Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Enhancing adversarial transferability with partial blocks on vision transformer

    Adversarial examples can attack multiple unknown convolutional neural networks (CNNs) due to adversarial transferability, which reveals the vulnerability of CNNs and facilitates the development of adversarial ...

    Yanyang Han, Ju Liu, **aoxi Liu, **ao Jiang in Neural Computing and Applications (2022)

  2. No Access

    Chapter and Conference Paper

    Similar Feature Extraction Network for Occluded Person Re-identification

    Occluded person re-identification (Re-ID) is a challenging task in real-world scenarios due to the extensive conditions that persons are occluded by various obstacles. Although state-of-the-art methods with ad...

    **ao Jiang, Ju Liu, Yanyang Han, Lingchen Gu, **aoxi Liu in Advances in Swarm Intelligence (2022)

  3. No Access

    Chapter and Conference Paper

    Adversarial Examples Are Closely Relevant to Neural Network Models - A Preliminary Experiment Explore

    Neural networks are fragile because adversarial examples can readily assault them. As a result of the current scenario, academics from various countries have paid close attention to adversarial examples: many ...

    Zheng Zhou, Ju Liu, Yanyang Han in Advances in Swarm Intelligence (2022)

  4. No Access

    Chapter and Conference Paper

    Robust Transmission Design for IRS-Aided MISO Network with Reflection Coefficient Mismatch

    Intelligent reflection surface (IRS) has been recognized as a revolutionary technology to achieve spectrum and energy efficient wireless communications due to its capability to reconfigure the propagation chan...

    Ran Yang, Ning Wei, Zheng Dong, Hongji Xu, Ju Liu in Communications and Networking (2022)

  5. No Access

    Article

    Path aggregation U-Net model for brain tumor segmentation

    The deep neural network has been widely used in semantic segmentation, especially in tumor image segmentation. The segmentation performance of traditional methods cannot meet the high standard of clinical appl...

    Fengming Lin, Qiang Wu, Ju Liu, Dawei Wang in Multimedia Tools and Applications (2021)

  6. No Access

    Article

    Hybrid JND model-guided watermarking method for screen content images

    With the prevalence of digital products like cellphone, tablet and personal computer, the screen content images (SCIs) consisting of text, graphic, and natural scene picture becomes a significant media in vari...

    Wenbo Wan, Jun Wang, **g Li, Jiande Sun in Multimedia Tools and Applications (2020)

  7. Chapter and Conference Paper

    Hybrid Pyramid U-Net Model for Brain Tumor Segmentation

    In this paper, we extend the U-Net model and propose a novel hybrid pyramid U-Net (HPU-Net) model which explores the global context information combined different region based context. Global context informati...

    **angmao Kong, Guoxia Sun, Qiang Wu, Ju Liu in Intelligent Information Processing IX (2018)

  8. No Access

    Chapter and Conference Paper

    Validating Contact Times Extracted from Mobility Traces

    Use of mobility models to model user movement in mobile networks is a key aspect when develo** and evaluating networking protocols in simulators. A trace obtained from an actual user movement is considered a...

    Liu Sang, Vishnupriya Kuppusamy, Anna Förster in Ad-hoc, Mobile, and Wireless Networks (2017)

  9. No Access

    Article

    Improved logarithmic spread transform dither modulation using a robust perceptual model

    In the quantization-based watermarking framework, the perceptual just noticeable distortion (JND) model has been widely used to determine the quantization step size, as it can be used for the better tradeoff b...

    Wenbo Wan, Ju Liu, Jiande Sun, Di Gao in Multimedia Tools and Applications (2016)

  10. No Access

    Article

    Spherical torus-based video hashing for near-duplicate video detection

    本文提出利用球环构造视频哈希的方法, 用于相似视频检测。 在该方法中, 视频片段被分成若干个视频立方体, 在每个立方体中, 对视频立方体的内切球进行均匀划分, 并把球环信息投影到一副图像上, 进而对该投影图像进行非负矩阵分解, 利用分解得到的系数构造视频哈希。 本文方法沿球面切线方向提取视频时空信息, 较好的捕捉了视频时空信息变化, 提高了相似视频检测的精度和区分度。

    **ushan Nie, Yane Chai, Ju Liu, Jiande Sun in Science China Information Sciences (2016)

  11. No Access

    Article

    A spatiotemporal super-resolution algorithm for a hybrid stereo video system

    This paper presents a spatiotemporal super-resolution method to enhance both the spatial resolution and the frame rate in a hybrid stereo video system. In this system, a scene is captured by two cameras to for...

    **g Ge, Ju Liu, Hui Yuan, Chuan Ge, Boyang Zhang in Signal, Image and Video Processing (2016)

  12. Chapter and Conference Paper

    Investigation on the Influence of Visual Attention on Image Memorability

    The research of image memorability has received increasing attention recently. In this paper, the influence of the visual attention based features on image memorability is explored, which is different from mos...

    Wulin Wang, Jiande Sun, **g Li, Qiang Wu, Ju Liu in Image and Graphics (2015)

  13. Chapter and Conference Paper

    Improved Spread Transform Dither Modulation Using Luminance-Based JND Model

    In the quantization-based watermarking framework, perceptual just noticeable distortion (JND) model has been widely used to determine the quantization step size to provide a better tradeoff between fidelity an...

    Wenhua Tang, Wenbo Wan, Ju Liu, Jiande Sun in Image and Graphics (2015)

  14. No Access

    Chapter and Conference Paper

    Real-Time Multi-Application Network Traffic Identification Based on Machine Learning

    In this paper, kinds of network applications are first analyzed, and some simple and effective features from the package headers of network flows are then generated by using the method of time window. What is ...

    Meihua Qiao, Yanqing Ma, Yijie Bian, Ju Liu in Advances in Neural Networks – ISNN 2015 (2015)

  15. Chapter and Conference Paper

    Frame Rate Up-Conversion Using Motion Vector Angular for Occlusion Detection

    In this paper, we study on handling the issue of occlusions in frame rate up-conversion (FRUC), which has been widely used to reconstruct high-quality videos presented on liquid crystal display. Depending on d...

    Yue Zhao, Ju Liu, Guoxia Sun, **g Ge, Wenbo Wan in Image and Graphics (2015)

  16. No Access

    Article

    Coding modes-based frame skip avoidance scheme for low bit rate video coding

    Frame skips are commonly applied in the rate control procedure of low bit rate video coding. In order to reduce the probability of frame skips, a frame skip avoidance scheme based on the analysis of coding mod...

    Hui Yuan, Ju Liu, Jiangtao Ren, Yujun Li in Journal of Real-Time Image Processing (2014)

  17. No Access

    Chapter and Conference Paper

    A Gray Model Application Method for H.264/AVC Intra Prediction Coding

    Gray System Theory (GST) is employed to solve problems with less data, little sample, and insufficient experience, it has been successfully applied to medicine, industry technology, and so on. In this paper, a...

    Ruifang Hu, Ju Liu, Hui Yuan, Chuan Ge in Proceedings of the 3rd International Confe… (2014)

  18. No Access

    Chapter and Conference Paper

    Capacity and Power Optimization for Collaborative Beamforming with Two Relay Clusters

    In this paper, we study two approaches to optimize the problems between capacity and power in a three-hop multi-relay network. In the first approach, two beamforming weight vectors are designed to maximize the...

    Bingbing Lu, Ju Liu, Chao Wang, Hongji Xu, Qing Wang in Advances in Swarm Intelligence (2014)

  19. No Access

    Article

    Robust video hashing based on representative-dispersive frames

    This study proposes a robust video hashing for video copy detection. The proposed method, which is based on representative-dispersive frames (R-D frames), can reveal the global and local information of a video...

    **uShan Nie, Ju Liu, JianDe Sun, LianQi Wang in Science China Information Sciences (2013)

  20. No Access

    Chapter and Conference Paper

    Unequally Weighted Video Hashing for Copy Detection

    In this paper, an unequally weighted video hashing algorithm is presented, in which visual saliency is used to generate the video hash and weight different hash bits. The proposed video hash is fused by two ha...

    Jiande Sun, **g Wang, Hui Yuan, **aocui Liu, Ju Liu in Advances in Multimedia Modeling (2013)

previous disabled Page of 3