Skip to main content

previous disabled Page of 12
and
Your search also matched 2,396 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Dual stage black-box adversarial attack against vision transformer

Include preview-only content
  1. Article

    Open Access

    Analysis of Emotional Tendency of Tourism Consumers Based on LSTM and Fuzzy Control Algorithm

    Learning the emotional tendency of travelers improves their interests and provide optimal traveling recommendations. This, however, requires large volumes of data such as travel plans, visit sites, personal in...

    Wei Meng, Dajie Ji, Haoxin Wang in International Journal of Computational Int… (2024)

  2. Article

    Open Access

    Dynamic Color Regulation of the Lycaenid Butterfly Wing Scales

    Butterfly coloration originates from the finely structured scales grown on the underlying wing cuticle. Most researchers who study butterfly scales are focused on the static optic properties of cover scales, w...

    Mingxia Sun, Weihao Meng, Haiwei Yin, Lingjie Fan, Lei Shi in Journal of Bionic Engineering (2024)

  3. Article

    Open Access

    Cross-modal learning using privileged information for long-tailed image classification

    The prevalence of long-tailed distributions in real-world data often results in classification models favoring the dominant classes, neglecting the less frequent ones. Current approaches address the issues in ...

    **angxian Li, Yuze Zheng, Haokai Ma, Zhuang Qi, **angxu Meng in Computational Visual Media (2024)

  4. Article

    Open Access

    Dynamic YOLO for small underwater object detection

    The practical application of object detection inevitably encounters challenges posed by small objects. In underwater object detection, a crucial method for marine exploration, the presence of small objects in ...

    Jie Chen, Meng Joo Er in Artificial Intelligence Review (2024)

  5. Article

    Retraction Note: Quality assessment for virtual reality technology based on real scene

    Bin Jiang, Jiachen Yang, Na Jiang, Zhihan Lv in Neural Computing and Applications (2024)

  6. Article

    Open Access

    Temporally Consistent Enhancement of Low-Light Videos via Spatial-Temporal Compatible Learning

    Temporal inconsistency is the annoying artifact that has been commonly introduced in low-light video enhancement, but current methods tend to overlook the significance of utilizing both data-centric clues and ...

    Lingyu Zhu, Wenhan Yang, Baoliang Chen in International Journal of Computer Vision (2024)

  7. Article

    Open Access

    MCAD: Multi-classification anomaly detection with relational knowledge distillation

    With the wide application of deep learning in anomaly detection (AD), industrial vision AD has achieved remarkable success. However, current AD usually focuses on anomaly localization and rarely investigates a...

    Zhuo Li, Yifei Ge, Xuebin Yue, Lin Meng in Neural Computing and Applications (2024)

  8. Article

    Open Access

    Reinforcement learning tutor better supported lower performers in a math task

    Resource limitations make it challenging to provide all students with one of the most effective educational interventions: personalized instruction. Reinforcement learning could be a pivotal tool to decrease t...

    Sherry Ruan, Allen Nie, William Steenbergen, Jiayu He, J. Q. Zhang in Machine Learning (2024)

  9. Article

    Open Access

    Efficient image restoration with style-guided context cluster and interaction

    Recently, convolutional neural networks (CNNs) and vision transformers (ViTs) have emerged as powerful tools for image restoration (IR). Nonetheless, they encountered some limitations due to their characterist...

    Fengjuan Qiao, Yonggui Zhu, Ming Meng in Neural Computing and Applications (2024)

  10. Article

    Open Access

    IDG-SemiAD: An Immune Detector Generation-Based Collaborative Learning Scheme for Semi-supervised Anomaly Detection in Industrial Cyber-physical Systems

    Anomaly detection is a critical line of defense to ensure the network security of industrial cyber-physical systems. However, a significant issue in the anomaly detection is the insufficient labels of anomaly ...

    Meng Huang, Wenshan Li, Junjiang He in International Journal of Computational Int… (2024)

  11. Article

    Open Access

    Learning to compose diversified prompts for image emotion classification

    Image emotion classification (IEC) aims to extract the abstract emotions evoked in images. Recently, language-supervised methods such as contrastive language-image pretraining (CLIP) have demonstrated superior...

    Sinuo Deng, Lifang Wu, Ge Shi, Lehao **ng, Meng Jian in Computational Visual Media (2024)

  12. Article

    Open Access

    Forestry Ecosystem Protection from the Perspective of Eco-civilization Based on Self-Attention Using Hierarchical Dilated Convolutional Neural Network

    Ensuring the sustainable protection of forestry ecosystems faces numerous challenges. One significant hurdle is the constant threat of illegal logging and deforestation. Despite various regulations and conserv...

    Rui Meng in International Journal of Computational Intelligence Systems (2024)

  13. Article

    A Survey on Differential Privacy for Medical Data Analysis

    Machine learning methods promote the sustainable development of wise information technology of medicine (WITMED), and a variety of medical data brings high value and convenience to medical analysis. However, t...

    WeiKang Liu, Yanchun Zhang, Hong Yang, Qinxue Meng in Annals of Data Science (2024)

  14. Article

    Open Access

    Retraction Note: Network Attribute Analysis and Competitiveness Evaluation of Auto Parts Industry Cluster for e-Commerce Platform

    **angling Meng in International Journal of Computational Intelligence Systems (2024)

  15. Article

    Open Access

    Rejuvenating classical brain electrophysiology source localization methods with spatial graph Fourier filters for source extents estimation

    EEG/MEG source imaging (ESI) aims to find the underlying brain sources to explain the observed EEG or MEG measurement. Multiple classical approaches have been proposed to solve the ESI problem based on differe...

    Shihao Yang, Meng Jiao, **g **ang, Neel Fotedar, Hai Sun, Feng Liu in Brain Informatics (2024)

  16. Article

    Open Access

    Where To Go at the Next Timestamp

    The next Point of Interest (POI) recommendation is the core technology of smart city. Current state-of-the-art models attempt to improve the accuracy of the next POI recommendation by incorporating temporal and s...

    Jiaqi Duan, **angfu Meng, Guihong Liu in Data Science and Engineering (2024)

  17. Article

    Open Access

    DeepMCGCN: Multi-channel Deep Graph Neural Networks

    Graph neural networks (GNNs) have shown powerful capabilities in modeling and representing graph structural data across various graph learning tasks as an emerging deep learning approach. However, most existin...

    Lei Meng, Zhonglin Ye, Yanlin Yang in International Journal of Computational Int… (2024)

  18. Article

    Open Access

    Few-Shot Semantic Segmentation via Mask Aggregation

    Few-shot semantic segmentation aims to recognize novel classes with only very few labelled data. This challenging task requires mining of the correlation between the query image and the support images. Previou...

    Wei Ao, Shunyi Zheng, Yan Meng, Yang Yang in Neural Processing Letters (2024)

  19. Article

    Open Access

    Shapley value: from cooperative game to explainable artificial intelligence

    With the tremendous success of machine learning (ML), concerns about their black-box nature have grown. The issue of interpretability affects trust in ML systems and raises ethical concerns such as algorithmic...

    Meng Li, Hengyang Sun, Yanjun Huang, Hong Chen in Autonomous Intelligent Systems (2024)

  20. Article

    Open Access

    A Robust Sequential Recommendation Model Based on Multiple Feedback Behavior Denoising and Trusted Neighbors

    At present, most of the personalized sequential recommendations utilize users’ implicit positive feedback (such as clicks) to predict user behavior, ignoring the impact of implicit negative feedback and explic...

    Hongyun Cai, Jie Meng, Shilin Yuan, Jichao Ren in Neural Processing Letters (2024)

previous disabled Page of 12