Skip to main content

previous disabled Page of 254
and
  1. No Access

    Article

    Event-Driven Heterogeneous Network for Video Deraining

    Restoring clear frames from rainy videos poses a significant challenge due to the swift motion of rain streaks. Traditional frame-based visual sensors, which record dense scene content synchronously, struggle ...

    Xueyang Fu, Chengzhi Cao, Senyan Xu in International Journal of Computer Vision (2024)

  2. No Access

    Article

    HVDistill: Transferring Knowledge from Images to Point Clouds via Unsupervised Hybrid-View Distillation

    We present a hybrid-view-based knowledge distillation framework, termed HVDistill, to guide the feature learning of a point cloud neural network with a pre-trained image network in an unsupervised manner. By e...

    Sha Zhang, Jiajun Deng, Lei Bai, Houqiang Li in International Journal of Computer Vision (2024)

  3. No Access

    Article

    Intelligent AUV Surfacing Control in Network Attack Scenario

    Autonomous Underwater Vehicle (AUV) have become an important tool for humans to explore the ocean. The evolution of AUV is trending towards clustering. At present, research on the intelligent control strategy ...

    Yinghao Zhuang, Yue Zhang, Yibin Li, Tianze Zhang in Journal of Signal Processing Systems (2024)

  4. No Access

    Article

    Self-Organizing Key Security Management Algorithm in Socially Aware Networking

    In socially aware networking, encryption algorithms are used in privacy-preserving algorithms to provide security for the nodes. However, the shared key lacks certain security management during transmission, w...

    Zhang Xuemin, Deng Haitao, **ong Zenggang, Rao Ying in Journal of Signal Processing Systems (2024)

  5. No Access

    Article

    Adversarial defence by learning differentiated feature representation in deep ensemble

    Deep learning models have been shown to be vulnerable to critical attacks under adversarial conditions. Attackers are able to generate powerful adversarial examples by searching for adversarial perturbations, ...

    ** Chen, Huang Wei, Wei Guo, Fan Zhang, Jiayu Du in Machine Vision and Applications (2024)

  6. No Access

    Article

    FD-GAN: Generalizable and Robust Forgery Detection via Generative Adversarial Networks

    Generalization across various forgeries and robustness against corruption are pressing challenges of forgery detection. Although previous works boost generalization with the help of data augmentations, they ra...

    Nanqing Xu, Weiwei Feng, Tianzhu Zhang in International Journal of Computer Vision (2024)

  7. No Access

    Article

    Open-Vocabulary Animal Keypoint Detection with Semantic-Feature Matching

    Current image-based keypoint detection methods for animal (including human) bodies and faces are generally divided into fully supervised and few-shot class-agnostic approaches. The former typically relies on l...

    Hao Zhang, Lumin Xu, Shenqi Lai, Wenqi Shao in International Journal of Computer Vision (2024)

  8. No Access

    Article

    HybridPrompt: Domain-Aware Prompting for Cross-Domain Few-Shot Learning

    Cross-Domain Few-Shot Learning (CD-FSL) aims at recognizing unseen classes from target domains that vastly differ from training classes from source domains, utilizing only a few labeled samples. However, the s...

    Jiamin Wu, Tianzhu Zhang, Yongdong Zhang in International Journal of Computer Vision (2024)

  9. No Access

    Article

    Learning Spatiotemporal Inconsistency via Thumbnail Layout for Face Deepfake Detection

    The deepfake threats to society and cybersecurity have provoked significant public apprehension, driving intensified efforts within the realm of deepfake video detection. Current video-level methods are mostly...

    Yuting Xu, Jian Liang, Lijun Sheng in International Journal of Computer Vision (2024)

  10. No Access

    Article

    Single-Temporal Supervised Learning for Universal Remote Sensing Change Detection

    Bitemporal supervised learning paradigm always dominates remote sensing change detection using numerous labeled bitemporal image pairs, especially for high spatial resolution (HSR) remote sensing imagery. Howe...

    Zhuo Zheng, Yanfei Zhong, Ailong Ma in International Journal of Computer Vision (2024)

  11. No Access

    Article

    Inter-feature Relationship Certifies Robust Generalization of Adversarial Training

    Whilst adversarial training has been shown as a promising wisdom to promote model robustness in computer vision and machine learning, adversarially trained models often suffer from poor robust generalization o...

    Shufei Zhang, Zhuang Qian, Kaizhu Huang in International Journal of Computer Vision (2024)

  12. No Access

    Article

    Deep learning based insulator fault detection algorithm for power transmission lines

    Aiming at the complex background of transmission lines at the present stage, which leads to the problem of low accuracy of insulator fault detection for small targets, a deep learning-based insulator fault det...

    Han Wang, Qing Yang, Binlin Zhang, Dexin Gao in Journal of Real-Time Image Processing (2024)

  13. No Access

    Article

    MFMANet: a multispectral pedestrian detection network using multi-resolution RGB feature reuse with multi-scale FIR attentions

    In the realm of multispectral pedestrian detection, especially under challenging low-illumination, the existing methods, characterized by cross-modality feature interaction, lack generalization and are hard to...

    Jiaren Guo, Yuzhen Zhang, Jianyin Zheng, Zihao Huang in Machine Vision and Applications (2024)

  14. No Access

    Article

    LightYOLO-S: a lightweight algorithm for detecting small targets

    Small target detection tasks are the focus and difficulty of target detection tasks. Methods to improve detection accuracy are often accompanied by drawbacks, such as a high number of parameters, computational...

    Liu Zihan, Wu xu, Zhang Linyun, Yu Panlin in Journal of Real-Time Image Processing (2024)

  15. No Access

    Article

    Towards Robust Semantic Segmentation against Patch-Based Attack via Attention Refinement

    The attention mechanism has been proven effective on various visual tasks in recent years. In the semantic segmentation task, the attention mechanism is applied in various methods, including the case of both c...

    Zheng Yuan, Jie Zhang, Yude Wang, Shiguang Shan in International Journal of Computer Vision (2024)

  16. Article

    Correction: HCLR-Net: Hybrid Contrastive Learning Regularization with Locally Randomized Perturbation for Underwater Image Enhancement

    **gchun Zhou, Jiaming Sun, Chongyi Li in International Journal of Computer Vision (2024)

  17. No Access

    Article

    ARF-YOLOv8: a novel real-time object detection model for UAV-captured images detection

    There are several difficulties in the task of object detection for Unmanned Aerial Vehicle (UAV) photography images, including the small size of objects, densely distributed objects, and diverse perspectives f...

    YaLin Zeng, Dong** Guo, WeiKai He, Tian Zhang in Journal of Real-Time Image Processing (2024)

  18. No Access

    Article

    ViDSOD-100: A New Dataset and a Baseline Model for RGB-D Video Salient Object Detection

    With the rapid development of depth sensor, more and more RGB-D videos could be obtained. Identifying the foreground in RGB-D videos is a fundamental and important task. However, the existing salient object de...

    Junhao Lin, Lei Zhu, Jiaxing Shen, Huazhu Fu in International Journal of Computer Vision (2024)

  19. No Access

    Article

    CLIP-guided Prototype Modulating for Few-shot Action Recognition

    Learning from large-scale contrastive language-image pre-training like CLIP has shown remarkable success in a wide range of downstream tasks recently, but it is still under-explored on the challenging few-shot...

    **ang Wang, Shiwei Zhang, Jun Cen, Changxin Gao in International Journal of Computer Vision (2024)

  20. No Access

    Article

    Grounded Affordance from Exocentric View

    Affordance grounding aims to locate objects’ “action possibilities” regions, an essential step toward embodied intelligence. Due to the diversity of interactive affordance, i.e., the uniqueness of different indiv...

    Hongchen Luo, Wei Zhai, **g Zhang, Yang Cao in International Journal of Computer Vision (2024)

previous disabled Page of 254