Search
Search Results
-
Poly-cam: high resolution class activation map for convolutional neural networks
The demand for explainable AI continues to rise alongside advancements in deep learning technology. Existing methods such as convolutional neural...
-
Short-term POI recommendation with personalized time-weighted latent ranking
In this paper, we formulate a novel Point-of-interest (POI) recommendation task to recommend a set of new POIs for visit in a short period following...
-
FastBeltNet: a dual-branch light-weight network for real-time conveyor belt edge detection
Belt conveyors are widely used in multiple industries, including coal, steel, port, power, metallurgy, and chemical, etc. One major challenge faced...
-
Undersampling based on generalized learning vector quantization and natural nearest neighbors for imbalanced data
Imbalanced datasets can adversely affect classifier performance. Conventional undersampling approaches may lead to the loss of essential information,...
-
YOLO-FGD: a fast lightweight PCB defect method based on FasterNet and the Gather-and-Distribute mechanism
With the rapid expansion of the electronics industry, the demand for high-quality printed circuit boards has surged. However, existing PCB defect...
-
A copy-move forgery detection technique using DBSCAN-based keypoint similarity matching
In an era marked by the contrast between information and disinformation, the ability to differentiate between authentic and manipulated images holds...
-
An improved classification diagnosis approach for cervical images based on deep neural networks
In order to enhance the speed and performance of cervical diagnosis, we propose an improved Residual Network (ResNet) by combining pyramid...
-
Dual model knowledge distillation for industrial anomaly detection
Unsupervised anomaly detection holds significant importance in large-scale industrial manufacturing. Recent methods have capitalized on the benefits...
-
Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning
Real-world face recognition systems are vulnerable to diverse face attacks, ranging from digitally manipulated artifacts to physically crafted...
-
Event-Driven Heterogeneous Network for Video Deraining
Restoring clear frames from rainy videos poses a significant challenge due to the swift motion of rain streaks. Traditional frame-based visual...
-
Discriminative binary pattern descriptor for face recognition
Among several local descriptors invented in literature, the local binary pattern (LBP) is the prolific one. Despite its advantages like low...
-
Class-structure preserving multi-view correlated discriminant analysis for multiblock data
With the rapid development in data acquisition methods, multiple data sources are now becoming available to explain different views of an object....
-
A New Look at the Dirichlet Distribution: Robustness, Clustering, and Both Together
Compositional data have peculiar characteristics that pose significant challenges to traditional statistical methods and models. Within this...
-
Computer-aided diagnosis of Alzheimer’s disease and neurocognitive disorders with multimodal Bi-Vision Transformer (BiViT)
Cognitive disorders affect various cognitive functions that can have a substantial impact on individual’s daily life. Alzheimer’s disease (AD) is one...
-
Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things
To improve the security of the Internet of Medical Things (IoMT) in healthcare, this paper offers a Federated Learning (FL)-guided Intrusion...
-
Towards scanning electron microscopy image denoising: a state-of-the-art overview, benchmark, taxonomies, and future direction
Scanning electron microscope (SEM) enables imaging of micro-nano scale objects. It is an analytical tool widely used in the material, earth and life...
-
Adversarial defence by learning differentiated feature representation in deep ensemble
Deep learning models have been shown to be vulnerable to critical attacks under adversarial conditions. Attackers are able to generate powerful...
-
Automatic Topic Title Assignment with Word Embedding
In this paper, we propose TAWE (title assignment with word embedding), a new method to automatically assign titles to topics inferred from sets of...
-
Sequential attention layer-wise fusion network for multi-view classification
Graph convolutional network has shown excellent performance in multi-view classification. Currently, to output a fused node embedding representation...