limit the practicality of multimodal rumor detection (MRD). These include incomplete feature fusion in multimodal data, the weak discriminative power in the softmax-based loss, and t...

    Chenyu Zhou, **uhong Li, Zhe Li, Fan Chen in Pattern Recognition and Computer Vision (2024)

  6. No Access

    Chapter and Conference Paper

    Multi-agent Perception via Co-attentive Communication Mechanism

    Multi-agent collaborative perception has the potential to significantly enhance perception performance by facilitating the exchange of complementary information among agents through communication. Effective co...

    Ning Gong, Zhi Li, Shaohui Li, Yuxin Ke in Pattern Recognition and Computer Vision (2024)

  7. No Access

    Chapter and Conference Paper

    Deep Recognition of Chinese Herbal Medicines Based on a Caputo Fractional Order Convolutional Neural Network

    Chinese herbal medicines are the treasure of Chinese traditional medicine, which contains active ingredients that have significant therapeutic effects for many diseases. To solve the fluctuation and inefficien...

    Tao Li, Jiawei Yang, Chenxi Li, Lulu Lv in Internet of Things of Big Data for Healthc… (2024)

  8. No Access

    Chapter and Conference Paper

    Channel Allocation Scheme Based on NSGA-II for Frequency-Division-Multiplexing UHF RFID System

    With the proposal and development of the internet of things (IoT), the ultra-high frequency (UHF) passive radio frequency identification (RFID) system based on backscatter communication technology has become o...

    Jie Meng, Yuan Li, Yulu Zhang, Shuai Ma, Gui Li, Jian Li in Computer Networks and IoT (2024)

  9. No Access

    Chapter and Conference Paper

    PiDiNeXt: An Efficient Edge Detector Based on Parallel Pixel Difference Networks

    The Pixel Difference Network (PiDiNet) is well-known for its success in edge detection. Combining traditional operators with deep learning, PiDiNet achieves competitive results with fewer parameters. However, ...

    Yachuan Li, Xavier Soria Poma, Guanlin Li in Pattern Recognition and Computer Vision (2024)

  10. No Access

    Chapter and Conference Paper

    Tailoring Large Language Models to Radiology: A Preliminary Approach to LLM Adaptation for a Highly Specialized Domain

    In this preliminary work, we present a domain fine-tuned LLM model for radiology, an experimental large language model adapted for radiology. This model, created through an exploratory application of instructi...

    Zhengliang Liu, Aoxiao Zhong, Yiwei Li, Longtao Yang in Machine Learning in Medical Imaging (2024)

  11. No Access

    Chapter and Conference Paper

    Highlight Removal from a Single Image Based on a Prior Knowledge Guided Unsupervised CycleGAN

    Highlights widely exist in many objects, such as the optical images of high-gloss leather, glass, plastic, metal parts, and other mirror-reflective objects. It is difficult to directly apply optical measuremen...

    Yongkang Ma, Li Li, Hao Chen, **an Li, Junchao Chen in Advances in Computer Graphics (2024)

  12. No Access

    Chapter and Conference Paper

    Research on UUV Rudder Angle Control Method Based on Sliding Mode Control

    It is difficult to control the rudder Angle of UUV due to its nonlinear characteristics, dynamic matching, and many interference terms. With the increase of the number and type of uncertainty items, the corres...

    Lin Li, Fengyun Li, Zihao Zhan, Kaiyu Li in Bio-Inspired Computing: Theories and Appli… (2024)

  13. No Access

    Chapter and Conference Paper

    Multi-scale Attention Conditional GAN for Underwater Image Enhancement

    Underwater image enhancement (UIE) has achieved impressive achievements in various marine tasks, such as aquaculture and biological monitoring. However, complex underwater scenarios impede current UIE method a...

    Yiming Li, Fei Li, Zhenbo Li in Advances in Computer Graphics (2024)

  14. No Access

    Chapter and Conference Paper

    Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM

    We propose a novel, efficient and secure Key Encapsulation Mechanism (KEM) transformation in the random oracle model. Furthermore, we demonstrate its security in the Quantum Random Oracle Model (QROM) as intro...

    Ziyi Li, **anhui Lu, Yao Cheng, Bao Li in Information Security and Cryptology (2024)

  15. No Access

    Chapter and Conference Paper

    Research on Physical Layer of Passive IoT Communication Protocol Based on Cellular Fusion

    As transportation, logistics and other industries put forward the demand for low-cost item tracking, it is urgent to use the advantages of cellular networks to achieve seamless coverage of the connection of th...

    Yi He, Yulu Zhang, Yuan Li, Shuai Ma, Gui Li, Junyang Liu in Computer Networks and IoT (2024)

  16. No Access

    Chapter and Conference Paper

    A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing

    With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN...

    **njian Zhao, Qianmu Li, Qi Wang, Shi Chen in Green, Pervasive, and Cloud Computing (2024)

  17. No Access

    Chapter and Conference Paper

    DQN-Based Applications Offloading with Multiple Interdependent Tasks in Mobile Edge Computing

    Recently, Vehicular Edge Computing (VEC) is evolving as a solution for offloading computationally intensive tasks in in-vehicle environments. However, when the number of vehicles and users is large, pure edge ...

    Jiaxue Tu, Dongge Zhu, Yunni **a, Yin Li in Collaborative Computing: Networking, Appli… (2024)

  18. No Access

    Chapter and Conference Paper

    Research on Key Intelligent System in Unmanned Surface Vessel

    With the rapid development of automated control and mobile communication technologies, unmanned ship technology is a derivative product of robotics. This paper aims to study the key technologies of intelligent...

    Yongguo Li, **angyan Li, Caiyin Xu, Xuan Tang in 6GN for Future Wireless Networks (2024)

  19. Chapter and Conference Paper

    Correction to: A Survey of Control Flow Graph Recovery for Binary Code

    Qian** Wang, **angdong Li, Chong Yue, Yuchen He in Computer Applications (2024)

  20. No Access

    Chapter and Conference Paper

    A Novel Network Topology Sensing Method for Network Security Situation Awareness

    In Network Security Situation Awareness (NSSA), topology information of the monitored network constitutes the foundation of the whole NSSA process. This paper presents a novel method for network topology sensi...

    Yixuan Wang, Bo Zhao, Zhonghao Sun in Algorithms and Architectures for Parallel … (2024)

previous disabled Page of 683