Skip to main content

previous disabled Page of 18
and
  1. Article

    Open Access

    Effectiveness assessment of recent large vision-language models

    The advent of large vision-language models (LVLMs) represents a remarkable advance in the quest for artificial general intelligence. However, the models’ effectiveness in both specialized and general tasks war...

    Yao Jiang, **nyu Yan, Ge-Peng Ji, Keren Fu, Meijun Sun, Huan **ong in Visual Intelligence (2024)

  2. No Access

    Article

    Towards efficient and accurate approximation: tensor decomposition based on randomized block Krylov iteration

    Tensor decomposition methods are inefficient when dealing with low-rank approximation of large-scale data. Randomized tensor decomposition has emerged to meet this need, but most existing methods exhibit high ...

    Yichun Qiu, Weijun Sun, Guoxu Zhou, Qibin Zhao in Signal, Image and Video Processing (2024)

  3. No Access

    Article

    Semantic-alignment transformer and adversary hashing for cross-modal retrieval

    Deep Cross-Modal Hashing (DCMH) has garnered significant attention in the field of cross-modal retrieval due to its advantages such as high computational efficiency and small storage space. However, existing D...

    Yajun Sun, Meng Wang, Ying Ma in Applied Intelligence (2024)

  4. No Access

    Article

    Multi-label semantic sharing based on graph convolutional network for image-to-text retrieval

    Cross-modal hashing has attracted widespread attention due to its ability to reduce the complexity of storage and retrieval. However, many existing methods use a symbolic function to map hash codes, which lead...

    Ying Ma, Meng Wang, Guangyun Lu, Yajun Sun in The Visual Computer (2024)

  5. No Access

    Article

    Monocular vehicle speed detection based on improved YOLOX and DeepSORT

    A monocular vehicle speed detection method based on improved YOLOX and DeepSORT is proposed for the simple scene of fixed shooting angle without high precision but requiring control cost. For continuous video ...

    Kaiyu Zhang, Fei Wu, Haojun Sun, Meiyu Cai in Neural Computing and Applications (2024)

  6. No Access

    Article

    Exploring the impact of inter-organizational knowledge potential difference: an empirical investigation of inventor mobility

    The intricate interplay between inventor mobility and its influence on knowledge transfer has captivated the attention of scholars and policymakers. While the significance of individual characteristics in shap...

    Jiajie Wang, **g Shi, Yitong Chen, Lele Kang, Jianjun Sun in Scientometrics (2024)

  7. No Access

    Article

    Recent advances in object tracking using hyperspectral videos: a survey

    Short-Term Single-Object (STSO) tracking using Hyperspectral Videos (HSVs), which has become a hotspot recently, is a challenging task. Hyperspectral Object Tracking (HOT) makes full use of spatial and spectra...

    Kun Qian, Jianlu Shen, Shiqing Wang, Wenjun Sun in Multimedia Tools and Applications (2024)

  8. No Access

    Article

    Efficient approaches for task offloading in point-of-interest based vehicular fog computing

    Vehicular fog computing (VFC), as the extension of the mobile cloud, has been widely investigated. However, in most existing VFC works, the scenario with point-of-interests (PoIs) is rarely considered, which c...

    Yifei Sun, Jigang Wu, Yalan Wu, Long Chen, Weijun Sun in The Journal of Supercomputing (2024)

  9. No Access

    Article

    A relation-aware representation approach for the question matching system

    Online question matching is the process of comparing user queries with system questions to find appropriate answers. This task has become increasingly important with the popularity of knowledge sharing social ...

    Yanmin Chen, Enhong Chen, Kun Zhang, Qi Liu, Ruijun Sun in World Wide Web (2024)

  10. No Access

    Chapter and Conference Paper

    A Developer Recommendation Method Based on Disentangled Graph Convolutional Network

    Crowdsourcing Software Development (CSD) solves software development tasks by integrating resources from global developers. With more and more companies and developers moving onto CSD platforms, the informatio...

    Yan Lu, Junwei Du, Lijun Sun, **huan Liu, Lei Guo, Xu Yu in Neural Information Processing (2024)

  11. No Access

    Chapter and Conference Paper

    Carbon Trading Based on Consortium Chain: Building, Modeling, and Analysis

    Traditional carbon trading suffers from poor interoperability, low transparency and reliance on manual drawbacks. In this paper, we analyze the combination of carbon trading and blockchain technology to design...

    Chaoying Yan, Lijun Sun, Shangguang Wang in Algorithms and Architectures for Parallel … (2024)

  12. No Access

    Chapter and Conference Paper

    Heterogeneous Signcryption Scheme with Equality Test for Internet of Vehicles

    By collecting and using vehicle dynamic data from sensors on vehicles, Internet of Vehicles (IoV) has greatly enhanced the convenience and intelligence of users’ transportation. However, the data transmission ...

    Chunhua **, Wenyu Qin, Zhiwei Chen, Kaijun Sun in Frontiers in Cyber Security (2024)

  13. No Access

    Book and Conference Proceedings

    Dependable Software Engineering. Theories, Tools, and Applications

    9th International Symposium, SETTA 2023, Nan**g, China, November 27–29, 2023, Proceedings

    Holger Hermanns, Jun Sun, Lei Bu in Lecture Notes in Computer Science (2024)

  14. No Access

    Chapter and Conference Paper

    A Blockchain-Based Proxy Re-Encryption Scheme with Cryptographic Reverse Firewall for IoV

    As the Internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, road side instrument, and the environment. Nevertheless, it also brings vehicle information securi...

    Chunhua **, Zhiwei Chen, Wenyu Qin, Kaijun Sun in Frontiers in Cyber Security (2024)

  15. No Access

    Article

    Transformer-based few-shot object detection in traffic scenarios

    In few-shot object detection (FSOD), many approaches retrain the detector in the inference stage, which is unrealistic in real applications. Moreover, high-quality region proposals are difficult to generate fo...

    Erjun Sun, Di Zhou, Yan Tian, Zhaocheng Xu, Xun Wang in Applied Intelligence (2024)

  16. No Access

    Chapter and Conference Paper

    Optimal Information Fusion Descriptor Fractional Order Kalman Filter

    The fractional order Kalman filtering theory is an extension and extension of traditional integer order Kalman filters, which can solve the state estimation problem of fractional order systems. At present, the...

    **ao Liang, Guangming Yan, Yanfeng Zhu in Advanced Computational Intelligence and In… (2024)

  17. No Access

    Chapter and Conference Paper

    Towards Privacy-Preserving Decentralized Reputation Management for Vehicular Crowdsensing

    The reputation of a vehicle is a critical role in most vehicular crowdsensing applications, which incentivizes vehicles to perform crowdsensing tasks by submitting high-quality data and getting remunerated acc...

    Zhongkai Lu, Lingling Wang, Ke Geng in Advanced Parallel Processing Technologies (2024)

  18. No Access

    Article

    HACAN: a hierarchical answer-aware and context-aware network for question generation

    Question Generation (QG) is the task of generating questions according to the given contexts. Most of the existing methods are based on Recurrent Neural Networks (RNNs) for generating questions with passage-le...

    Ruijun Sun, Hanqin Tao, Yanmin Chen, Qi Liu in Frontiers of Computer Science (2023)

  19. No Access

    Article

    Contrastive label assignment in vehicle detection

    Vehicle detection is a critical task that involves identifying and localizing vehicles in a traffic scenario. However, the traditional approach of one-to-one set matching for label assignment, where each groun...

    Erjun Sun, Di Zhou, Zhaocheng Xu, Jie Sun, Xun Wang in Applied Intelligence (2023)

  20. No Access

    Article

    Variable step-size pseudo affine projection algorithm for censored regression

    The censored observations of adaptive signal processing have widely occurred in plenty of utility applications. Using traditional adaptive algorithms to recognize systems will confront convergence reduced unde...

    Bolin Wang, Pengwei Wen, Boyang Qu, **aowei Song in Signal, Image and Video Processing (2023)

previous disabled Page of 18