![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Enhancing adversarial transferability with partial blocks on vision transformer
Adversarial examples can attack multiple unknown convolutional neural networks (CNNs) due to adversarial transferability, which reveals the vulnerability of CNNs and facilitates the development of adversarial ...
-
Chapter and Conference Paper
Similar Feature Extraction Network for Occluded Person Re-identification
Occluded person re-identification (Re-ID) is a challenging task in real-world scenarios due to the extensive conditions that persons are occluded by various obstacles. Although state-of-the-art methods with ad...
-
Chapter and Conference Paper
Adversarial Examples Are Closely Relevant to Neural Network Models - A Preliminary Experiment Explore
Neural networks are fragile because adversarial examples can readily assault them. As a result of the current scenario, academics from various countries have paid close attention to adversarial examples: many ...
-
Chapter and Conference Paper
Robust Transmission Design for IRS-Aided MISO Network with Reflection Coefficient Mismatch
Intelligent reflection surface (IRS) has been recognized as a revolutionary technology to achieve spectrum and energy efficient wireless communications due to its capability to reconfigure the propagation chan...
-
Article
Path aggregation U-Net model for brain tumor segmentation
The deep neural network has been widely used in semantic segmentation, especially in tumor image segmentation. The segmentation performance of traditional methods cannot meet the high standard of clinical appl...
-
Article
Hybrid JND model-guided watermarking method for screen content images
With the prevalence of digital products like cellphone, tablet and personal computer, the screen content images (SCIs) consisting of text, graphic, and natural scene picture becomes a significant media in vari...
-
Chapter and Conference Paper
Hybrid Pyramid U-Net Model for Brain Tumor Segmentation
In this paper, we extend the U-Net model and propose a novel hybrid pyramid U-Net (HPU-Net) model which explores the global context information combined different region based context. Global context informati...
-
Chapter and Conference Paper
Validating Contact Times Extracted from Mobility Traces
Use of mobility models to model user movement in mobile networks is a key aspect when develo** and evaluating networking protocols in simulators. A trace obtained from an actual user movement is considered a...
-
Article
Improved logarithmic spread transform dither modulation using a robust perceptual model
In the quantization-based watermarking framework, the perceptual just noticeable distortion (JND) model has been widely used to determine the quantization step size, as it can be used for the better tradeoff b...
-
Article
Spherical torus-based video hashing for near-duplicate video detection
本文提出利用球环构造视频哈希的方法, 用于相似视频检测。 在该方法中, 视频片段被分成若干个视频立方体, 在每个立方体中, 对视频立方体的内切球进行均匀划分, 并把球环信息投影到一副图像上, 进而对该投影图像进行非负矩阵分解, 利用分解得到的系数构造视频哈希。 本文方法沿球面切线方向提取视频时空信息, 较好的捕捉了视频时空信息变化, 提高了相似视频检测的精度和区分度。
-
Article
A spatiotemporal super-resolution algorithm for a hybrid stereo video system
This paper presents a spatiotemporal super-resolution method to enhance both the spatial resolution and the frame rate in a hybrid stereo video system. In this system, a scene is captured by two cameras to for...
-
Chapter and Conference Paper
Investigation on the Influence of Visual Attention on Image Memorability
The research of image memorability has received increasing attention recently. In this paper, the influence of the visual attention based features on image memorability is explored, which is different from mos...
-
Chapter and Conference Paper
Improved Spread Transform Dither Modulation Using Luminance-Based JND Model
In the quantization-based watermarking framework, perceptual just noticeable distortion (JND) model has been widely used to determine the quantization step size to provide a better tradeoff between fidelity an...
-
Chapter and Conference Paper
Real-Time Multi-Application Network Traffic Identification Based on Machine Learning
In this paper, kinds of network applications are first analyzed, and some simple and effective features from the package headers of network flows are then generated by using the method of time window. What is ...
-
Chapter and Conference Paper
Frame Rate Up-Conversion Using Motion Vector Angular for Occlusion Detection
In this paper, we study on handling the issue of occlusions in frame rate up-conversion (FRUC), which has been widely used to reconstruct high-quality videos presented on liquid crystal display. Depending on d...
-
Article
Coding modes-based frame skip avoidance scheme for low bit rate video coding
Frame skips are commonly applied in the rate control procedure of low bit rate video coding. In order to reduce the probability of frame skips, a frame skip avoidance scheme based on the analysis of coding mod...
-
Chapter and Conference Paper
A Gray Model Application Method for H.264/AVC Intra Prediction Coding
Gray System Theory (GST) is employed to solve problems with less data, little sample, and insufficient experience, it has been successfully applied to medicine, industry technology, and so on. In this paper, a...
-
Chapter and Conference Paper
Capacity and Power Optimization for Collaborative Beamforming with Two Relay Clusters
In this paper, we study two approaches to optimize the problems between capacity and power in a three-hop multi-relay network. In the first approach, two beamforming weight vectors are designed to maximize the...
-
Article
Robust video hashing based on representative-dispersive frames
This study proposes a robust video hashing for video copy detection. The proposed method, which is based on representative-dispersive frames (R-D frames), can reveal the global and local information of a video...
-
Chapter and Conference Paper
Unequally Weighted Video Hashing for Copy Detection
In this paper, an unequally weighted video hashing algorithm is presented, in which visual saliency is used to generate the video hash and weight different hash bits. The proposed video hash is fused by two ha...