Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    DBA-UNet: a double U-shaped boundary attention network for maxillary sinus anatomical structure segmentation in CBCT images

    Accurate identification of the maxillary sinus and maxillary sinus septum on cone beam computed tomography (CBCT) is essential for appropriate surgical methods. However, the large-scale gap and the prior knowl...

    Yi Zhang, Kun Qian, Zhiyuan Zhu, Hai Yu, Bo Zhang in Signal, Image and Video Processing (2023)

  2. No Access

    Chapter and Conference Paper

    Efficient and Accurate Quantized Image Super-Resolution on Mobile NPUs, Mobile AI & AIM 2022 Challenge: Report

    Image super-resolution is a common task on mobile and IoT devices, where one often needs to upscale and enhance low-resolution images and video frames. While numerous solutions have been proposed for this prob...

    Andrey Ignatov, Radu Timofte, Maurizio Denna in Computer Vision – ECCV 2022 Workshops (2023)

  3. No Access

    Chapter and Conference Paper

    Revisiting TENT for Test-Time Adaption Semantic Segmentation and Classification Head Adjustment

    Test-time adaption is very effective at solving the domain shift problem where the training data and testing data are sampled from different domains. However, most test-time adaption methods made their success...

    Xuanpu Zhao, Qi Chu, Changtao Miao, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  4. No Access

    Chapter and Conference Paper

    Enhancing Adversarial Transferability from the Perspective of Input Loss Landscape

    The transferability of adversarial examples enables the black-box attacks and poses a threat to the application of deep neural networks in real-world, which has attracted great attention in recent years. Regar...

    Yinhu Xu, Qi Chu, Haojie Yuan, Zixiang Luo, Bin Liu, Nenghai Yu in Image and Graphics (2023)

  5. No Access

    Chapter and Conference Paper

    Affinity-Aware Relation Network for Oriented Object Detection in Aerial Images

    Object detection in aerial images is a challenging task due to the oriented and densely packed objects. However, densely packed objects constitute a significant characteristic of aerial images: objects are not...

    Tingting Fang, Bin Liu, Zhiwei Zhao, Qi Chu, Nenghai Yu in Computer Vision – ACCV 2022 (2023)

  6. No Access

    Article

    \(\hbox {ABDF}^{2}\) -Net: an adaptive bi-directional features fusion network for real-time detection of threat object

    To achieve automatic detection of threat objects for X-ray baggage screening, we propose an adaptive bi-directional features fusion network ( $...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2022)

  7. No Access

    Chapter and Conference Paper

    Counterfactual Intervention Feature Transfer for Visible-Infrared Person Re-identification

    Graph-based models have achieved great success in person re-identification tasks recently, which compute the graph topology structure (affinities) among different people first and then pass the information acr...

    Xulin Li, Yan Lu, Bin Liu, Yating Liu, Guojun Yin, Qi Chu in Computer Vision – ECCV 2022 (2022)

  8. No Access

    Chapter and Conference Paper

    Bootstrapped Masked Autoencoders for Vision BERT Pretraining

    We propose bootstrapped masked autoencoders (BootMAE), a new approach for vision BERT pretraining. BootMAE improves the original masked autoencoders (MAE) with two core designs: 1) momentum encoder that provid...

    **aoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen in Computer Vision – ECCV 2022 (2022)

  9. No Access

    Chapter and Conference Paper

    UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection

    Intra-frame inconsistency has been proved to be effective for the generalization of face forgery detection. However, learning to focus on these inconsistency requires extra pixel-level forged location annotati...

    Wanyi Zhuang, Qi Chu, Zhentao Tan, Qiankun Liu, Haojie Yuan in Computer Vision – ECCV 2022 (2022)

  10. No Access

    Article

    AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening

    X-ray baggage screening is a vitally important task to detect all kinds of threat objects at controlled access positions, which can prevent crime and guard personal safety. It is generally performed by screene...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  11. No Access

    Article

    An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution

    X-ray baggage inspection is an essential task to detect threat objects at important controlled access places, which can guard personal safety and prevent crime. Generally, it is carried out by screeners to vis...

    Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang in Journal of Real-Time Image Processing (2021)

  12. No Access

    Chapter and Conference Paper

    HTCN: Harmonious Text Colorization Network for Visual-Textual Presentation Design

    The selection of text color is a time-consuming and important aspect in the designing of visual-textual presentation layout. In this paper, we propose a novel deep neural network architecture for predicting te...

    Xuyong Yang, **aobin Xu, Yaohong Huang in Pattern Recognition and Computer Vision (2021)

  13. No Access

    Chapter and Conference Paper

    Talking Face Video Generation with Editable Expression

    In rencent years, the convolutional neural network have been proved to be a great success in generating talking face. Existing methods have combined a single face image with speech to generate talking face vid...

    Luchuan Song, Bin Liu, Nenghai Yu in Image and Graphics (2021)

  14. No Access

    Chapter and Conference Paper

    Towards More Powerful Multi-column Convolutional Network for Crowd Counting

    Scale variation has always been one of the most challenging problems for crowd counting. By using multi-column convolutions with different receptive fields to deal with different scales in the scene, the multi...

    Jiabin Zhang, Qi Chu, Weihai Li, Bin Liu, Weiming Zhang, Nenghai Yu in Image and Graphics (2021)

  15. No Access

    Article

    Real-time attacks on robust watermarking tools in the wild by CNN

    Robust watermarking is a widely used technology to protect image copyright. Robustness, the ability to resist various distortions, is the most important property of robust watermarking algorithm. So to improve...

    Linfeng Geng, Weiming Zhang, Haozhe Chen, Han Fang in Journal of Real-Time Image Processing (2020)

  16. No Access

    Chapter and Conference Paper

    Learning from Rankings with Multi-level Features for No-Reference Image Quality Assessment

    Deep neural networks for image quality assessment have been suffering from a lack of training data for a long time, as it is expensive and laborious to collect sufficient subjective mean opinion scores (MOS). ...

    Yiqun Li, Lan Ma, Dahai Yu in Pattern Recognition and Computer Vision (2020)

  17. No Access

    Chapter and Conference Paper

    UDC 2020 Challenge on Image Restoration of Under-Display Camera: Methods and Results

    This paper is the report of the first Under-Display Camera (UDC) image restoration challenge in conjunction with the RLQ workshop at ECCV 2020. The challenge is based on a newly-collected database of Under-Dis...

    Yuqian Zhou, Michael Kwan, Kyle Tolentino in Computer Vision – ECCV 2020 Workshops (2020)

  18. No Access

    Chapter and Conference Paper

    Improving the Embedding Strategy for Batch Adaptive Steganography

    Recent works have demonstrated that images with more texture regions should be selected as the sub-batch of covers to carry the total message when applying batch steganography to adaptive steganography and the...

    **nzhi Yu, Kejiang Chen, Weiming Zhang, Yaofei Wang in Digital Forensics and Watermarking (2019)

  19. No Access

    Chapter and Conference Paper

    Stereo Visual SLAM Using Bag of Point and Line Word Pairs

    The traditional point-based SLAM algorithm performs poorly due to light changing, low-texture and highly similar scenes, while line segment features can better describe the structural information of the enviro...

    Wei Zhao, Kun Qian, Zhewen Ma, Xudong Ma, Hai Yu in Intelligent Robotics and Applications (2019)

  20. Chapter and Conference Paper

    Enhanced Video Segmentation with Object Tracking

    The high efficiency and superior performance of fully convolutional network (FCN) architecture makes it a recent trend that employing FCN in video object segmentation task. While these FCN-based methods usuall...

    Zheran Hong, Sheng Chen, Zhentao Tan, Qiankun Liu, Bin Liu in Image and Graphics (2019)

previous disabled Page of 3