Skip to main content

previous disabled Page of 16
and
  1. No Access

    Article

    Real-time detection algorithm for non-motorized vehicles based on D-YOLO model

    In complex traffic scenarios, it is crucial to develop a rapid and precise real-time detection system for non-motorized vehicles to ensure safe driving. D-YOLO is a lightweight real-time detection technique fo...

    Yushan Li, Hongwei Ding, Peng Hu, Zhijun Yang in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    A multi-task mean teacher with two stage decoder for semi-supervised crack detection

    Crack detection is a simple but very practical computer vision task. Existing crack detection methods only supervise cracks on limited annotated data, which has limited their detection effectiveness. This pape...

    Mingsi Sun, Hongwei Zhao, **** Liu, Jianhang Zhou in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    DSTC-Net: differential spatio-temporal correlation network for similar action recognition

    Skeleton-based action recognition methods have made impressive progress. But to enhance the discrimination of similar actions, it needs to focus on learning the difference information in spatio-temporal featur...

    Hongwei Chen, Shiqi He, Zexi Chen in Multimedia Systems (2024)

  4. No Access

    Article

    Fast monte-carlo clustering for signal separation of RFID collision tags at physical layer

    In ultra-high frequency (UHF) radio frequency identification (RFID) systems, enhancing communication efficiency is crucial. This paper proposes a fast Monte-Carlo method to improve the clustering speed of coll...

    Yu Zeng, Hongwei Ding, Haifeng Wu in Wireless Networks (2024)

  5. No Access

    Article

    SubFace: learning with softmax approximation for face recognition

    The softmax-based loss function and its variants (e.g., cosface, sphereface, and arcface) significantly improve the face recognition performance in wild unconstrained scenes. A common practice of these algorithms...

    Suncheng **ang, Hongwei Xu, Mingye **e, Dahong Qian in Multimedia Tools and Applications (2024)

  6. No Access

    Article

    Multi-view clustering via dual-norm and HSIC

    Fully capturing valid complementary information in multi-view data enhances the connection between similar data points and weakens the correlation between different data point categories. In this paper, we pro...

    Guoqing Liu, Hongwei Ge, Shuzhi Su, Shuangxi Wang in Multimedia Tools and Applications (2024)

  7. No Access

    Article

    Multimodal visual-textual object graph attention network for propaganda detection in memes

    Propaganda as a purposeful form of communication deserves vigilance for its persuasiveness. With the emergence of social media, most propaganda is multimodal content such as online memes. This paper study the ...

    Pengyuan Chen, Lei Zhao, Yangheran Piao, Hongwei Ding in Multimedia Tools and Applications (2024)

  8. No Access

    Article

    Multi-label movie genre classification based on multimodal fusion

    Determining the genre of a movie based on its relevant information is a challenging multi-label classification task. Previous studies tended to classify movies based on only one or two modalities, ignoring som...

    Zihui Cai, Hongwei Ding, **lu Wu, Ying **, Xuemeng Wu in Multimedia Tools and Applications (2024)

  9. No Access

    Article

    RE-STNet: relational enhancement spatio-temporal networks based on skeleton action recognition

    Learning comprehensive spatio-temporal joint connections in complex actions is crucial for recognizing skeleton sequence actions. However, existing research methods equally extract spatio-temporal features wit...

    Hongwei Chen, Shiqi He, Zexi Chen in Multimedia Tools and Applications (2024)

  10. No Access

    Article

    BiLSTM-based selection and prediction of optimal polling systems for multiple server numbers

    Facing the demands of different service scenarios and the large number of base stations deployed in the context of the 5G era, network slicing was introduced to support on-demand services for specific service ...

    Zhijun Yang, Wenjie Huang, Hongwei Ding in Multimedia Tools and Applications (2024)

  11. No Access

    Article

    Target localization using time delay and Doppler shift by compensating the motion effect

    This paper considers active localization of a stationary target using time delay or together with Doppler shift measurements obtained by moving sensors. Non-negligible sensor motion effect occurs in the locali...

    Tianyi Jia, Chang Gao, **aohong Shen, Hongwei Liu in Telecommunication Systems (2024)

  12. No Access

    Article

    Tensorial multi-view subspace clustering with side constraints for elevator security warning

    In recent years, using clustering technology to realize equipment security warning is a research hotspot in the field of data mining applications. However, due to the lack of data fusion mechanism and prior kn...

    Huangzhen Xu, Licheng Ruan, Yuzhou Ni, Hongwei Yin, ** Yu in Multimedia Systems (2024)

  13. No Access

    Chapter and Conference Paper

    Research on Physical Layer Authentication Method of Internet of Things Based on Contour Stellar Images and Convolutional Neural Network

    Wireless communication networks are prone to information security issues due to the openness of radio transmission. User information security relies heavily on reliable identification and authentication method...

    Ying Lu, **gchao Li, Yulong Ying, Bin Zhang, Tao Shi in 6GN for Future Wireless Networks (2024)

  14. No Access

    Chapter and Conference Paper

    A Lightweight Fault Diagnosis Model of Rolling Bearing Based on Gramian Angular Field and EfficientNet-B0

    The deep learning model can fully extract the rich information in the signal and provide a better recognition effect as compared to traditional fault diagnosis approaches, which rely on manual analysis. Howeve...

    Yingyu Dai, **gchao Li, Yulong Ying, Bin Zhang in 6GN for Future Wireless Networks (2024)

  15. No Access

    Chapter and Conference Paper

    Context-Based Masking for Spontaneous Venous Pulsations Detection

    Spontaneous retinal venous pulsations (SVP) serve as vital dynamic biomarkers, representing rhythmic changes of the central retinal vein observed at the optic disc region (ODR) within an eye. SVPs serve as vit...

    Hongwei Sheng, **n Yu, Xue Li in AI 2023: Advances in Artificial Intelligen… (2024)

  16. No Access

    Chapter and Conference Paper

    Analysis of Influencing Factors on Advanced Driving Assistance System Purchase Intention in China

    The number of vehicles with the introduction of Advanced Driving Assistance System (ADAS) is increasing. For this reason, it is becoming important to study the technology acceptance on how drivers can actively...

    Hongwei Huang, Jun Ma in Design, User Experience, and Usability (2024)

  17. No Access

    Chapter and Conference Paper

    IoT Botnet Attacks Detection and Classification Based on Ensemble Learning

    With the vigorous development of the IoT, botnet attacks against the IoT have become more frequent and diverse, and the research on attack prevention and detection has become more difficult. This paper propose...

    Yongzhong Cao, Zhihui Wang, Hongwei Ding in Artificial Intelligence and Robotics (2024)

  18. No Access

    Chapter and Conference Paper

    Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation

    Graph contrastive learning has emerged as a pivotal task in the realm of graph representation learning, with the primary objective of maximizing mutual information between graph-augmented pairs exhibiting simi...

    Mi Wen, Hongwei Wang, Yunsheng Xue, Yi Wu in Advances in Knowledge Discovery and Data M… (2024)

  19. No Access

    Article

    SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning

    Graph neural network(GNN) has become one of the research field in the new wave of technological revolution and industrial transformation. High-performance GNN makes full use of structural information, aggregat...

    Yanjun Liu, Hongwei Li, Meng Hao in Peer-to-Peer Networking and Applications (2024)

  20. No Access

    Chapter and Conference Paper

    SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security

    In this study, we present SolGPT, a novel approach to addressing the pivotal issue of detecting and mitigating vulnerabilities inherent in smart contracts, particularly those written in Solidity, the predomina...

    Shengqiang Zeng, Hongwei Zhang, **song Wang in Algorithms and Architectures for Parallel … (2024)

previous disabled Page of 16