Skip to main content

previous disabled Page of 195
and
  1. Article

    Open Access

    Omni-dimensional dynamic convolution feature coordinate attention network for pneumonia classification

    Pneumonia is a serious disease that can be fatal, particularly among children and the elderly. The accuracy of pneumonia diagnosis can be improved by combining artificial-intelligence technology with X-ray ima...

    Yufei Li, Yufei **n, **nni Li, Yinrui Zhang in Visual Computing for Industry, Biomedicine… (2024)

  2. No Access

    Article

    FST-OAM: a fast style transfer model using optimized self-attention mechanism

    Image style transfer is a remarkable research hotspot in computer image processing. However, state-of-the-art models have some drawbacks, such as low efficiency of transfer time, distorted image structure and ...

    **aozhi Du, Ning Jia, Hongyuan Du in Signal, Image and Video Processing (2024)

  3. No Access

    Article

    Clothes-Eraser: clothing-aware controllable disentanglement for clothes-changing person re-identification

    This paper conducts research on the problem of person re-identification in the context of urbanization and population growth, which holds significant application prospects in the field of computer vision. Trad...

    Yongkang Ding, Rui Mao, Guodong Du, Liyan Zhang in Signal, Image and Video Processing (2024)

  4. No Access

    Article

    Uncertainty analysis in acoustics: perturbation methods and isogeometric boundary element methods

    This study proposes a generalized nth-order perturbation method based on (isogeometric) boundary element methods for uncertainty analysis in 3D acoustic scattering problems. In this paper, for the first time, we ...

    Leilei Chen, Haojie Lian, Rui** Huo, **g Du, Weisong Liu in Engineering with Computers (2024)

  5. No Access

    Article

    Adversarial defence by learning differentiated feature representation in deep ensemble

    Deep learning models have been shown to be vulnerable to critical attacks under adversarial conditions. Attackers are able to generate powerful adversarial examples by searching for adversarial perturbations, ...

    ** Chen, Huang Wei, Wei Guo, Fan Zhang, Jiayu Du in Machine Vision and Applications (2024)

  6. No Access

    Article

    Linear complexity of two classes of quaternary sequences based on sign alternation transformation

    Two classes of optimal quaternary sequences have been constructed by applying the sign alternation transform and Gray map** to Legendre sequence pair, twin-prime sequence pair and GMW sequence pair. In this ...

    Lu Zhao, Yongzhen Pei, Tianqing Cao, Jiao Du in Applicable Algebra in Engineering, Communi… (2024)

  7. No Access

    Article

    Integrated self-supervised label propagation for label imbalanced sets

    Label propagation is an essential graph-based semi-supervised learning algorithm. However, the algorithm has two problems: how to effectively measure sample similarity and handle label imbalanced sets. Recent ...

    Ze** Ge, Youlong Yang, Zhenye Du in Applied Intelligence (2024)

  8. No Access

    Article

    PointDMIG: a dynamic motion-informed graph neural network for 3D action recognition

    Point cloud contains rich spatial information, providing effective supplementary clues for action recognition. Existing action recognition algorithms based on point cloud sequences typically employ complex spa...

    Yao Du, Zhenjie Hou, **ng Li, Jiuzhen Liang, Kaijun You, **nwen Zhou in Multimedia Systems (2024)

  9. No Access

    Article

    GPU-based butterfly counting

    When dealing with large bipartite graphs, butterfly counting is a crucial and time-consuming operation. Graphics processing units (GPUs) are widely used parallel heterogeneous devices that can significantly bo...

    Yifei **a, Feng Zhang, Qingyu Xu, Mingde Zhang, Zhiming Yao, Lv Lu in The VLDB Journal (2024)

  10. No Access

    Article

    Tsnet: a two-stage network for image dehazing with multi-scale fusion and adaptive learning

    Image dehazing has been a popular topic of research for a long time. Previous deep learning-based image dehazing methods have failed to achieve satisfactory dehazing effects on both synthetic datasets and real...

    **aolin Gong, Zehan Zheng, Heyuan Du in Signal, Image and Video Processing (2024)

  11. No Access

    Article

    An empirical study of data sampling techniques for just-in-time software defect prediction

    Just-in-time software defect prediction (JIT-SDP) is a fine-grained, easy-to-trace, and practical method. Unfortunately, JIT-SDP usually suffers from the class imbalance problem, which affects the performance ...

    Zhiqiang Li, Qiannan Du, Hongyu Zhang, **ao-Yuan **g in Automated Software Engineering (2024)

  12. Article

    Open Access

    Phishing behavior detection on different blockchains via adversarial domain adaptation

    Despite the growing attention on blockchain, phishing activities have surged, particularly on newly established chains. Acknowledging the challenge of limited intelligence in the early stages of new chains, we...

    Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu, Yuling Liu in Cybersecurity (2024)

  13. No Access

    Article

    Enhanced feature pyramid for multi-view stereo with adaptive correlation cost volume

    Multi-level features are commonly employed in the cascade network, which is currently the dominant framework in multi-view stereo (MVS). However, there is a potential issue that the recent popular multi-level ...

    Ming Han, Hui Yin, Aixin Chong, Qianqian Du in Applied Intelligence (2024)

  14. No Access

    Article

    Highly sensitive flexible strain sensor based on the two-dimensional semiconductor tellurium with a negative gauge factor

    Research on flexible strain sensors has advanced rapidly in recent years, with particular attention being devoted to two-dimensional (2D) semiconductor materials owing to their exceptional mechanical and elect...

    Jiarui He, Yusong Qu, Shengyao Chen, Cong Wang in Science China Information Sciences (2024)

  15. No Access

    Article

    Factors influencing students’ acceptance and use generative artificial intelligence in elementary education: an expansion of the UTAUT model

    This research examines the influence of integrating generative artificial intelligence (GAI) in education, focusing on its acceptance and utilization among elementary education students. Grounded in the Task-T...

    Lei Du, Beibei Lv in Education and Information Technologies (2024)

  16. Article

    Open Access

    Intelligent analysis of android application privacy policy and permission consistency

    With the continuous development of mobile devices, mobile applications bring a lot of convenience to people’s lives. The abuse of mobile device permissions is prone to the risk of privacy leakage. The existing...

    Tengfei Tu, Hua Zhang, Bei Gong, Daizhong Du, Qiaoyan Wen in Artificial Intelligence Review (2024)

  17. No Access

    Article

    Diff-Font: Diffusion Model for Robust One-Shot Font Generation

    Font generation presents a significant challenge due to the intricate details needed, especially for languages with complex ideograms and numerous characters, such as Chinese and Korean. Although various few-s...

    Haibin He, **nyuan Chen, Chaoyue Wang in International Journal of Computer Vision (2024)

  18. Article

    Open Access

    Parallel processing model for low-dose computed tomography image denoising

    Low-dose computed tomography (LDCT) has gained increasing attention owing to its crucial role in reducing radiation exposure in patients. However, LDCT-reconstructed images often suffer from significant noise ...

    Libing Yao, Ji** Wang, Zhongyi Wu in Visual Computing for Industry, Biomedicine… (2024)

  19. Article

    Open Access

    IKT-Konzepte zur Digitalisierung von MicroGrids und deren Betriebsführung

    Der Artikel befasst sich mit der Entwicklung intelligenter MicroGrids in lokalen Verteilungsnetzen und der dafür notwendigen Informations- und Kommunikationstechnik-Infrastruktur (IKT) und deren Rahmenbedingun...

    Marcel Hallmann, Robert Pietracho in HMD Praxis der Wirtschaftsinformatik (2024)

  20. No Access

    Article

    STOD: toward semi-supervised tiny object detection

    Semi-supervised object detection aims to enhance object detectors by utilizing a large number of unlabeled images, which has gained increasing attention in natural scenes. However, when these methods are direc...

    Yanan Guo, Yuxin Feng, Kangning Du, Lin Cao in Neural Computing and Applications (2024)

previous disabled Page of 195