![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessStudy on instability mechanism of soft rock roadway and pressure-relief bolt-grouting support technology
Aiming at the engineering problem of roadway deformation and instability of swelling soft rock widely existed in Kailuan mining area, the mineral composition and microstructure of such soft rock were obtained ...
-
Chapter and Conference Paper
Hybrid Spatio-Temporal Network for Face Forgery Detection
Facial manipulation techniques have aroused increasing security concerns, leading to various methods to detect forgery videos. However, existing methods suffer from a significant performance gap compared to im...
-
Article
Synthesis of biomass-based polymer brush-on-brush composite for adsorption of copper(II) from aqueous media
A biomass-based polymer brush-on-brush composite was synthesized by two sequential visible light-induced metal-free atom transfer radical polymerization steps for the removal of Cu(II) in aqueous media. Cellul...
-
Chapter and Conference Paper
Anti-retroactive Interference for Lifelong Learning
Humans can continuously learn new knowledge. However, machine learning models suffer from drastic drop** in performance on previous tasks after learning new tasks. Cognitive science points out that the compe...
-
Chapter and Conference Paper
CLIFF: Carrying Location Information in Full Frames into Human Pose and Shape Estimation
Top-down methods dominate the field of 3D human pose and shape estimation, because they are decoupled from human detection and allow researchers to focus on the core problem. However, crop**, their first ste...
-
Chapter and Conference Paper
Self-Supervision Can Be a Good Few-Shot Learner
Existing few-shot learning (FSL) methods rely on training with a large labeled dataset, which prevents them from leveraging abundant unlabeled data. From an information-theoretic perspective, we propose an eff...
-
Article
Rectified Binary Convolutional Networks with Generative Adversarial Learning
Binarized convolutional neural networks (BNNs) are widely used to improve the memory and computational efficiency of deep convolutional neural networks for to be employed on embedded devices. However, existing...
-
Article
Binarized Neural Architecture Search for Efficient Object Recognition
Traditional neural architecture search (NAS) has a significant impact in computer vision by automatically designing network architectures for various tasks. In this paper, binarized neural architecture search ...
-
Chapter and Conference Paper
Wavelet-Based Dual-Branch Network for Image Demoiréing
When smartphone cameras are used to take photos of digital screens, usually moiré patterns result, severely degrading photo quality. In this paper, we design a wavelet-based dual-branch network (WDNet) with a ...
-
Chapter and Conference Paper
API-Net: Robust Generative Classifier via a Single Discriminator
Robustness of deep neural network classifiers has been attracting increased attention. As for the robust classification problem, a generative classifier typically models the distribution of inputs and labels, ...
-
Chapter and Conference Paper
Large-Scale Few-Shot Learning via Multi-modal Knowledge Discovery
Large-scale few-shot learning aims at identifying hundreds of novel object categories where each category has only a few samples. It is a challenging problem since (1) the identifying process is susceptible to...
-
Article
Bounding Multiple Gaussians Uncertainty with Application to Object Tracking
This paper proves the uncertainty bound for the multiple Gaussian functions, termed multiple Gaussians Uncertainty (MGU), which significantly generalizes the uncertainty principle for the single Gaussian funct...
-
Article
Geometric Reinforcement Learning for Path Planning of UAVs
We proposed a new learning algorithm, named Geometric Reinforcement Learning (GRL), for path planning of Unmanned Aerial Vehicles (UAVs). The contributions of GRL are as: (1) GRL exploits a specific reward mat...
-
Chapter and Conference Paper
Object Detection and Viewpoint Estimation with Auto-masking Neural Network
Simultaneously detecting an object and determining its pose has become a popular research topic in recent years. Due to the large variances of the object appearance in images, it is critical to capture the dis...
-
Chapter and Conference Paper
Precise 3D Reconstruction from a Single Image
3D object reconstruction from single images has extensive applications in multimedia. Most of existing related methods only recover rough 3D objects and the objects are often required to be interconnected. In ...
-
Chapter and Conference Paper
Compressed Sensing Ensemble Classifier for Human Detection
This paper proposes a novel Compressed Sensing Ensemble Classifier (CSEC) for human detection. The proposed CSEC employs the compressed sensing technique to get a more sparse model with a more reasonable selec...
-
Article
A deformation model to reduce the effect of expressions in 3D face recognition
In 3D face recognition, most work utilizes the rigid parts of face surfaces for matching to exclude the distortion caused by expressions. However, across a broad range of expressions, the rigid parts may not a...
-
Chapter and Conference Paper
3D Face Recognition by Local Shape Difference Boosting
A new approach, called Collective Shape Difference Classifier (CSDC), is proposed to improve the accuracy and computational efficiency of 3D face recognition. The CSDC learns the most discriminative local areas f...
-
Chapter and Conference Paper
Output Regularized Metric Learning with Side Information
Distance metric learning has been widely investigated in machine learning and information retrieval. In this paper, we study a particular content-based image retrieval application of learning distance metrics ...
-
Article
Ranking with uncertain labels and its applications
The techniques for image analysis and classification generally consider the image sample labels fixed and without uncertainties. The rank regression problem studied in this paper is based on the training sampl...