Skip to main content

previous disabled Page of 473
and
  1. No Access

    Article

    Math-LLMs: AI Cyberinfrastructure with Pre-trained Transformers for Math Education

    In recent years, the pre-training of Large Language Models (LLMs) in the educational domain has garnered significant attention. However, a discernible gap exists in the application of these models to mathemati...

    Fan Zhang, Chenglu Li, Owen Henkel in International Journal of Artificial Intell… (2024)

  2. Article

    Open Access

    Generation and Countermeasures of adversarial examples on vision: a survey

    Recent studies have found that deep learning models are vulnerable to adversarial examples, demonstrating that applying a certain imperceptible perturbation on clean examples can effectively deceive the well-t...

    Jiangfan Liu, Yishan Li, Yanming Guo, Yu Liu, Jun Tang in Artificial Intelligence Review (2024)

  3. No Access

    Article

    Development of a leech-inspired peristaltic crawling soft robot for intestine inspection

    The development of a non-destructive and patient-friendly method for examining the intestines is crucial for early prevention and timely diagnosis of prevalent intestinal diseases that pose a threat to human h...

    Gongxin Li, Mindong Wang, Yazhou Zhu in International Journal of Intelligent Robot… (2024)

  4. No Access

    Article

    Unsupervised diffusion based anomaly detection for time series

    Unsupervised anomaly detection aims to construct a model that effectively detects invisible anomalies by training and reconstruct normal data. While a significant amount of reconstruction-based methods has mad...

    Haiwei Zuo, Aiqun Zhu, Yan** Zhu, Yin** Liao, Shiman Li in Applied Intelligence (2024)

  5. No Access

    Article

    Computational intelligence and its dynamic development: statistical exploration, comprehensive evaluation and prospect expansion

    Computational intelligence (CI) has become one of the most useful and successful tools for dealing with uncertainties and complex problems in many fields, such as neural networks, genetic algorithms, and swarm...

    Bo Li, Zeshui Xu, **nxin Wang in Soft Computing (2024)

  6. Article

    Open Access

    Review of few-shot learning application in CSI human sensing

    Wi-Fi sensing has garnered increasing interest for its significant advantages, primarily leveraging Wi-Fi signal fluctuations induced by human activities and advanced neural network algorithms. However, its ap...

    Zhengjie Wang, Jianhang Li, Wenchao Wang, Zhaolei Dong in Artificial Intelligence Review (2024)

  7. No Access

    Article

    An extended power geometric technique for multiple-attribute decision-making under single-valued neutrosophic sets and applications to embedded computers’ performance evaluation

    Embedded computer systems refer to specialized computer systems that integrate operating systems and functional software into computer hardware systems, are application centric, based on computer technology, a...

    Yafang Li, Meng Zhang in Soft Computing (2024)

  8. Article

    Open Access

    Formal design, verification and implementation of robotic controller software via RoboChart and RoboTool

    Current practice in simulation and implementation of robot controllers is usually undertaken with guidance from high-level design diagrams and pseudocode. Thus, no rigorous connection between the design and th...

    Wei Li, Pedro Ribeiro, Alvaro Miyazawa, Richard Redpath in Autonomous Robots (2024)

  9. No Access

    Article

    Multi-scale modeling to investigate the effects of transcranial magnetic stimulation on morphologically-realistic neuron with depression

    Transcranial magnetic stimulation (TMS) is a non-invasive neuromodulation technique to activate or inhibit the activity of neurons, and thereby regulate their excitability. This technique has demonstrated pote...

    Licong Li, Shuaiyang Zhang, Hongbo Wang, Fukuan Zhang, Bin Dong in Cognitive Neurodynamics (2024)

  10. No Access

    Article

    CoFF-CHP: coarse-to-fine filters with concept heuristic prompt for few-shot relation classification

    Few-shot relation classification (RC) is a crucial task that aims to identify the relationships between entity pairs with limited mentions. However, this task is challenging due to the insufficient amount of a...

    Peihong Li, Shengze Hu, Jianming Zheng, Taihua Shao, Mengru Wang in Applied Intelligence (2024)

  11. Article

    Open Access

    Personalized hairstyle and hair color editing based on multi-feature fusion

    In the metaverse era, virtual design of hairstyle becomes very popular for personalized aesthetics. As hair design tasks can be decomposed into hair attribute editing and generation, the development of generat...

    Jiayi Xu, Chenming Zhang, Weikang Zhu, Hongbin Zhang, Li Li in The Visual Computer (2024)

  12. No Access

    Article

    DCSG: data complement pseudo-label refinement and self-guided pre-training for unsupervised person re-identification

    Existing unsupervised person re-identification (Re-ID) methods use clustering to generate pseudo-labels that are generally noisy, and initializing the model with ImageNet pre-training weights introduces a larg...

    Qing Han, Jiong** Chen, Weidong Min, Jiahao Li, Lixin Zhan in The Visual Computer (2024)

  13. No Access

    Article

    An automatic framework for quadrilateral surface reconstruction with partitions from 3D point clouds

    Currently, three-dimensional (3D) point clouds are widely used in the gaming and film industries. Inspired by the reverse process of polycube-based parametrical map**, we present an automatic framework that ...

    Shuyang Zhu, Youlong Li, Jizhao Liu, Bin Li in The Visual Computer (2024)

  14. No Access

    Article

    Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations

    This paper proposes a Robust Spatial-Temporal Graph Neural Network (RSTGNN), which overcomes the limitations faced by graph-based models against dynamic graph perturbations using robust spatial-temporal self-a...

    Zhuo Zeng, Chengliang Wang, Fei Ma, Xusheng Li, **nrun Chen in Computing (2024)

  15. No Access

    Article

    Strand-accurate multi-view facial hair reconstruction and tracking

    Accurate modeling of facial hair is crucial not only for reconstructing a clean-shaven face but also for enhancing realism when creating digital human avatars. Previous methods have primarily focused on recons...

    Hanchao Li, **nguo Liu in The Visual Computer (2024)

  16. No Access

    Article

    Benchmarking the Robustness of LiDAR Semantic Segmentation Models

    When using LiDAR semantic segmentation models for safety-critical applications such as autonomous driving, it is essential to understand and improve their robustness with respect to a large range of LiDAR corr...

    Xu Yan, Chaoda Zheng, Ying Xue, Zhen Li in International Journal of Computer Vision (2024)

  17. Article

    Open Access

    A method for visualizing urban road events using distributed acoustic sensing

    This study presents the construction of an urban underground sensing system using distributed acoustic sensing (DAS) technology, which utilizes the existing optical fiber infrastructure around urban roads for ...

    Shitong Hou, Yaojie Li, Gang Wu, Dong Wu, Yixuan Dong, Shuya Zhang in Urban Lifeline (2024)

  18. Article

    Open Access

    Few-shot anime pose transfer

    In this paper, we propose a few-shot method for pose transfer of anime characters—given a source image of an anime character and a target pose, we transfer the pose of the target to the source character. Despi...

    Pengjie Wang, Kang Yang, Chengzhi Yuan, Houjie Li, Wen Tang in The Visual Computer (2024)

  19. No Access

    Article

    Automated catastrophic optical damage inspection of semiconductor laser chip based on multi-scale strip convolution aggregation

    Catastrophic optical damage (COD) is one of the reasons limiting the output power and lifetime of semiconductor lasers. Nevertheless, the automatic defects inspection of the COD is a challenging task due to se...

    Shuai Guo, Dengao Li, Jumin Zhao, Huayu Jia in International Journal of Machine Learning … (2024)

  20. No Access

    Article

    Time series clustering of dynamical systems via deterministic learning

    A recent deterministic learning theory has achieved locally-accurate identification of unknown system dynamics. This article presents a novel application of deterministic learning theory to unsupervised learni...

    Chen Sun, Weiming Wu, Zirui Zhang, Zhirui Li in International Journal of Machine Learning … (2024)

previous disabled Page of 473