Skip to main content

previous disabled Page of 55
and
  1. No Access

    Chapter and Conference Paper

    An Ancient Murals Inpainting Method Based on Bidirectional Feature Adaptation and Adversarial Generative Networks

    To address the issue of varying degrees of damage in ancient Chinese murals due to their age and human-induced destruction, we propose a mural image restoration method based on bidirectional feature adaptation...

    **ngquan Cai, Qingtao Lu, Jiali Yao, Yao Liu, Yan Hu in Advances in Computer Graphics (2024)

  2. No Access

    Chapter and Conference Paper

    Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)

    Secret sharing schemes are used as a tool in many cryptographic protocols including revocable electronic cash, electronic voting, cloud computing and key management in sensor networks. But the existing post-qu...

    Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang in Digital Forensics and Cyber Crime (2024)

  3. No Access

    Chapter and Conference Paper

    Improvement of an Identity-Based Aggregate Signature Protocol from Lattice

    In 2022, Li et al. [1] proposed a quantum secure and non-interactive identity-based aggregate signature protocol from lattices. In the end of their paper, they claimed that their scheme has key escrow problem. Ba...

    Songshou Dong, Yanqing Yao, Yihua Zhou, Yuguang Yang in Digital Forensics and Cyber Crime (2024)

  4. No Access

    Chapter and Conference Paper

    End-to-End Optical Music Recognition with Attention Mechanism and Memory Units Optimization

    Optical Music Recognition (OMR) is a research field aimed at exploring how computers can read sheet music in music documents. In this paper, we propose an end-to-end OMR model based on memory units optimizatio...

    Ruichen He, Junfeng Yao in Pattern Recognition and Computer Vision (2024)

  5. No Access

    Chapter and Conference Paper

    Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM

    We propose a novel, efficient and secure Key Encapsulation Mechanism (KEM) transformation in the random oracle model. Furthermore, we demonstrate its security in the Quantum Random Oracle Model (QROM) as intro...

    Ziyi Li, **anhui Lu, Yao Cheng, Bao Li in Information Security and Cryptology (2024)

  6. No Access

    Chapter and Conference Paper

    A Research on the Manchu-Chinese Bilingual Comparative Characteristics of the Yu Zhi Zeng Ding Qing Wen Jian Dictionary

    Yu Zhi Zeng Ding Qing Wen Jian was the first official Manchu-Chinese bilingual dictionary of the Qing Dynasty. It added Chinese translation to the entries, employed Chinese characters to indicate the pronunciatio...

    Yao Zhang in Chinese Lexical Semantics (2024)

  7. No Access

    Chapter and Conference Paper

    Performance Analysis of Maximum-Likelihood Decoding of Polar Codes

    In space communication, effective channel coding schemes and decoding algorithms are essential for reliable communication. As the standard coding scheme for 5G enhanced Mobile Broadband (eMBB) control channels...

    ** Zheng, **nyuanmeng Yao, **ao Ma in Space Information Networks (2024)

  8. No Access

    Chapter and Conference Paper

    College Student Mental Health Analysis Based on Machine Learning Algorithm

    The role of mental health in college students is very important, but there is a problem of low accuracy. In the past, psychological evaluation methods could not solve the problem of mental health evaluation am...

    Zhang Li, Yao Lu in Application of Big Data, Blockchain, and I… (2024)

  9. No Access

    Chapter and Conference Paper

    A Multi-modality Driven Promptable Transformer for Automated Parapneumonic Effusion Staging

    Pneumonia is a prevalent disease, and some pneumonia patients develop parapneumonic effusion. Among patients with pneumonia, the mortality rate of patients with parapneumonic effusion is higher than that of pa...

    Yan Chen, Qing Liu, Yao **ang in Pattern Recognition and Computer Vision (2024)

  10. No Access

    Chapter and Conference Paper

    LATrans-Unet: Improving CNN-Transformer with Location Adaptive for Medical Image Segmentation

    Convolutional Neural Networks (CNNs) and Vision Transformers (ViTs) have been widely employed in medical image segmentation. While CNNs excel in local feature encoding, their ability to capture long-range depe...

    Qiqin Lin, Junfeng Yao, Qingqi Hong in Pattern Recognition and Computer Vision (2024)

  11. No Access

    Chapter and Conference Paper

    Multi-scale Contrastive Learning for Building Change Detection in Remote Sensing Images

    Self-supervised contrastive learning (CL) methods can utilize large-scale label-free data to mine discriminative feature representations for vision tasks. However, most existing CL-based approaches focus on im...

    Mingliang Xue, **nyuan Huo, Yao Lu, Pengyuan Niu in Pattern Recognition and Computer Vision (2024)

  12. No Access

    Chapter and Conference Paper

    Dynamic GNNs for Precise Seizure Detection and Classification from EEG Data

    Diagnosing epilepsy requires accurate seizure detection and classification, but traditional manual EEG signal analysis is resource-intensive. Meanwhile, automated algorithms often overlook EEG’s geometric and ...

    Arash Hajisafi, Haowen Lin, Yao-Yi Chiang in Advances in Knowledge Discovery and Data M… (2024)

  13. No Access

    Chapter and Conference Paper

    Pseudorandom Isometries

    We introduce a new notion called \({\mathcal {Q}}\) Q -secure pseudorandom i...

    Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu in Advances in Cryptology – EUROCRYPT 2024 (2024)

  14. No Access

    Chapter and Conference Paper

    Camouflaged Object Detection via Global-Edge Context and Mixed-Scale Refinement

    Camouflage object detection (COD), trying to segment objects that blend perfectly with the surrounding environment, is challenging and complex in real-world scenarios. However, existing deep learning methods o...

    Qilun Li, Fengqin Yao, **andong Wang in Pattern Recognition and Computer Vision (2024)

  15. No Access

    Chapter and Conference Paper

    Research on Fabric Defect Detection Technology Based on RDN-LTE and Improved DINO

    In order to solve the problem of detecting various types of complex fabric defects such as different scale sizes, high fusion with the background and extreme aspect ratios generated in actual production enviro...

    Li Yao, Zhongqin Chen, Yan Wan in Advances in Computer Graphics (2024)

  16. No Access

    Chapter and Conference Paper

    Multi-GPU Parallel Pipeline Rendering with Splitting Frame

    In order to achieve real-time rendering of cloud gaming, a large amount of computing resources of graphics processing units (GPU) are required. In this paper, we propose a multi-GPU parallel pipeline rendering...

    Haitang Zhang, Junchao Ma, Zixia Qiu, Junmei Yao in Advances in Computer Graphics (2024)

  17. No Access

    Chapter and Conference Paper

    Neural HD Map Generation from Multiple Vectorized Tiles Locally Produced by Autonomous Vehicles

    High-definition (HD) map is a fundamental component of autonomous driving systems, as it can provide precise environmental information about driving scenes. Recent work on vectorized map generation could produ...

    Miao Fan, Yi Yao, Jian** Zhang, **angbo Song, Daihui Wu in Spatial Data and Intelligence (2024)

  18. No Access

    Chapter and Conference Paper

    Research of Virtual Try-On Technology Based on Two-Dimensional Image

    Virtual try-on based on two-dimensional image refers to trying on the target clothing on a human image to generate the final fitting image. In order to solve the problems of blurred human images, body parts mi...

    Yan Wan, Yue Wang, Li Yao in Advances in Computer Graphics (2024)

  19. No Access

    Chapter and Conference Paper

    Relation-Guided Multi-stage Feature Aggregation Network for Video Object Detection

    Video object detection task has received extensive research attention and various methods have been proposed. The quality of single frame in the original video is usually deteriorated by motion blur and object...

    Tingting Yao, Fuxiao Cao, Fuheng Mi, Danmeng Li in Pattern Recognition and Computer Vision (2024)

  20. No Access

    Chapter and Conference Paper

    Comments on a Blockchain-Based Dynamic and Traceable Data Integrity Verification Scheme

    Recently, Chen et al. designed a new data structure called linear probing Merkle hash tree (LP-MHT). They adopted LP-MHT and RSA-based homomorphic verifiable tags to propose a blockchain-based dynamic and trac...

    Ya-Fen Chang, Sin-En Yao, Yi-Ming Chan in Proceedings of Innovative Computing 2024, … (2024)

previous disabled Page of 55