![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
312 Result(s)
-
Article
Real-time detection algorithm for non-motorized vehicles based on D-YOLO model
In complex traffic scenarios, it is crucial to develop a rapid and precise real-time detection system for non-motorized vehicles to ensure safe driving. D-YOLO is a lightweight real-time detection technique fo...
-
Article
A multi-task mean teacher with two stage decoder for semi-supervised crack detection
Crack detection is a simple but very practical computer vision task. Existing crack detection methods only supervise cracks on limited annotated data, which has limited their detection effectiveness. This pape...
-
Article
DSTC-Net: differential spatio-temporal correlation network for similar action recognition
Skeleton-based action recognition methods have made impressive progress. But to enhance the discrimination of similar actions, it needs to focus on learning the difference information in spatio-temporal featur...
-
Article
Fast monte-carlo clustering for signal separation of RFID collision tags at physical layer
In ultra-high frequency (UHF) radio frequency identification (RFID) systems, enhancing communication efficiency is crucial. This paper proposes a fast Monte-Carlo method to improve the clustering speed of coll...
-
Article
SubFace: learning with softmax approximation for face recognition
The softmax-based loss function and its variants (e.g., cosface, sphereface, and arcface) significantly improve the face recognition performance in wild unconstrained scenes. A common practice of these algorithms...
-
Article
Multi-view clustering via dual-norm and HSIC
Fully capturing valid complementary information in multi-view data enhances the connection between similar data points and weakens the correlation between different data point categories. In this paper, we pro...
-
Article
Multimodal visual-textual object graph attention network for propaganda detection in memes
Propaganda as a purposeful form of communication deserves vigilance for its persuasiveness. With the emergence of social media, most propaganda is multimodal content such as online memes. This paper study the ...
-
Article
Multi-label movie genre classification based on multimodal fusion
Determining the genre of a movie based on its relevant information is a challenging multi-label classification task. Previous studies tended to classify movies based on only one or two modalities, ignoring som...
-
Article
RE-STNet: relational enhancement spatio-temporal networks based on skeleton action recognition
Learning comprehensive spatio-temporal joint connections in complex actions is crucial for recognizing skeleton sequence actions. However, existing research methods equally extract spatio-temporal features wit...
-
Article
BiLSTM-based selection and prediction of optimal polling systems for multiple server numbers
Facing the demands of different service scenarios and the large number of base stations deployed in the context of the 5G era, network slicing was introduced to support on-demand services for specific service ...
-
Article
Target localization using time delay and Doppler shift by compensating the motion effect
This paper considers active localization of a stationary target using time delay or together with Doppler shift measurements obtained by moving sensors. Non-negligible sensor motion effect occurs in the locali...
-
Article
Tensorial multi-view subspace clustering with side constraints for elevator security warning
In recent years, using clustering technology to realize equipment security warning is a research hotspot in the field of data mining applications. However, due to the lack of data fusion mechanism and prior kn...
-
Chapter and Conference Paper
Research on Physical Layer Authentication Method of Internet of Things Based on Contour Stellar Images and Convolutional Neural Network
Wireless communication networks are prone to information security issues due to the openness of radio transmission. User information security relies heavily on reliable identification and authentication method...
-
Chapter and Conference Paper
A Lightweight Fault Diagnosis Model of Rolling Bearing Based on Gramian Angular Field and EfficientNet-B0
The deep learning model can fully extract the rich information in the signal and provide a better recognition effect as compared to traditional fault diagnosis approaches, which rely on manual analysis. Howeve...
-
Chapter and Conference Paper
Context-Based Masking for Spontaneous Venous Pulsations Detection
Spontaneous retinal venous pulsations (SVP) serve as vital dynamic biomarkers, representing rhythmic changes of the central retinal vein observed at the optic disc region (ODR) within an eye. SVPs serve as vit...
-
Chapter and Conference Paper
Analysis of Influencing Factors on Advanced Driving Assistance System Purchase Intention in China
The number of vehicles with the introduction of Advanced Driving Assistance System (ADAS) is increasing. For this reason, it is becoming important to study the technology acceptance on how drivers can actively...
-
Chapter and Conference Paper
IoT Botnet Attacks Detection and Classification Based on Ensemble Learning
With the vigorous development of the IoT, botnet attacks against the IoT have become more frequent and diverse, and the research on attack prevention and detection has become more difficult. This paper propose...
-
Chapter and Conference Paper
Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation
Graph contrastive learning has emerged as a pivotal task in the realm of graph representation learning, with the primary objective of maximizing mutual information between graph-augmented pairs exhibiting simi...
-
Article
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning
Graph neural network(GNN) has become one of the research field in the new wave of technological revolution and industrial transformation. High-performance GNN makes full use of structural information, aggregat...
-
Chapter and Conference Paper
SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security
In this study, we present SolGPT, a novel approach to addressing the pivotal issue of detecting and mitigating vulnerabilities inherent in smart contracts, particularly those written in Solidity, the predomina...