Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    Research on Digital Maturity Evaluation Model of Public Hospitals

    Building an evaluation model of digital maturity in public hospitals, combining the data management maturity model with the digital maturity model, evaluating the research progress of digital transformation in...

    Benhai Yu, Zishan Wang in E-Business. New Challenges and Opportuniti… (2024)

  2. No Access

    Chapter and Conference Paper

    Efficient and Accurate Quantized Image Super-Resolution on Mobile NPUs, Mobile AI & AIM 2022 Challenge: Report

    Image super-resolution is a common task on mobile and IoT devices, where one often needs to upscale and enhance low-resolution images and video frames. While numerous solutions have been proposed for this prob...

    Andrey Ignatov, Radu Timofte, Maurizio Denna in Computer Vision – ECCV 2022 Workshops (2023)

  3. No Access

    Chapter and Conference Paper

    Revisiting TENT for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment

    Test-time adaption is very effective at solving the domain shift problem where the training data and testing data are sampled from different domains. However, most test-time adaption methods made their success...

    Xuanpu Zhao, Qi Chu, Changtao Miao, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  4. No Access

    Chapter and Conference Paper

    Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization

    Semi-supervised learning, a system dedicated to making networks less dependent on labeled data, has become a popular paradigm due to its strong performance. A common approach is to use pseudo-labels with unlab...

    Guolin Zheng, Zuoyong Li, Wenkai Hu, Haoyi Fan in Machine Learning for Cyber Security (2023)

  5. No Access

    Chapter and Conference Paper

    Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape

    The transferability of adversarial examples enables the black-box attacks and poses a threat to the application of deep neural networks in real-world, which has attracted great attention in recent years. Regar...

    Yinhu Xu, Qi Chu, Haojie Yuan, Zixiang Luo, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  6. No Access

    Chapter

    Protecting Image Processing Networks via Model Watermarking

    Deep learning has achieved tremendous success in low-level computer vision tasks such as image processing tasks. To protect the intellectual property (IP) of such valuable image processing networks, the model ...

    Jie Zhang, Dongdong Chen, **g Liao in Digital Watermarking for Machine Learning … (2023)

  7. No Access

    Chapter and Conference Paper

    Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images

    Object detection in aerial images is a challenging task due to the oriented and densely packed objects. However, densely packed objects constitute a significant characteristic of aerial images: objects are not...

    Tingting Fang, Bin Liu, Zhiwei Zhao, Qi Chu, Nenghai Yu in Computer Vision – ACCV 2022 (2023)

  8. No Access

    Chapter and Conference Paper

    Eventually-Consistent Replicated Relations and Updatable Views

    Distributed systems have to live with weak consistency, such as eventual consistency, if high availability is the primary goal and network partitioning is unexceptional. Local-first applications are examples o...

    Joachim Thomassen, Weihai Yu in New Trends in Database and Information Systems (2023)

  9. No Access

    Chapter and Conference Paper

    Multi-view Geometry Distillation for Cloth-Changing Person ReID

    Most person re-identification (ReID) methods aim at retrieving people with unchanged clothes. Meanwhile, fewer studies work on the cloth-inconsistency problem, which is more challenging but useful in the real ...

    Hanlei Yu, Bin Liu, Yan Lu, Qi Chu, Nenghai Yu in Pattern Recognition and Computer Vision (2022)

  10. No Access

    Chapter and Conference Paper

    Cloth-Aware Center Cluster Loss for Cloth-Changing Person Re-identification

    Person re-identification (Re-ID) has achieved great progress recently. However, it was limited by the inconsistency of clothes in the case of long-term person Re-ID. Cloth-changing person Re-ID focus on solvin...

    Xulin Li, Bin Liu, Yan Lu, Qi Chu, Nenghai Yu in Pattern Recognition and Computer Vision (2022)

  11. No Access

    Chapter and Conference Paper

    Neural Watermarking for 3D Morphable Models

    3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...

    Feng Wang, Hang Zhou, Weiming Zhang in Advances in Artificial Intelligence and Se… (2022)

  12. No Access

    Chapter and Conference Paper

    Capturing the Lighting Inconsistency for Deepfake Detection

    The rapid development and widely spread of deepfake techniques have raised severe societal concerns. Thus detecting such forgery contents has become a hot research topic. Many deepfake detection methods have b...

    Wenxuan Wu, Wenbo Zhou, Weiming Zhang, Han Fang in Artificial Intelligence and Security (2022)

  13. No Access

    Chapter and Conference Paper

    Elastic Deep Learning Using Knowledge Distillation with Heterogeneous Computing Resources

    In deep neural networks, using more layers and parameters generally improves the accuracy of the models, which get bigger. Such big models have high computational complexity and big memory requirements, which ...

    Daxiang Dong, Ji Liu, ** Wang, Weibao Gong in Euro-Par 2021: Parallel Processing Worksho… (2022)

  14. No Access

    Chapter and Conference Paper

    Exploration of Optimized Teaching Mode in Applied Technology Colleges Under the Background of Big Data

    Under the background of big data era, private universities should make big data not only a teaching tool and means for teachers, but also a teaching platform for students’ professional learning and practical t...

    Hong** Li, **ao Han, Yujiao Tang, Yonghai Yu in Innovative Computing (2022)

  15. No Access

    Chapter and Conference Paper

    Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification

    Graph-based models have achieved great success in person re-identification tasks recently, which compute the graph topology structure (affinities) among different people first and then pass the information acr...

    Xulin Li, Yan Lu, Bin Liu, Yating Liu, Guojun Yin, Qi Chu in Computer Vision – ECCV 2022 (2022)

  16. No Access

    Chapter and Conference Paper

    X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency

    Cross-certification plays a fundamental role in facilitating the interconnection between different root stores in public key infrastructure (PKI). However, the existing trust management schemes (e.g., certificate...

    Shushang Wen, Bingyu Li, Ziqiang Ma in Applied Cryptography in Computer and Commu… (2022)

  17. No Access

    Chapter and Conference Paper

    Bootstrapped Masked Autoencoders for Vision BERT Pretraining

    We propose bootstrapped masked autoencoders (BootMAE), a new approach for vision BERT pretraining. BootMAE improves the original masked autoencoders (MAE) with two core designs: 1) momentum encoder that provid...

    **aoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen in Computer Vision – ECCV 2022 (2022)

  18. No Access

    Chapter and Conference Paper

    Noise Simulation-Based Deep Optical Watermarking

    Digital watermarking is an important branch of information hiding, which effectively guarantees the robustness of embedded watermarks in distorted channels. To embed the watermark into the host carrier, tradit...

    Feng Wang, Hang Zhou, Han Fang, Weiming Zhang in Artificial Intelligence and Security (2022)

  19. No Access

    Chapter and Conference Paper

    UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection

    Intra-frame inconsistency has been proved to be effective for the generalization of face forgery detection. However, learning to focus on these inconsistency requires extra pixel-level forged location annotati...

    Wanyi Zhuang, Qi Chu, Zhentao Tan, Qiankun Liu, Haojie Yuan in Computer Vision – ECCV 2022 (2022)

  20. No Access

    Chapter and Conference Paper

    PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing

    Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...

    Rui Luo, Yuanzhi Yao, Weihai Li, Nenghai Yu in Advances in Artificial Intelligence and Se… (2022)

previous disabled Page of 6