Skip to main content

previous disabled Page of 586
and
  1. No Access

    Chapter and Conference Paper

    Crowd Intelligence Driven Design Framework Based on Perception-Retrieval Cognitive Mechanism

    Currently, the use of crowd intelligence in which the knowledge from different disciplines is integrated for complex product design has attracted increasing attention from both academia and industry. However, ...

    Chen Zheng, Kangning Wang, Tengfei Sun in Product Lifecycle Management. PLM in Trans… (2023)

  2. No Access

    Chapter and Conference Paper

    InDNI: An Infection Time Independent Method for Diffusion Network Inference

    Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...

    Guoxin Chen, Yongqing Wang, Jiangli Shao, Boshen Shi, Huawei Shen in Information Retrieval (2023)

  3. No Access

    Chapter and Conference Paper

    PVT-COV19D: COVID-19 Detection Through Medical Image Classification Based on Pyramid Vision Transformer

    With the outbreak of COVID-19, a large number of relevant studies have emerged in recent years. We propose an automatic COVID-19 diagnosis model based on PVTv2 and the multiple voting mechanism. To accommodate...

    Lilang Zheng, Jiaxuan Fang, **aorun Tang in Computer Vision – ECCV 2022 Workshops (2023)

  4. No Access

    Chapter and Conference Paper

    EIMDC: A New Model for Designing Digital Twin Applications

    With the development of communications and big data, digital twin as a novel paradigm has been received insentive attentions. However, there are some huge challenges in designing digital twins due to the compl...

    **ang Wang, Haimin Hong, **g Zeng, Yongming Sun in Internet of Things – ICIOT 2022 (2023)

  5. No Access

    Chapter and Conference Paper

    An Effective Approach for Step**-Stone Intrusion Detection Using Packet Crossover

    An effective approach for step**-stone intrusion detection (SSID) is to estimate the length of a connection chain, which is referred to as the network-based detection approach. In this paper, we propose an e...

    Lixin Wang, Jianhua Yang, Austin Lee in Information Security Applications (2023)

  6. No Access

    Chapter and Conference Paper

    Natural-Annotation-Based Malay Multiword Expressions Extraction and Clustering

    Multiword expression (MWE) is an optimal granularity of language reuse. However, no explicit boundaries between MWEs and other words causes a serious problem on automatic identification of MWEs for some less c...

    Wuying Liu, Lin Wang in Computational Linguistics and Intelligent Text Processing (2023)

  7. No Access

    Chapter and Conference Paper

    Facilitating Construction Scene Understanding Knowledge Sharing and Reuse via Lifelong Site Object Detection

    Automatically recognizing diverse construction resources (e.g., workers and equipment) from construction scenes supports efficient and intelligent workplace management. Previous studies have focused on identifyin...

    Ruoxin **ong, Yuansheng Zhu, Yanyu Wang in Computer Vision – ECCV 2022 Workshops (2023)

  8. No Access

    Chapter and Conference Paper

    Parallel Skyline Query Processing of Massive Incomplete Activity-Trajectories Data

    The big spatial temporal data captured from technology tools produce massive amount of trajectories data collected from GPS devices. The top-k query was proposed by many researchers, on which they used distanc...

    Amina Belhassena, Wang Hongzhi in Model and Data Engineering (2023)

  9. No Access

    Chapter and Conference Paper

    TransPatch: A Transformer-based Generator for Accelerating Transferable Patch Generation in Adversarial Attacks Against Object Detection Models

    Patch-based adversarial attack shows the possibility to black-box physical attacks on state-of-the-art object detection models through hiding the occurrence of the objects, which causes a high risk in automate...

    **ghao Wang, Chenling Cui, Xuejun Wen, Jie Shi in Computer Vision – ECCV 2022 Workshops (2023)

  10. No Access

    Chapter and Conference Paper

    Spline-Based Dense Medial Descriptors for Image Simplification Using Saliency Maps

    Medial descriptors have attracted increasing interest in image representation, simplification, and compression. Recently, such descriptors have been separately used to (a) increase the local quality of represe...

    Jieying Wang, Leonardo de Melo in Computer Vision, Imaging and Computer Grap… (2023)

  11. No Access

    Chapter and Conference Paper

    Lane Change Classification and Prediction with Action Recognition Networks

    Anticipating lane change intentions of surrounding vehicles is crucial for efficient and safe driving decision making in an autonomous driving system. Previous works often adopt physical variables such as driv...

    Kai Liang, Jun Wang, Abhir Bhalerao in Computer Vision – ECCV 2022 Workshops (2023)

  12. No Access

    Chapter and Conference Paper

    SimpleTrack: Understanding and Rethinking 3D Multi-object Tracking

    3D multi-object tracking (MOT) has witnessed numerous novel benchmarks and approaches in recent years, especially those under the “tracking-by-detection” paradigm. Despite their progress and usefulness, an in-...

    Ziqi Pang, Zhichao Li, Naiyan Wang in Computer Vision – ECCV 2022 Workshops (2023)

  13. No Access

    Chapter and Conference Paper

    When CNN Meet with ViT: Towards Semi-supervised Learning for Multi-class Medical Image Semantic Segmentation

    Due to the lack of quality annotation in medical imaging community, semi-supervised learning methods are highly valued in image semantic segmentation tasks. In this paper, an advanced consistency-aware pseudo-...

    Ziyang Wang, Tianze Li, Jian-Qing Zheng in Computer Vision – ECCV 2022 Workshops (2023)

  14. No Access

    Chapter and Conference Paper

    CMC_v2: Towards More Accurate COVID-19 Detection with Discriminative Video Priors

    This paper presents our solution for the 2nd COVID-19 Competition, occurring in the framework of the AIMIA Workshop at the European Conference on Computer Vision (ECCV 2022). In our approach, we employ the win...

    Junlin Hou, Jilan Xu, Nan Zhang, Yi Wang in Computer Vision – ECCV 2022 Workshops (2023)

  15. No Access

    Chapter and Conference Paper

    A Deep Wavelet Network for High-Resolution Microscopy Hyperspectral Image Reconstruction

    Microscopy hyperspectral imaging (MHSI) integrates conventional imaging with spectroscopy to capture images through numbers of narrow spectral bands, and has attracted much attention in histopathology image an...

    Qian Wang, Zhao Chen in Computer Vision – ECCV 2022 Workshops (2023)

  16. No Access

    Chapter and Conference Paper

    Network Risk Assessment Method Based on Residual Risk Analysis

    The existing network security theory usually believes that “residual risks” are acceptable to a certain degree. However, the reality is that most attackers can enter the network by using the residual risks. Th...

    Hao **g, Peizhi Yan, Gang Wang, Jiewei Liu, Yige Fang in Internet of Things – ICIOT 2022 (2023)

  17. No Access

    Chapter and Conference Paper

    Recognition of Blinding Diseases from Ocular OCT Images Based on Deep Learning

    Age-Related Macular Degeneration (AMD) and Diabetes Macular Edema (DME) are eye diseases with the highest blinding rate. Optical Coherence Tomography (OCT) is widely used to diagnose different eye diseases. Ho...

    Rong Wang, Yaqi Wang, Weiquan Yu, Suiyu Zhang in Intelligent Robotics and Applications (2022)

  18. No Access

    Chapter and Conference Paper

    Cross-Domain Cross-Set Few-Shot Learning via Learning Compact and Aligned Representations

    Few-shot learning (FSL) aims to recognize novel queries with only a few support samples through leveraging prior knowledge from a base dataset. In this paper, we consider the domain shift problem in FSL and ai...

    Wentao Chen, Zhang Zhang, Wei Wang, Liang Wang, Zilei Wang in Computer Vision – ECCV 2022 (2022)

  19. No Access

    Chapter and Conference Paper

    Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning

    With the increasing amount of data, data privacy has drawn great concern in machine learning among the public. Federated Learning, which is a new kind of distributed learning framework, enables data providers ...

    Hongbo Cao, Yongsheng Zhu, Yuange Ren in Collaborative Computing: Networking, Appli… (2022)

  20. No Access

    Chapter and Conference Paper

    Trajectory Optimization in UAV Communication System Based on User-QoS

    Due to the mobility and flexibility of unmanned aerial vehicles (UAVs), the UAV communication networks can effectively support information transmission in the cellular networks. The purpose of this paper is to...

    Yikun Zou, Gang Wang, **long Wang, Haoyang Liu in Wireless and Satellite Systems (2022)

previous disabled Page of 586