Skip to main content

Page of 8
and
  1. No Access

    Chapter and Conference Paper

    Cloth-Aware Center Cluster Loss for Cloth-Changing Person Re-identification

    Person re-identification (Re-ID) has achieved great progress recently. However, it was limited by the inconsistency of clothes in the case of long-term person Re-ID. Cloth-changing person Re-ID focus on solvin...

    Xulin Li, Bin Liu, Yan Lu, Qi Chu, Nenghai Yu in Pattern Recognition and Computer Vision (2022)

  2. No Access

    Chapter and Conference Paper

    Neural Watermarking for 3D Morphable Models

    3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...

    Feng Wang, Hang Zhou, Weiming Zhang in Advances in Artificial Intelligence and Se… (2022)

  3. No Access

    Chapter and Conference Paper

    Capturing the Lighting Inconsistency for Deepfake Detection

    The rapid development and widely spread of deepfake techniques have raised severe societal concerns. Thus detecting such forgery contents has become a hot research topic. Many deepfake detection methods have b...

    Wenxuan Wu, Wenbo Zhou, Weiming Zhang, Han Fang in Artificial Intelligence and Security (2022)

  4. No Access

    Chapter and Conference Paper

    Elastic Deep Learning Using Knowledge Distillation with Heterogeneous Computing Resources

    In deep neural networks, using more layers and parameters generally improves the accuracy of the models, which get bigger. Such big models have high computational complexity and big memory requirements, which ...

    Daxiang Dong, Ji Liu, ** Wang, Weibao Gong in Euro-Par 2021: Parallel Processing Worksho… (2022)

  5. No Access

    Chapter and Conference Paper

    Exploration of Optimized Teaching Mode in Applied Technology Colleges Under the Background of Big Data

    Under the background of big data era, private universities should make big data not only a teaching tool and means for teachers, but also a teaching platform for students’ professional learning and practical t...

    Hong** Li, **ao Han, Yujiao Tang, Yonghai Yu in Innovative Computing (2022)

  6. No Access

    Chapter and Conference Paper

    Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification

    Graph-based models have achieved great success in person re-identification tasks recently, which compute the graph topology structure (affinities) among different people first and then pass the information acr...

    Xulin Li, Yan Lu, Bin Liu, Yating Liu, Guojun Yin, Qi Chu in Computer Vision – ECCV 2022 (2022)

  7. No Access

    Chapter and Conference Paper

    X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency

    Cross-certification plays a fundamental role in facilitating the interconnection between different root stores in public key infrastructure (PKI). However, the existing trust management schemes (e.g., certificate...

    Shushang Wen, Bingyu Li, Ziqiang Ma in Applied Cryptography in Computer and Commu… (2022)

  8. No Access

    Chapter and Conference Paper

    Bootstrapped Masked Autoencoders for Vision BERT Pretraining

    We propose bootstrapped masked autoencoders (BootMAE), a new approach for vision BERT pretraining. BootMAE improves the original masked autoencoders (MAE) with two core designs: 1) momentum encoder that provid...

    **aoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen in Computer Vision – ECCV 2022 (2022)

  9. No Access

    Chapter and Conference Paper

    Noise Simulation-Based Deep Optical Watermarking

    Digital watermarking is an important branch of information hiding, which effectively guarantees the robustness of embedded watermarks in distorted channels. To embed the watermark into the host carrier, tradit...

    Feng Wang, Hang Zhou, Han Fang, Weiming Zhang in Artificial Intelligence and Security (2022)

  10. No Access

    Chapter and Conference Paper

    UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection

    Intra-frame inconsistency has been proved to be effective for the generalization of face forgery detection. However, learning to focus on these inconsistency requires extra pixel-level forged location annotati...

    Wanyi Zhuang, Qi Chu, Zhentao Tan, Qiankun Liu, Haojie Yuan in Computer Vision – ECCV 2022 (2022)

  11. No Access

    Chapter and Conference Paper

    PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing

    Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...

    Rui Luo, Yuanzhi Yao, Weihai Li, Nenghai Yu in Advances in Artificial Intelligence and Se… (2022)

  12. No Access

    Article

    An ultrahigh-resolution image encryption algorithm using random super-pixel strategy

    Almost all existing image encryption algorithms are only suitable for low-resolution images in the standard image library. When they are used to encrypt high-resolution images, they will inevitably suffer from...

    Wei Zhang, Weijie Han, Zhiliang Zhu, Hai Yu in Multimedia Tools and Applications (2021)

  13. No Access

    Article

    AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening

    X-ray baggage screening is a vitally important task to detect all kinds of threat objects at controlled access positions, which can prevent crime and guard personal safety. It is generally performed by screene...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  14. No Access

    Article

    An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution

    X-ray baggage inspection is an essential task to detect threat objects at important controlled access places, which can guard personal safety and prevent crime. Generally, it is carried out by screeners to vis...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  15. No Access

    Article

    A centripetal collection image sensor (CCIS) based on back gate modulation achieving 1T submicron pixel

    In this study, a novel centripetal collection image sensor based on FDSOI technology has been investigated. In the CCIS image sensor array, adjacent pixels in the same row share a common drain and source to av...

    Liqiao Liu, Guihai Yu, Gang Du, **aoyan Liu in Science China Information Sciences (2021)

  16. No Access

    Chapter and Conference Paper

    Supporting Undo and Redo for Replicated Registers in Collaborative Applications

    A collaborative application supporting eventual consistency may temporarily violate global invariant. Users may make mistakes. Undo and redo are a generic tool to restore global invariant and correct mistakes....

    Eric Brattli, Weihai Yu in Cooperative Design, Visualization, and Engineering (2021)

  17. No Access

    Chapter and Conference Paper

    Bone Marrow Cell Segmentation Based on Improved U-Net

    Automatic segmentation of bone marrow cells plays an important role in the diagnosis of many blood diseases such as anemia and leukemia. Due to the complex morphology and wide variety of bone marrow cells, the...

    Lingmin **, Zhaochai Yu, Haoyi Fan, Shenghua Teng, Zuoyong Li in Data Mining and Big Data (2021)

  18. No Access

    Chapter and Conference Paper

    HTCN: Harmonious Text Colorization Network for Visual-Textual Presentation Design

    The selection of text color is a time-consuming and important aspect in the designing of visual-textual presentation layout. In this paper, we propose a novel deep neural network architecture for predicting te...

    Xuyong Yang, **aobin Xu, Yaohong Huang in Pattern Recognition and Computer Vision (2021)

  19. No Access

    Chapter and Conference Paper

    Talking Face Video Generation with Editable Expression

    In rencent years, the convolutional neural network have been proved to be a great success in generating talking face. Existing methods have combined a single face image with speech to generate talking face vid...

    Luchuan Song, Bin Liu, Nenghai Yu in Image and Graphics (2021)

  20. No Access

    Chapter and Conference Paper

    Augmenting SQLite for Local-First Software

    Local-first software aims at both the ability to work offline on local data and the ability to collaborate across multiple devices. CRDTs (conflict-free replicated data types) are abstractions for offline and ...

    Iver Toft Tomter, Weihai Yu in New Trends in Database and Information Systems (2021)

Page of 8