Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Unsupervised Person Re-identification via Differentiated Color Perception Learning

    Unsupervised person re-identification (re-ID) encounters two key problems. One is the lack of label annotation in the target domain, and the other is the domain gap between different cameras. They are addresse...

    Feng Chen, Heng Liu, Jun Tang, Yulin Zhang in Artificial Intelligence and Robotics (2024)

  2. No Access

    Chapter and Conference Paper

    Label Distribution Learning with Discriminative Instance Map**

    Label distribution learning (LDL) is an effective tool to tackle label ambiguity since it allows one instance to be associated with multiple labels in different degrees. Therefore, the more complex but informa...

    Heng-Ru Zhang, Run-Ting Bai in Advances in Knowledge Discovery and Data Mining (2023)

  3. No Access

    Chapter and Conference Paper

    RLMixer: A Reinforcement Learning Approach for Integrated Ranking with Contrastive User Preference Modeling

    There is a strong need for industrial recommender systems to output an integrated ranking of items from different categories, such as video and news, to maximize overall user satisfaction. Integrated ranking f...

    **g Wang, Mengchen Zhao, Wei **a in Advances in Knowledge Discovery and Data M… (2023)

  4. No Access

    Chapter and Conference Paper

    Design of Unmanned Aerial Vehicle Automatic Endurance System

    With electricity as the main power energy, the UAV has been affected by the impact of battery storage on the flight time and flight time, which makes the UAV need to constantly replace the battery to ensure th...

    Jiang Heng, Pan Di-zhao, Hou **aofeng, Tang Yujia in Advanced Hybrid Information Processing (2021)

  5. No Access

    Chapter and Conference Paper

    A Reversible Data Hiding Scheme in Encrypted Image with LSB Compression and MSB Replacement

    A new scheme of reversible data hiding in encrypted images is proposed in this paper. Content owner first encrypts divided blocks by the specific stream cipher and permutation. During data embedding, data hid...

    Wei Zhang, Qing Zhou, Zhenjun Tang, Heng Yao in Security with Intelligent Computing and Bi… (2020)

  6. Chapter and Conference Paper

    Balancing Between Accuracy and Fairness for Interactive Recommendation with Reinforcement Learning

    Fairness in recommendation has attracted increasing attention due to bias and discrimination possibly caused by traditional recommenders. In Interactive Recommender Systems (IRS), user preferences and the sys...

    Weiwen Liu, Feng Liu, Ruiming Tang, Ben Liao in Advances in Knowledge Discovery and Data M… (2020)

  7. No Access

    Chapter and Conference Paper

    Automatic Forgery Localization via Artifacts Analysis of JPEG and Resampling

    With the availability of highly sophisticated editing tools, the authenticity of digital images has now become questionable. The level of image tampering is getting higher and higher, and the tampering procedu...

    Hongbin Wei, Heng Yao, Chuan Qin in Security with Intelligent Computing and Bi… (2020)

  8. Chapter and Conference Paper

    The Sixth Visual Object Tracking VOT2018 Challenge Results

    The Visual Object Tracking challenge VOT2018 is the sixth annual tracker benchmarking activity organized by the VOT initiative. Results of over eighty trackers are presented; many are state-of-the-art trackers...

    Matej Kristan, Aleš Leonardis, Jiří Matas in Computer Vision – ECCV 2018 Workshops (2019)

  9. No Access

    Chapter and Conference Paper

    A Sequence-to-Sequence Text Summarization Model with Topic Based Attention Mechanism

    One of the limitation of automatic summarization is that how to take into account and reflect the implicit information conveyed between different text and the scene influence. In particularly, the generation o...

    Heng-** Pan, Hai Liu, Yong Tang in Web Information Systems and Applications (2019)

  10. No Access

    Chapter and Conference Paper

    Constructing Pseudo Documents with Semantic Similarity for Short Text Topic Discovery

    With the popularity of the Internet, short texts become common in our daily life. Data like tweets and online Q&A pairs are quite valuable in application domains such as question retrieval and personalized rec...

    Heng-yang Lu, Yun Li, Chi Tang, Chong-jun Wang in Neural Information Processing (2018)

  11. No Access

    Chapter and Conference Paper

    Rehabilitation Training for Leg Based on EEG-EMG Fusion

    Stroke is a kind of cerebral vascular disease with high death rate and high disability rate, most stroke patients lose a lot of physiological function. For example, motor function, language function, etc. Two ...

    Heng Tang, Gongfa Li, Ying Sun, Guozhang Jiang in Intelligent Robotics and Applications (2017)

  12. No Access

    Chapter and Conference Paper

    Tag Stripes Tracking from Cardiac MRI by Bayesian Theory

    Tag tracking is a pre-step to heart motion reconstruction. In this paper, we present a new tag tracking method based on Bayesian statistical approach. our method works on the basis of tracking with the active ...

    Min Tang, Yuan-Quan Wang, Pheng Ann Heng in Medical Imaging and Augmented Reality (2004)