Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Target-aware pooling combining global contexts for aerial tracking

    The UAVs captured targets are relatively small when compared with the ordinary surveillance cameras. Thus, a strong discriminative ability is required for aerial trackers to accurately locate small targets, es...

    Yue Wu, Chengtao Cai, Chai Kiat Yeo, Kejun Wu in The Visual Computer (2024)

  2. No Access

    Chapter and Conference Paper

    Application of Image Processing in Air-Ground Combined Fire Fighting System

    In modern fire rescue, the rise of UAV technology has brought unprecedented advantages for the air-ground joint fire fighting system to deal with emergencies such as fires. Image processing, a key component of...

    Min Wang, **g Huang, Wentao Wang in New Approaches for Multidimensional Signal… (2024)

  3. No Access

    Chapter and Conference Paper

    EFPNet: Effective Fusion Pyramid Network for Tiny Person Detection in UAV Images

    Unmanned Aerial Vehicles (UAVs) have found extensive applications in the field of rescue and navigation scenarios. The objects in UAV images are generally with small sizes, which rises a serious challenge of o...

    Ruichen Zhang, Qiong Liu, Kejun Wu in Artificial Intelligence (2024)

  4. No Access

    Article

    Multi-intent autonomous decision-making for air combat with deep reinforcement learning

    Autonomous decision-making in unmanned aerial vehicle (UVA) confrontations presents challenges in making optimal strategy. Therefore, deep reinforcement learning (DRL) has been adopted to address these issues....

    Luyu Jia, Chengtao Cai, **ngmei Wang, Zhengkun Ding, Junzheng Xu in Applied Intelligence (2023)

  5. No Access

    Article

    Convex hull regression strategy for people detection on top-view fisheye images

    Due to the severe distortion of the fisheye image, the rectangular bounding box contain a lot of invalid information. So the multi-point representation method are emerging. However, it will fail in some extrem...

    Rengjie Qiao, Chengtao Cai, Haiyang Meng, Kejun Wu, Feng Wang in The Visual Computer (2023)

  6. No Access

    Article

    PAII: A Pose Alignment Network with Information Interaction for Person Re-identification

    As an important part of intelligent surveillance systems, person re-identification (re-ID) has a wide range of application prospects in smart cities. However, due to occlusion, viewpoint variation, and backgro...

    Chunyan Lyu, Tong Xu, Wu Ning, Qi Cheng, Kejun Wang in Neural Processing Letters (2023)

  7. No Access

    Article

    Incorporating structured emotion commonsense knowledge and interpersonal relation into context-aware emotion recognition

    Traditional emotion recognition technology often focuses on recognizing human biometrics such as facial expressions or body postures. However, psychological research shows that the context (contextual informat...

    **g Chen, Tao Yang, Ziqiang Huang, Kejun Wang, Meichen Liu in Applied Intelligence (2023)

  8. No Access

    Chapter and Conference Paper

    U-TEN: An Unsupervised Two-Branch Enhancement Network for Object Detection Under Complex-Light Condition

    The goal of low-light enhancement is to improve the visual quality of dark regions in an image. However, the existing low-light enhancement methods always failed in nighttime traffic surveillance. The reason c...

    **aolei Luo, **aoxuan Ma, Song Hu, Kejun Wu, Jiang Tang, You Yang in Image and Graphics (2023)

  9. No Access

    Chapter

    Blockchain and Financial E-services

    Blockchain is an append-only digital database with a decentralized peer-to-peer framework. Motivated by tremendous attention from both academic and industrial communities since the emergence of cryptocurrency,...

    Hong Wan, Kejun Li, Yining Huang, Ling Zhang in Springer Handbook of Automation (2023)

  10. No Access

    Article

    Spline estimation of functional principal components via manifold conjugate gradient algorithm

    Functional principal component analysis has become the most important dimension reduction technique in functional data analysis. Based on B-spline approximation, functional principal components (FPCs) can be e...

    Shiyuan He, Hanxuan Ye, Kejun He in Statistics and Computing (2022)

  11. No Access

    Article

    Sun-sky model estimation from outdoor images

    When a virtual object is inserted into an outdoor image, the recovery of scene illumination has a critical effect on the mix of virtual objects and actual reality. There are two main parts of the object in the...

    **n **, Pengyue Deng, **nxin Li in Journal of Ambient Intelligence and Humani… (2022)

  12. No Access

    Article

    A multi-branch attention and alignment network for person re-identification

    Person re-identification plays a critical role in video surveillance and has a variety of applications. However, the body misalignment caused by detectors or pose changes sometimes makes it challenging to matc...

    Chunyan Lyu, Wu Ning, Chenhui Wang, Kejun Wang in Applied Intelligence (2022)

  13. No Access

    Article

    Lightweight network architecture using difference saliency maps for facial action unit detection

    Facial action unit (AU) detection has been applied in a wild range of fields, and has attracted great attention over the last decades. Most existing methods employ the predefined regions of interest with same ...

    **g Chen, Chenhui Wang, Kejun Wang, Meichen Liu in Applied Intelligence (2022)

  14. No Access

    Chapter and Conference Paper

    An Integrated Navigation Method for UAV Autonomous Landing Based on Inertial and Vision Sensors

    In the process of autonomous landing of unmanned aerial vehicles (UAV), the vision sensor is restricted by the field of view and UAV maneuvering process, which may make the acquired relative position/attitude ...

    Kejun Shang, **xi Li, Chongliang Liu, Li Ming, Guangfeng Hu in Artificial Intelligence (2022)

  15. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Method Based on MHSA-FL Model

    Confront the evaluation quality problems caused by high data dimension and imbalance between positive and negative samples in the network security situation, this paper proposes a new situation assessment meth...

    Kejun Zhang, **nrui Jiang, **nying Yu, Liwen Feng in Frontiers in Cyber Security (2022)

  16. Article

    Open Access

    Research on Material and Morphological Structure of Venus Flytrap Trigger Hair

    Venus flytrap can sense the very small insects that touch its tactile receptors, known as trigger hairs, and thus capture prey to maintain its nutrient demand. However, there are few studies on the trigger hai...

    Qian Wang, Kun Xu, Cheng Fan, Lining Sun, Lei Zhang in Journal of Bionic Engineering (2021)

  17. No Access

    Article

    HEU Emotion: a large-scale database for multimodal emotion recognition in the wild

    The study of affective computing in the wild setting is underpinned by databases. Existing multimodal emotion databases in the real-world conditions are few and small, with a limited number of subjects and exp...

    **g Chen, Chenhui Wang, Kejun Wang, Chaoqun Yin in Neural Computing and Applications (2021)

  18. No Access

    Article

    Segmentation mask-guided person image generation

    Background clutters and pose variation are the key factors which prevents the network from learning a robust Person re-identification (Re-ID) model. To address the problem above, we first introduce the binary ...

    Meichen Liu, **n Yan, Chenhui Wang, Kejun Wang in Applied Intelligence (2021)

  19. Article

    Open Access

    Crack-based and Hair-like Sensors Inspired from Arthropods: A Review

    Over a long period of time, arthropods evolve to have two excellent mechanical sensilla of slit sensilla and trichobothria sensilla, which construct a perfect perception system. The former mainly perceives the...

    Changchao Zhang, Junqiu Zhang, Daobing Chen, **ancun Meng in Journal of Bionic Engineering (2020)

  20. No Access

    Chapter and Conference Paper

    Optimal Location for Electric Vehicles Charging Stations Based on P-Median Model

    To some certain extent, the development of electric vehicles relies on the availability of infrastructure, especially charging facility. There have been a large amount of studies on the location of electric ve...

    Daxin Tian, Huiwen Yan, Xuting Duan, Yue Cao in Artificial Intelligence and Security (2020)

previous disabled Page of 3