Skip to main content

and
  1. No Access

    Article

    Deep cascaded action attention network for weakly-supervised temporal action localization

    Weakly-supervised temporal action localization (W-TAL) is to locate the boundaries of action instances and classify them in an untrimmed video, which is a challenging task due to only video-level labels during...

    Hui-fen **a, Yong-zhao Zhan in Multimedia Tools and Applications (2023)

  2. No Access

    Article

    Robust deflated canonical correlation analysis via feature factoring for multi-view image classification

    Canonical Correlation Analysis (CCA) and its kernel versions (KCCA) are well-known techniques adopted in feature representation and classification for images. However, their performances are significantly affe...

    Kai-fa Hui, Ernest Domanaanmwi Ganaa, Yong-zhao Zhan in Multimedia Tools and Applications (2021)

  3. No Access

    Article

    Improved combined invariant moment for moving targets classification

    Invariant moment is a highly concentrated and distortion invariant image features. The goal of multi-moving object characterization and classification methods is to find a suitable description of different kin...

    **ao-jun Chen, Jia Ke, Yong-zhao Zhan, in Multimedia Tools and Applications (2017)

  4. No Access

    Article

    A cloud computing architecture for characterization and classification of moving object

    Video surveillance big data contains a great deal of information about moving objects. Multi moving object characterization and classification methods is the main characteristics to find a suitable description...

    **ao-jun Chen, Jia Ke, Tian-ming Zhan, Wen-xin Wang in Multimedia Tools and Applications (2017)

  5. No Access

    Article

    Complex video event detection via pairwise fusion of trajectory and multi-label hypergraphs

    The video data is rich in motion event information. Detecting complex events and analyzing the inherent high-level semantics information have been a hot topic in video analysis and understanding. Detecting com...

    **ao-jun Chen, Yong-zhao Zhan, Jia Ke, **ao-bo Chen in Multimedia Tools and Applications (2016)

  6. No Access

    Article

    Using Kinect for real-time emotion recognition via facial expressions

    Emotion recognition via facial expressions (ERFE) has attracted a great deal of interest with recent advances in artificial intelligence and pattern recognition. Most studies are based on 2D images, and their ...

    Qi-rong Mao, **n-yu Pan, Yong-zhao Zhan in Frontiers of Information Technology & Elec… (2015)

  7. No Access

    Article

    A blind watermarking algorithm for 3D mesh models based on vertex curvature

    We propose a robust blind watermarking algorithm for three-dimensional (3D) mesh models based on vertex curvature to maintain good robustness and improve visual masking in 3D mesh models. In the embedding proc...

    Yong-zhao Zhan, Yan-ting Li, **n-yu Wang in Journal of Zhejiang University SCIENCE C (2014)

  8. No Access

    Article

    Speaker-independent speech emotion recognition by fusion of functional and accompanying paralanguage features

    Functional paralanguage includes considerable emotion information, and it is insensitive to speaker changes. To improve the emotion recognition accuracy under the condition of speaker-independence, a fusion me...

    Qi-rong Mao, **ao-lei Zhao, Zheng-wei Huang in Journal of Zhejiang University SCIENCE C (2013)

  9. No Access

    Article

    A New Classifier for Facial Expression Recognition: Fuzzy Buried Markov Model

    To overcome the disadvantage of classical recognition model that cannot perform well enough when there are some noises or lost frames in expression image sequences, a novel model called fuzzy buried Markov mod...

    Yong-Zhao Zhan, Ke-Yang Cheng, Ya-Bi Chen in Journal of Computer Science and Technology (2010)

  10. Article

    Open Access

    Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration

    Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will be failure by fault, intrusion, and the battery exhaustion. Node-failure tolerance is an acceptable method to ...

    Liang-Min Wang, Yuan-Bo Guo, Yong-Zhao Zhan in EURASIP Journal on Wireless Communications… (2010)

  11. No Access

    Article

    DRMR: Dynamic-ring-based multicast routing protocol for Ad hoc networks

    Recently a number of multicast routing protocols for ad hoc networks have been proposed, however, most of them do not provide proper tradeoffs between effectiveness, efficiency and scalability. In this paper, ...

    Yuan Zhou, Guang-Sheng Li, Yong-Zhao Zhan in Journal of Computer Science and Technology (2004)

  12. No Access

    Chapter and Conference Paper

    Enhancing the Content of the Intrusion Alerts Using Logic Correlation

    To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time ...

    Liang-Min Wang, Jian-Feng Ma, Yong-Zhao Zhan in Content Computing (2004)