Skip to main content

previous disabled Page of 22
and
  1. Article

    Open Access

    Review of few-shot learning application in CSI human sensing

    Wi-Fi sensing has garnered increasing interest for its significant advantages, primarily leveraging Wi-Fi signal fluctuations induced by human activities and advanced neural network algorithms. However, its ap...

    Zhengjie Wang, Jianhang Li, Wenchao Wang, Zhaolei Dong in Artificial Intelligence Review (2024)

  2. No Access

    Article

    JointMETRO: a 3D reconstruction model for human figures in works of art based on transformer

    Sculptures and paintings are an important part of our cultural heritage, and 3D reconstruction of the human in them can help us better preserve and inherit this heritage. By creating 3D models of sculptures an...

    Shanchen Pang, Rongrong Peng, Yukun Dong, Qi Yuan in Neural Computing and Applications (2024)

  3. No Access

    Article

    Optimization of complex surface milling parameters based on HSS-MFM and OBL-NSGA-II

    Complex curved parts are widely used in some critical engineering equipment with high service performance, but machining such parts in computer numerical control (CNC) often has a series of problems such as un...

    Yang Yang, Yang Liu, Yuan Wang in International Journal of Intelligent Robot… (2024)

  4. No Access

    Article

    Person re-identification method based on fine-grained feature fusion and self-attention mechanism

    Aiming at the problem of low accuracy of person re-identification (Re-ID) algorithm caused by occlusion, low distinctiveness of person features and unclear detail features in complex environment, we propose a ...

    Kangning Yin, Zhen Ding, Zhihua Dong, **nhui Ji, Zhipei Wang, Dongsheng Chen in Computing (2024)

  5. No Access

    Article

    A Universal Event-Based Plug-In Module for Visual Object Tracking in Degraded Conditions

    Most existing trackers based on RGB/grayscale frames may collapse due to the unreliability of conventional sensors in some challenging scenarios (e.g., motion blur and high dynamic range). Event-based cameras ...

    Jiqing Zhang, Bo Dong, Yingkai Fu in International Journal of Computer Vision (2024)

  6. Article

    Open Access

    Multi-modal visual tracking: Review and experimental comparison

    Visual object tracking has been drawing increasing attention in recent years, as a fundamental task in computer vision. To extend the range of tracking applications, researchers have been introducing informati...

    Pengyu Zhang, Dong Wang, Huchuan Lu in Computational Visual Media (2024)

  7. No Access

    Article

    DFC-dehaze: an improved cycle-consistent generative adversarial network for unpaired image dehazing

    Recently, cycle-consistent adversarial network (CycleGAN) has been utilized in image dehazing tasks due to train without paired images. However, the quality of generated dehazed images is low. To enhance the d...

    Shibin Wang, Xueshu Mei, Pengshuai Kang, Yan Li, Dong Liu in The Visual Computer (2024)

  8. No Access

    Article

    BNN-SAM: Improving generalization of binary object detector by Seeking Flat Minima

    Binary Neural Network (BNN) exhibits substantial potential for low-cost and energy-efficient deployment, notably in the application of BNN-facilitated object detection on embedded devices. Despite its high com...

    Han Pu, Dezheng Zhang, Ke Xu, RuChan Mo, ZhiHong Yan, Dong Wang in Applied Intelligence (2024)

  9. Article

    Open Access

    Temporally consistent video colorization with deep feature propagation and self-regularization learning

    Video colorization is a challenging and highly ill-posed problem. Although recent years have witnessed remarkable progress in single image colorization, there is relatively less research effort on video colori...

    Yihao Liu, Hengyuan Zhao, Kelvin C. K. Chan, **ntao Wang in Computational Visual Media (2024)

  10. Article

    Open Access

    Using a virtual reality interview simulator to explore factors influencing people’s behavior

    Virtual reality interview simulator (VRIS) is an effective and valid tool that uses virtual reality technology to train people’s interview skills. Typically, it offers candidates prone to being very nervous du...

    **nyi Luo, Yuyang Wang, Lik-Hang Lee, Zihan **ng, Shan **, Boya Dong in Virtual Reality (2024)

  11. No Access

    Article

    Adaptive prescribed performance control for state constrained stochastic nonlinear systems with unknown control direction: a novel network-based approach

    In this paper, the tracking control problem of the state constrained stochastic nonlinear systems with unknown control direction is studied, and a novel adaptive prescribed performance control (PPC) approach i...

    Yu-Qun Han, Na Li, Dong-Mei Wang, Ya-Feng Zhou in Neural Computing and Applications (2024)

  12. No Access

    Chapter and Conference Paper

    Enhanced Featurization of Queries with Interval Density Encoding

    Learning-based cardinality estimation methods outperform traditional methods by effectively overcoming strong assumptions(attribute value independence and uniform distribution). Existing learning-based methods...

    Jiangqing Wang, Dong Yang, Chong Sun, Jun Tie in Artificial Intelligence in China (2024)

  13. No Access

    Chapter and Conference Paper

    A Low-Latency Hardware Accelerator for YOLO Object Detection Algorithms

    Object detection is an important computer vision task with a wide range of applications, including autonomous driving, smart security, and other domains. However, the high computational requirements poses chal...

    Aibin Wang, Youshi Ye, Yu Peng, Dezheng Zhang in Advanced Parallel Processing Technologies (2024)

  14. No Access

    Chapter and Conference Paper

    Study on the Genetic Links Between Type 2 Diabetes Mellitus and Glioma by Bioinformatics

    Diabetes will increase the risk of most cancers, such as pancreatic, breast and prostate cancer. However, some studies showed patients with diabetes are less susceptible to glioma than the people with normal b...

    Yidan Sang, Mengyang Hu, Na Wang in Bio-Inspired Computing: Theories and Appli… (2024)

  15. No Access

    Chapter and Conference Paper

    Accelerated Lifetime Experiment of Maximum Current Ratio Based on Charge and Discharge Capacity Confinement

    Lithium-ion batteries will undergo continuous aging during the process of charging and discharging. Charging and discharging cycle conditions for lithium-ion batteries are usually an important method to detect...

    Baoji Wang, Boyan Li, Qixuan Wang, Lei Dong in Advanced Computational Intelligence and In… (2024)

  16. No Access

    Article

    End-to-end acceleration of the YOLO object detection framework on FPGA-only devices

    Object detection has been revolutionized by convolutional neural networks (CNNs), but their high computational complexity and heavy data access requirements make implementing these algorithms on edge devices c...

    Dezheng Zhang, Aibin Wang, Ruchan Mo, Dong Wang in Neural Computing and Applications (2024)

  17. No Access

    Article

    On evaluation trials in speaker verification

    Evaluation trials are crucial to measure performance of speaker verification systems. However, the design of trials that can faithfully reflect system performance and accurately distinguish between different s...

    Lantian Li, Di Wang, Andrew Abel, Dong Wang in Applied Intelligence (2024)

  18. No Access

    Chapter and Conference Paper

    High-Resolution Feature Representation Driven Infrared Small-Dim Object Detection

    Infrared small-dim object detection is a challenging task due to the small size, weak features, lack of prominent structural information, and vulnerability to background interference. During the process of dee...

    Yuhang Dong, Yingying Wang, Linyu Fan in Pattern Recognition and Computer Vision (2024)

  19. No Access

    Chapter and Conference Paper

    Intelligent Cooperative Routing for Services in Computing Integration Networking

    With the widespread application of cloud computing and edge computing, achieving optimal allocation of computing resources in a heterogeneous network environment has become a key issue. The objective of this c...

    Guoqing Dong, Tianhao Peng, Qixuan Zhang, Huizhi Wang in Mobile Internet Security (2024)

  20. No Access

    Chapter and Conference Paper

    Blockchain Scam Detection: State-of-the-Art, Challenges, and Future Directions

    With the rapid development of blockchain platforms, such as Ethereum and Hyperledger Fabric, blockchain technology has been widely applied in various domains. However, various scams exist in the cryptocurrency...

    Shunhui Ji, Congxiong Huang, Hanting Chu, **ao Wang in Blockchain and Trustworthy Systems (2024)

previous disabled Page of 22