Skip to main content

previous disabled Page of 145
and
  1. No Access

    Article

    A multi-scale no-reference video quality assessment method based on transformer

    Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing, improving advertising effectiveness, and strengthening security in m...

    Yingan Cui, Zonghua Yu, Yuqin Feng, Huaijun Wang, Junhuai Li in Multimedia Systems (2024)

  2. No Access

    Article

    Multi-party codebook distribution strategy based on secret sharing

    The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert communication. We propose a codebook distribution technique based on...

    Wei She, Haige Feng, Zhao Tian, **npeng Rong in International Journal of Information Secur… (2024)

  3. No Access

    Article

    An effective recognition of moving target seismic anomaly for security region based on deep bidirectional LSTM combined CNN

    Ground motion target recognition based on seismic signals is more convenient and efficient than traditional manual patrol identification. However, current high-precision identification methods are limited to s...

    Tongyu Nie, Sirui Wang, Yuqi Wang, Xunqian Tong in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    Dual-attention-based semantic-aware self-supervised monocular depth estimation

    Based on the assumption of photometric consistency, self-supervised monocular depth estimation has been widely studied due to the advantage of avoiding costly annotations. However, it is sensitive to noise, oc...

    **ze Xu, Feng Ye, Yizong Lai in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    GFSCompNet: remote sensing image compression network based on global feature-assisted segmentation

    The proliferation of remote sensing image data in recent years has posed a pressing need for efficient compression techniques due to constrained transmission bandwidth. While lossless compression preserves ima...

    Wenhui Ye, Weimin Lei, Wei Zhang, Tingting Yu in Multimedia Tools and Applications (2024)

  6. No Access

    Article

    Improving the generalization of face forgery detection via single domain augmentation

    In recent years, significant progress has been made in the field of face forgery and face forgery detection. However, the performance of the detection methods in the unknown environment is far beyond satisfact...

    Wenlong Li, Chunhui Feng, Lifang Wei, Dawei Wu in Multimedia Tools and Applications (2024)

  7. No Access

    Article

    FARLut: a two-stage tobacco foreign body detection model incorporating color information and attention mechanism

    Accurate detection and rejection of debris in tobacco products play an essential part in ensuring the quality of tobacco products. In recent years, the detection of detritus in the production process has been ...

    Jianglai Liang, Zhiyong Zeng, Gang Huang, Tong Li in Multimedia Tools and Applications (2024)

  8. No Access

    Article

    Dual enhanced semantic hashing for fast image retrieval

    As a highly promising technique in the field of similarity search, the hashing-based image retrieval algorithm has received continued attention in recent years because of its strong ability to efficiently prov...

    Sizhi Fang, Gengshen Wu, Yi Liu, **a Feng in Multimedia Tools and Applications (2024)

  9. No Access

    Article

    A survey on privacy-preserving federated learning against poisoning attacks

    Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training processes. This limitation hinders the server’s ability to ...

    Feng **a, Wenhao Cheng in Cluster Computing (2024)

  10. Article

    Retraction Note: Towards an adaptive human-centric computing resource management framework based on resource prediction and multi-objective genetic algorithm

    Si Zheng, GuoBin Zhu, Jie Zhang, Wei Feng in Multimedia Tools and Applications (2024)

  11. No Access

    Article

    An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors

    Some particular shaped datasets, such as manifold datasets, have restrictions on density peak clustering (DPC) performance. The main reason of variations in sample densities between clusters of data and uneven...

    Wei Hu, Ji Feng, Degang Yang in Cluster Computing (2024)

  12. No Access

    Article

    An image segmentation fusion algorithm based on density peak clustering and Markov random field

    Image segmentation is a crucial task in the field of computer vision. Markov random fields (MRF) based image segmentation method can effectively capture intricate relationships among pixels. However, MRF typic...

    Yuncong Feng, Wanru Liu, **aoli Zhang, **aoyan Zhu in Multimedia Tools and Applications (2024)

  13. No Access

    Article

    Tile-size aware bitrate allocation for adaptive 360 \(^{\circ }\) video streaming

    360 \(^{\circ }\) videos have becom...

    Jiawei Huang, Mingyue Liu, **gling Liu, Feng Gao in Multimedia Tools and Applications (2024)

  14. No Access

    Article

    Adaptive interactive network for RGB-T salient object detection with double map** transformer

    The purpose of RGB-Thermal salient object detection (RGB-T SOD) is to segment the common salient objects or regions of the visible light image and the corresponding thermal-infrared image. Thermal-infrared inf...

    Feng Dong, Yuxuan Wang, **chao Zhu, Yuehua Li in Multimedia Tools and Applications (2024)

  15. No Access

    Article

    Medical image segmentation model based on caputo fractional differential

    Medical image segmentation technology, as a key work of modern medical such as intelligent medical diagnosis, has attracted a lot of attention. However, the gray heterogeneity of medical images makes accurate ...

    Wenya Zhang, Yining Feng, Fang Lü, Chuanming Song in Multimedia Tools and Applications (2024)

  16. No Access

    Article

    An efficient and secure opto-cryptosystem for color medical images using 2D-SICM based fractional fourier transform

    Medical images contain sensitive information and are prone to various attacks during network transmission. Therefore, it is essential to develop a robust algorithm to ensure the safety of transmitting medical ...

    Rui-yun Chang, **u-fang Feng, Ze-hua Zhang, Hao Zhang in Multimedia Tools and Applications (2024)

  17. No Access

    Article

    MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile

    In recent years, Censorship and anti-censorship technology is develo** rapidly. The censorship and surveillance systems track traffic on the network; they identify protocols and traffic, block malicious and ...

    Shaoyong Li, Xueshu Hong, Yao Feng in Cluster Computing (2024)

  18. Article

    Open Access

    ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction

    Digital twin network (DTN) as an emerging network paradigm, have garnered growing attention. For large-scale networks, a crucial problem is how to effectively map physical networks onto the infrastructure plat...

    Hao Feng, Kun Cao, Gan Huang, Hao Liu in Journal of Cloud Computing (2024)

  19. No Access

    Article

    MTKGR: multi-task knowledge graph reasoning for food and ingredient recognition

    Food and ingredient recognition emerges as a pivotal challenge in the domain of computer vision, particularly pertinent to multimedia systems applications. To exploit the intricate relationships between foods ...

    Zhengquan Feng, **aochao Li, Yun Li in Multimedia Systems (2024)

  20. No Access

    Article

    MA-VLAD: a fine-grained local feature aggregation scheme for action recognition

    A recent trend in action recognition involves aggregating local features into a more compact representation to eliminate redundancy in video features while retaining essential components for recognition. An ex...

    Na Feng, Ying Tang, Zikai Song, Junqing Yu, Yi-** Phoebe Chen in Multimedia Systems (2024)

previous disabled Page of 145