Skip to main content

previous disabled Page of 10
and
  1. No Access

    Article

    Spatially-Varying Illumination-Aware Indoor Harmonization

    In this paper, we address the problem of spatially-varying illumination-aware indoor harmonization. Existing image harmonization works either focus on extracting no more than 2D information (e.g., low-level st...

    Zhongyun Hu, Jiahao Li, Xue Wang, Qing Wang in International Journal of Computer Vision (2024)

  2. Article

    Open Access

    Multi-view Heterogeneous Graph Neural Networks for Node Classification

    Recently, with graph neural networks (GNNs) becoming a powerful technique for graph representation, many excellent GNN-based models have been proposed for processing heterogeneous graphs, which are termed Hete...

    ** Zeng, Fang-Yuan Lei, Chang-Dong Wang, Qing-Yun Dai in Data Science and Engineering (2024)

  3. No Access

    Article

    ZMNet: feature fusion and semantic boundary supervision for real-time semantic segmentation

    Feature fusion module is an essential component of real-time semantic segmentation networks to bridge the semantic gap among different feature layers. However, many networks are inefficient in multi-level feat...

    Ya Li, Ziming Li, Huiwang Liu, Qing Wang in The Visual Computer (2024)

  4. No Access

    Article

    ViDSOD-100: A New Dataset and a Baseline Model for RGB-D Video Salient Object Detection

    With the rapid development of depth sensor, more and more RGB-D videos could be obtained. Identifying the foreground in RGB-D videos is a fundamental and important task. However, the existing salient object de...

    Junhao Lin, Lei Zhu, Jiaxing Shen, Huazhu Fu in International Journal of Computer Vision (2024)

  5. Article

    Open Access

    Joint training with local soft attention and dual cross-neighbor label smoothing for unsupervised person re-identification

    Existing unsupervised person re-identification approaches fail to fully capture the fine-grained features of local regions, which can result in people with similar appearances and different identities being as...

    Qing Han, Longfei Li, Weidong Min, Qi Wang, Qingpeng Zeng in Computational Visual Media (2024)

  6. No Access

    Article

    Optimal Strategy for Aircraft Pursuit-evasion Games via Self-play Iteration

    In this paper, the pursuit-evasion game with state and control constraints is solved to achieve the Nash equilibrium of both the pursuer and the evader with an iterative self-play technique. Under the conditio...

    **n Wang, Qing-Lai Wei, Tao Li, Jie Zhang in Machine Intelligence Research (2024)

  7. Article

    Open Access

    Semantic Spectral Clustering with Contrastive Learning and Neighbor Mining

    Deep spectral clustering techniques are considered one of the most efficient clustering algorithms in data mining field. The similarity between instances and the disparity among classes are two critical factor...

    Nongxiao Wang, Xulun Ye, Jieyu Zhao, Qing Wang in Neural Processing Letters (2024)

  8. No Access

    Article

    Collaborative learning of supervision and correlation for generalized zero-shot extreme multi-label learning

    Generalized zero-shot extreme multi-label learning (GZXML) aims to predict relevant labels for unknown instances from a set of seen and unseen labels and is widely used in engineering applications. Since the s...

    Fei Zhao, Ran Tao, Wenhui Wang, Bo Cui, Yuting Xu, Qing Ai in Applied Intelligence (2024)

  9. Article

    Open Access

    Intuitionistic Fuzzy Extreme Learning Machine with the Truncated Pinball Loss

    Fuzzy extreme learning machine (FELM) is an effective algorithm for dealing with classification problems with noises, which uses a membership function to effectively suppress noise in data. However, FELM has t...

    Qingyun Gao, Qing Ai, Wenhui Wang in Neural Processing Letters (2024)

  10. Article

    Open Access

    DE3TC: Detecting Events with Effective Event Type Information and Context

    Event Detection (ED) is a crucial information extraction task that aims to identify the event triggers and classify them into predefined event types. However, most existing methods did not perform well when pr...

    Boyang Liu, Guozheng Rao, **n Wang, Li Zhang, Qing Cong in Neural Processing Letters (2024)

  11. No Access

    Article

    Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective

    Graph processing has been widely used in many scenarios, from scientific computing to artificial intelligence. Graph processing exhibits irregular computational parallelism and random memory accesses, unlike t...

    **ao-Fei Liao 廖小飞, Wen-Ju Zhao 赵文举 in Journal of Computer Science and Technology (2024)

  12. No Access

    Article

    Offline handwritten mathematical expression recognition based on YOLOv5s

    The error accumulation in traditional offline handwritten mathematical expression recognition (OHMER) becomes challenging, because of the two-dimensional structure and writing arbitrariness of offline handwrit...

    Fei Li, Hongbo Fang, Dengzhun Wang, Ruixin Liu, Qing Hou in The Visual Computer (2024)

  13. Article

    Open Access

    TLC-XML: Transformer with Label Correlation for Extreme Multi-label Text Classification

    Extreme multi-label text classification (XMTC) annotates related labels for unknown text from large-scale label sets. Transformer-based methods have become the dominant approach for solving the XMTC task due t...

    Fei Zhao, Qing Ai, **angna Li, Wenhui Wang, Qingyun Gao in Neural Processing Letters (2024)

  14. No Access

    Article

    Machine reading comprehension model based on query reconstruction technology and deep learning

    Machine reading comprehension is introduced to improve machines’ readability and understandability of human languages. This sophisticated version of natural language processing is used for testing and improvin...

    Pengming Wang, M. M. Kamruzzaman, Qing Chen in Neural Computing and Applications (2024)

  15. No Access

    Chapter and Conference Paper

    Joint Training or Not: An Exploration of Pre-trained Speech Models in Audio-Visual Speaker Diarization

    The scarcity of labeled audio-visual datasets is a constraint for training superior audio-visual speaker diarization systems. To improve the performance of audio-visual speaker diarization, we leverage pre-tra...

    Huan Zhao, Li Zhang, Yue Li, Yannan Wang, Hongji Wang in Man-Machine Speech Communication (2024)

  16. No Access

    Chapter and Conference Paper

    Consensusless Blockchain: A Promising High-Performance Blockchain Without Consensus

    Consensus is unnecessary when the truth is available. In this paper, we present a new perspective of rebuilding the blockchain without consensus. When the consensus phase is eliminated from a blockchain, trans...

    Jian Zheng, Qing Wang, Jianru Lin, Huawei Huang in Blockchain and Trustworthy Systems (2024)

  17. No Access

    Article

    Towards High-Resolution Specular Highlight Detection

    Specular highlight detection is an essential task with various applications in computer vision. This paper aims to detect specular highlights in single high-resolution images using deep learning while avoiding...

    Gang Fu, Qing Zhang, Lei Zhu, Qifeng Lin in International Journal of Computer Vision (2024)

  18. No Access

    Chapter and Conference Paper

    Construction and Evaluation of the Five-in-One Practice Teaching Model

    In response to the economic and social development of Tibet Autonomous Region and the demand for information technology construction in the new engineering era, this paper analyzes the communication engineerin...

    Zhicheng Dong, Donghong Cai, Yonghao Shi in Computer Science and Education. Educationa… (2024)

  19. No Access

    Article

    Principal relation component reasoning-enhanced social relation recognition

    Social relationships (SRs) are the basis of human life. Hence, the ability to accurately recognize interpersonal relations in public spaces based on visual observations helps policymakers improve mental health...

    Wang Tang, Linbo Qing, Lindong Li, Li Guo, Yonghong Peng in Applied Intelligence (2023)

  20. No Access

    Article

    ACKSNet: adaptive center keypoint selection for object detection

    Keypoint-based detectors generate a large number of false positives due to incorrect keypoint matching in the object detection task. In this paper, we propose an adaptive center keypoint selection method (ACKS...

    **ngzhu Liang, Lixin Wang, Wei Cheng, **nyun Yan, Qing Chen in The Visual Computer (2023)

previous disabled Page of 10