Skip to main content

previous disabled Page of 113
and
  1. No Access

    Article

    Adaptive Multi-Source Predictor for Zero-Shot Video Object Segmentation

    Static and moving objects often occur in real-life videos. Most video object segmentation methods only focus on extracting and exploiting motion cues to perceive moving objects. Once faced with the frames of s...

    **aoqi Zhao, Shijie Chang, Youwei Pang in International Journal of Computer Vision (2024)

  2. No Access

    Article

    UniMod1K: Towards a More Universal Large-Scale Dataset and Benchmark for Multi-modal Learning

    The emergence of large-scale high-quality datasets has stimulated the rapid development of deep learning in recent years. However, most computer vision tasks focus on the visual modality only, resulting in a h...

    Xue-Feng Zhu, Tianyang Xu, Zongtao Liu in International Journal of Computer Vision (2024)

  3. No Access

    Article

    Learning Feature Restoration Transformer for Robust Dehazing Visual Object Tracking

    In recent years, deep-learning-based visual object tracking has obtained promising results. However, a drastic performance drop is observed when transferring a pre-trained model to changing weather conditions,...

    Tianyang Xu, Yifan Pan, Zhenhua Feng in International Journal of Computer Vision (2024)

  4. Article

    Open Access

    Hierarchical fuzzy regression functions for mixed predictors and an application to real estate price prediction

    Categorical features appear in datasets from almost every practice area, including real estate datasets. One of the most critical handicaps of machine learning algorithms is that they are not designed to captu...

    Haydar Demirhan, Furkan Baser in Neural Computing and Applications (2024)

  5. No Access

    Article

    Learning Adaptive Spatio-Temporal Inference Transformer for Coarse-to-Fine Animal Visual Tracking: Algorithm and Benchmark

    Advanced general visual object tracking models have been drastically developed with the access of large annotated datasets and progressive network architectures. However, a general tracker always suffers domai...

    Tianyang Xu, Ze Kang, Xuefeng Zhu, **ao-Jun Wu in International Journal of Computer Vision (2024)

  6. No Access

    Article

    Artificial Immune System of Secure Face Recognition Against Adversarial Attacks

    Deep learning-based face recognition models are vulnerable to adversarial attacks. In contrast to general noises, the presence of imperceptible adversarial noises can lead to catastrophic errors in deep face r...

    Min Ren, Yunlong Wang, Yuhao Zhu in International Journal of Computer Vision (2024)

  7. No Access

    Article

    Learning Spatiotemporal Inconsistency via Thumbnail Layout for Face Deepfake Detection

    The deepfake threats to society and cybersecurity have provoked significant public apprehension, driving intensified efforts within the realm of deepfake video detection. Current video-level methods are mostly...

    Yuting Xu, Jian Liang, Lijun Sheng in International Journal of Computer Vision (2024)

  8. No Access

    Article

    ROMOT: Referring-expression-comprehension open-set multi-object tracking

    Traditional multi-object tracking is limited to tracking a predefined set of categories, whereas open-vocabulary tracking expands its capabilities to track novel categories. In this paper, we propose ROMOT (re...

    Wei Li, Bowen Li, **gqi Wang, Weiliang Meng, Jiguang Zhang in The Visual Computer (2024)

  9. No Access

    Article

    Hybrid arithmetic optimization algorithm with deep transfer learning based microarray gene expression classification model

    Microarray gene expression (MGE) data classification is a vital challenge in biomedical and genomics research, designed to understand the difficult relations among genes and numerous biological states. In this...

    B. Shyamala Gowri, S. Anu H. Nair in International Journal of Information Techn… (2024)

  10. No Access

    Article

    An adaptive learning paradigm: event detection through a novel dynamic arithmetic optimization-based ensemble SVM for data stream classification

    Data stream mining is the process of generating continuous data stream records such as internet search, phone conversations, sensor data, etc. However it performs huge tasks such as frequency counting, cluster...

    R. Mary Vidya, M. Ramakrishna in International Journal of Information Technology (2024)

  11. Article

    Editorial June 2024 ( Vol 40, Issue 6)

    Nadia Magnenat-Thalmann in The Visual Computer (2024)

  12. No Access

    Article

    Reinforcement learning-based approach for plastic texture surface defects inspection

    This paper proposes a novel data-enhanced virtual texture generation network for use in deep learning detection systems. The current methods of data enhancement, such as image flip**, scaling ratios, or Gene...

    Chao-Ching Ho, Yuan-Cheng Chiao, Eugene Su in The Visual Computer (2024)

  13. No Access

    Article

    DMA-YOLO: multi-scale object detection method with attention mechanism for aerial images

    Unmanned aerial vehicles are increasingly popular due to their ease of operation, low noise, and portability. However, existing object detection methods perform poorly in detecting small targets in densely arr...

    Ya-ling Li, Yong Feng, Ming-liang Zhou, **an-cai **ong in The Visual Computer (2024)

  14. No Access

    Article

    Image retrieval using underlying importance feature histogram

    Deep features can exhibit superior retrieval performance than low-level features. However, low-level features (e.g. colour and orientation) can be extracted by generally imitating the human visual perceptual s...

    Qiao-** He, Guang-Hai Liu in Neural Computing and Applications (2024)

  15. No Access

    Article

    Radical-attended and Pinyin-attended malicious long-tail keywords detection

    Netizens all over the world can search malicious websites by malicious long-tail keywords on search engines, but malicious websites are strictly prohibited by law in most countries, so the construction of shor...

    Guoying Sun, Zhaoxin Zhang in Neural Computing and Applications (2024)

  16. No Access

    Article

    Towards Diverse Binary Segmentation via a Simple yet General Gated Network

    In many binary segmentation tasks, most CNNs-based methods use a U-shape encoder-decoder network as their basic structure. They ignore two key problems when the encoder exchanges information with the decoder: ...

    **aoqi Zhao, Youwei Pang, Lihe Zhang in International Journal of Computer Vision (2024)

  17. No Access

    Article

    A Spatio-Temporal Robust Tracker with Spatial-Channel Transformer and Jitter Suppression

    The robustness of visual object tracking is reflected not only in the accuracy of the target localisation in every single frame, but also in the smoothness of the predicted motion of the tracked object across ...

    Shaochuan Zhao, Tianyang Xu, **ao-Jun Wu in International Journal of Computer Vision (2024)

  18. No Access

    Article

    Robot-based therapy for improving academic skills of children with autism

    Robots are being employed more as mediators between therapists and children with autism. This paper proposes a robot-based therapeutic method that uses the NAO robot, a developed mobile application called Auti...

    Fadi Abu-Amara, Heba Mohammad in International Journal of Information Techn… (2024)

  19. No Access

    Article

    A registration algorithm for the infrared and visible images of apple based on active contour model

    To study the fruit image fusion technology in the case of thermal infrared and visible heterogeneous sources and the method of online defect detection on fruit fusion images, this paper takes apple as the rese...

    Hai** Si, Yunpeng Wang, Qian Liu, Weixia Li, Li Wan, Jiazhen Song in The Visual Computer (2024)

  20. No Access

    Article

    Multi-threshold image segmentation algorithm based on Aquila optimization

    Aquila Optimization (AO) is a recently proposed meta-heuristic algorithm, which has been proved to be more competitive than other meta-heuristic algorithms in function optimization and practical applications. ...

    Hairu Guo, **’ge Wang, Yongli Liu in The Visual Computer (2024)

previous disabled Page of 113