149 Result(s)
-
Chapter and Conference Paper
Cloth-Aware Center Cluster Loss for Cloth-Changing Person Re-identification
Person re-identification (Re-ID) has achieved great progress recently. However, it was limited by the inconsistency of clothes in the case of long-term person Re-ID. Cloth-changing person Re-ID focus on solvin...
-
Chapter and Conference Paper
Neural Watermarking for 3D Morphable Models
3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...
-
Chapter and Conference Paper
Capturing the Lighting Inconsistency for Deepfake Detection
The rapid development and widely spread of deepfake techniques have raised severe societal concerns. Thus detecting such forgery contents has become a hot research topic. Many deepfake detection methods have b...
-
Chapter and Conference Paper
Elastic Deep Learning Using Knowledge Distillation with Heterogeneous Computing Resources
In deep neural networks, using more layers and parameters generally improves the accuracy of the models, which get bigger. Such big models have high computational complexity and big memory requirements, which ...
-
Chapter and Conference Paper
Exploration of Optimized Teaching Mode in Applied Technology Colleges Under the Background of Big Data
Under the background of big data era, private universities should make big data not only a teaching tool and means for teachers, but also a teaching platform for students’ professional learning and practical t...
-
Chapter and Conference Paper
Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification
Graph-based models have achieved great success in person re-identification tasks recently, which compute the graph topology structure (affinities) among different people first and then pass the information acr...
-
Chapter and Conference Paper
X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency
Cross-certification plays a fundamental role in facilitating the interconnection between different root stores in public key infrastructure (PKI). However, the existing trust management schemes (e.g., certificate...
-
Chapter and Conference Paper
Bootstrapped Masked Autoencoders for Vision BERT Pretraining
We propose bootstrapped masked autoencoders (BootMAE), a new approach for vision BERT pretraining. BootMAE improves the original masked autoencoders (MAE) with two core designs: 1) momentum encoder that provid...
-
Chapter and Conference Paper
Noise Simulation-Based Deep Optical Watermarking
Digital watermarking is an important branch of information hiding, which effectively guarantees the robustness of embedded watermarks in distorted channels. To embed the watermark into the host carrier, tradit...
-
Chapter and Conference Paper
UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection
Intra-frame inconsistency has been proved to be effective for the generalization of face forgery detection. However, learning to focus on these inconsistency requires extra pixel-level forged location annotati...
-
Chapter and Conference Paper
PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing
Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...
-
Article
An ultrahigh-resolution image encryption algorithm using random super-pixel strategy
Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...
-
Article
AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening
X-ray baggage screening is a vitally important task to detect all kinds of threat objects at controlled access positions, which can prevent crime and guard personal safety. It is generally performed by screene...
-
Article
An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution
X-ray baggage inspection is an essential task to detect threat objects at important controlled access places, which can guard personal safety and prevent crime. Generally, it is carried out by screeners to vis...
-
Article
A centripetal collection image sensor (CCIS) based on back gate modulation achieving 1T submicron pixel
In this study, a novel centripetal collection image sensor based on FDSOI technology has been investigated. In the CCIS image sensor array, adjacent pixels in the same row share a common drain and source to av...
-
Chapter and Conference Paper
Supporting Undo and Redo for Replicated Registers in Collaborative Applications
A collaborative application supporting eventual consistency may temporarily violate global invariant. Users may make mistakes. Undo and redo are a generic tool to restore global invariant and correct mistakes....
-
Chapter and Conference Paper
Bone Marrow Cell Segmentation Based on Improved U-Net
Automatic segmentation of bone marrow cells plays an important role in the diagnosis of many blood diseases such as anemia and leukemia. Due to the complex morphology and wide variety of bone marrow cells, the...
-
Chapter and Conference Paper
HTCN: Harmonious Text Colorization Network for Visual-Textual Presentation Design
The selection of text color is a time-consuming and important aspect in the designing of visual-textual presentation layout. In this paper, we propose a novel deep neural network architecture for predicting te...
-
Chapter and Conference Paper
Talking Face Video Generation with Editable Expression
In rencent years, the convolutional neural network have been proved to be a great success in generating talking face. Existing methods have combined a single face image with speech to generate talking face vid...
-
Chapter and Conference Paper
Augmenting SQLite for Local-First Software
Local-first software aims at both the ability to work offline on local data and the ability to collaborate across multiple devices. CRDTs (conflict-free replicated data types) are abstractions for offline and ...