![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
103 Result(s)
-
Chapter and Conference Paper
Research on Digital Maturity Evaluation Model of Public Hospitals
Building an evaluation model of digital maturity in public hospitals, combining the data management maturity model with the digital maturity model, evaluating the research progress of digital transformation in...
-
Chapter and Conference Paper
Efficient and Accurate Quantized Image Super-Resolution on Mobile NPUs, Mobile AI & AIM 2022 Challenge: Report
Image super-resolution is a common task on mobile and IoT devices, where one often needs to upscale and enhance low-resolution images and video frames. While numerous solutions have been proposed for this prob...
-
Chapter and Conference Paper
Revisiting TENT for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment
Test-time adaption is very effective at solving the domain shift problem where the training data and testing data are sampled from different domains. However, most test-time adaption methods made their success...
-
Chapter and Conference Paper
Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization
Semi-supervised learning, a system dedicated to making networks less dependent on labeled data, has become a popular paradigm due to its strong performance. A common approach is to use pseudo-labels with unlab...
-
Chapter and Conference Paper
Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape
The transferability of adversarial examples enables the black-box attacks and poses a threat to the application of deep neural networks in real-world, which has attracted great attention in recent years. Regar...
-
Chapter and Conference Paper
Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images
Object detection in aerial images is a challenging task due to the oriented and densely packed objects. However, densely packed objects constitute a significant characteristic of aerial images: objects are not...
-
Chapter and Conference Paper
Eventually-Consistent Replicated Relations and Updatable Views
Distributed systems have to live with weak consistency, such as eventual consistency, if high availability is the primary goal and network partitioning is unexceptional. Local-first applications are examples o...
-
Chapter and Conference Paper
Multi-view Geometry Distillation for Cloth-Changing Person ReID
Most person re-identification (ReID) methods aim at retrieving people with unchanged clothes. Meanwhile, fewer studies work on the cloth-inconsistency problem, which is more challenging but useful in the real ...
-
Chapter and Conference Paper
Cloth-Aware Center Cluster Loss for Cloth-Changing Person Re-identification
Person re-identification (Re-ID) has achieved great progress recently. However, it was limited by the inconsistency of clothes in the case of long-term person Re-ID. Cloth-changing person Re-ID focus on solvin...
-
Chapter and Conference Paper
Neural Watermarking for 3D Morphable Models
3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...
-
Chapter and Conference Paper
Capturing the Lighting Inconsistency for Deepfake Detection
The rapid development and widely spread of deepfake techniques have raised severe societal concerns. Thus detecting such forgery contents has become a hot research topic. Many deepfake detection methods have b...
-
Chapter and Conference Paper
Elastic Deep Learning Using Knowledge Distillation with Heterogeneous Computing Resources
In deep neural networks, using more layers and parameters generally improves the accuracy of the models, which get bigger. Such big models have high computational complexity and big memory requirements, which ...
-
Chapter and Conference Paper
Exploration of Optimized Teaching Mode in Applied Technology Colleges Under the Background of Big Data
Under the background of big data era, private universities should make big data not only a teaching tool and means for teachers, but also a teaching platform for students’ professional learning and practical t...
-
Chapter and Conference Paper
Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification
Graph-based models have achieved great success in person re-identification tasks recently, which compute the graph topology structure (affinities) among different people first and then pass the information acr...
-
Chapter and Conference Paper
X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency
Cross-certification plays a fundamental role in facilitating the interconnection between different root stores in public key infrastructure (PKI). However, the existing trust management schemes (e.g., certificate...
-
Chapter and Conference Paper
Bootstrapped Masked Autoencoders for Vision BERT Pretraining
We propose bootstrapped masked autoencoders (BootMAE), a new approach for vision BERT pretraining. BootMAE improves the original masked autoencoders (MAE) with two core designs: 1) momentum encoder that provid...
-
Chapter and Conference Paper
Noise Simulation-Based Deep Optical Watermarking
Digital watermarking is an important branch of information hiding, which effectively guarantees the robustness of embedded watermarks in distorted channels. To embed the watermark into the host carrier, tradit...
-
Chapter and Conference Paper
UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection
Intra-frame inconsistency has been proved to be effective for the generalization of face forgery detection. However, learning to focus on these inconsistency requires extra pixel-level forged location annotati...
-
Chapter and Conference Paper
PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing
Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...
-
Chapter and Conference Paper
Supporting Undo and Redo for Replicated Registers in Collaborative Applications
A collaborative application supporting eventual consistency may temporarily violate global invariant. Users may make mistakes. Undo and redo are a generic tool to restore global invariant and correct mistakes....