Skip to main content

previous disabled Page of 8
and
  1. No Access

    Article

    A Cellular Automaton Approach for Efficient Computing on Surface Chemical Reaction Networks

    A surface chemical reaction network (sCRN, Qian and Winfree in DNA Computing and Molecular Programming: 20th International Conference, DNA 20, Kyoto, Japan, September 22–26, 2014. Proceedings 20. Springer, 201...

    Sihai Yu, Wenli Xu, Jia Lee, Teijiro Isokawa in New Generation Computing (2024)

  2. No Access

    Article

    Universality of a surface chemical reaction network using only bi-molecular reactions

    In recent years, a novel molecular computation model known as surface chemical reaction network (Qian, In: DNA computing and molecular programming: 20th international conference, DNA 20, Proceedings, 2014) has...

    Sihai Yu, Jia Lee, Teijiro Isokawa in Journal of Membrane Computing (2024)

  3. No Access

    Article

    (kn) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability

    In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...

    Fei Hu, Weihai Li, Nenghai Yu in Multimedia Tools and Applications (2024)

  4. No Access

    Chapter and Conference Paper

    Research on Digital Maturity Evaluation Model of Public Hospitals

    Building an evaluation model of digital maturity in public hospitals, combining the data management maturity model with the digital maturity model, evaluating the research progress of digital transformation in...

    Benhai Yu, Zishan Wang in E-Business. New Challenges and Opportuniti… (2024)

  5. Article

    Correction to: Multibranch multilevel federated learning for a better feature extraction and a plug-and-play dynamic-adjusting double flow personalization approach

    Maoye Ren, **nhai Yu in Applied Intelligence (2023)

  6. No Access

    Article

    DBA-UNet: a double U-shaped boundary attention network for maxillary sinus anatomical structure segmentation in CBCT images

    Accurate identification of the maxillary sinus and maxillary sinus septum on cone beam computed tomography (CBCT) is essential for appropriate surgical methods. However, the large-scale gap and the prior knowl...

    Yi Zhang, Kun Qian, Zhiyuan Zhu, Hai Yu, Bo Zhang in Signal, Image and Video Processing (2023)

  7. No Access

    Article

    Multibranch multilevel federated learning for a better feature extraction and a plug-and-play dynamic-adjusting double flow personalization approach

    Federated learning (FL) is an emerging technique used to preserve the privacy of users’ data in training by a distributed machine learning approach. Previously, a client-edge-cloud hierarchical federated learn...

    Maoye Ren, **nhai Yu in Applied Intelligence (2023)

  8. No Access

    Chapter and Conference Paper

    Efficient and Accurate Quantized Image Super-Resolution on Mobile NPUs, Mobile AI & AIM 2022 Challenge: Report

    Image super-resolution is a common task on mobile and IoT devices, where one often needs to upscale and enhance low-resolution images and video frames. While numerous solutions have been proposed for this prob...

    Andrey Ignatov, Radu Timofte, Maurizio Denna in Computer Vision – ECCV 2022 Workshops (2023)

  9. No Access

    Chapter and Conference Paper

    Revisiting TENT for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment

    Test-time adaption is very effective at solving the domain shift problem where the training data and testing data are sampled from different domains. However, most test-time adaption methods made their success...

    Xuanpu Zhao, Qi Chu, Changtao Miao, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  10. No Access

    Chapter and Conference Paper

    Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization

    Semi-supervised learning, a system dedicated to making networks less dependent on labeled data, has become a popular paradigm due to its strong performance. A common approach is to use pseudo-labels with unlab...

    Guolin Zheng, Zuoyong Li, Wenkai Hu, Haoyi Fan in Machine Learning for Cyber Security (2023)

  11. No Access

    Chapter and Conference Paper

    Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape

    The transferability of adversarial examples enables the black-box attacks and poses a threat to the application of deep neural networks in real-world, which has attracted great attention in recent years. Regar...

    Yinhu Xu, Qi Chu, Haojie Yuan, Zixiang Luo, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  12. No Access

    Chapter

    Protecting Image Processing Networks via Model Watermarking

    Deep learning has achieved tremendous success in low-level computer vision tasks such as image processing tasks. To protect the intellectual property (IP) of such valuable image processing networks, the model ...

    Jie Zhang, Dongdong Chen, **g Liao in Digital Watermarking for Machine Learning … (2023)

  13. No Access

    Chapter and Conference Paper

    Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images

    Object detection in aerial images is a challenging task due to the oriented and densely packed objects. However, densely packed objects constitute a significant characteristic of aerial images: objects are not...

    Tingting Fang, Bin Liu, Zhiwei Zhao, Qi Chu, Nenghai Yu in Computer Vision – ACCV 2022 (2023)

  14. No Access

    Chapter and Conference Paper

    Eventually-Consistent Replicated Relations and Updatable Views

    Distributed systems have to live with weak consistency, such as eventual consistency, if high availability is the primary goal and network partitioning is unexceptional. Local-first applications are examples o...

    Joachim Thomassen, Weihai Yu in New Trends in Database and Information Systems (2023)

  15. Article

    Open Access

    Deep 3D mesh watermarking with self-adaptive robustness

    Robust 3D mesh watermarking is a traditional research topic in computer graphics, which provides an efficient solution to the copyright protection for 3D meshes. Traditionally, researchers need manually design wa...

    Feng Wang, Hang Zhou, Han Fang, Weiming Zhang, Nenghai Yu in Cybersecurity (2022)

  16. No Access

    Article

    Co-optimization strategy between array operation and weight map** for flash computing arrays to achieve high computing efficiency and accuracy

    In this study, we propose a co-optimization method of array operation and weight map** for flash computing arrays to improve computing efficiency and accuracy. The proposed co-optimization can minimize the r...

    Guihai Yu, Peng Huang, Runze Han, Lixia Han in Science China Information Sciences (2022)

  17. No Access

    Article

    \(\hbox {ABDF}^{2}\) -Net: an adaptive bi-directional features fusion network for real-time detection of threat object

    To achieve automatic detection of threat objects for X-ray baggage screening, we propose an adaptive bi-directional features fusion network ( $...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2022)

  18. No Access

    Article

    Certified defense against patch attacks via mask-guided randomized smoothing

    The adversarial patch is a practical and effective method that modifies a small region on an image, making DNNs fail to classify. Existing empirical defenses against adversarial patch attacks lack theoretical ...

    Kui Zhang, Hang Zhou, Huanyu Bian, Weiming Zhang in Science China Information Sciences (2022)

  19. No Access

    Article

    Devising optimal integration test orders using cost–benefit analysis

    Integration testing is an integral part of software testing. Prior studies have focused on reducing test cost in integration test order generation. However, there are no studies concerning the testing prioriti...

    Fanyi Meng 孟繁祎, Ying Wang 王莹, Hai Yu 于海 in Frontiers of Information Technology & Elec… (2022)

  20. No Access

    Chapter and Conference Paper

    Multi-view Geometry Distillation for Cloth-Changing Person ReID

    Most person re-identification (ReID) methods aim at retrieving people with unchanged clothes. Meanwhile, fewer studies work on the cloth-inconsistency problem, which is more challenging but useful in the real ...

    Hanlei Yu, Bin Liu, Yan Lu, Qi Chu, Nenghai Yu in Pattern Recognition and Computer Vision (2022)

previous disabled Page of 8