Search
Search Results
-
Weakly-supervised instance co-segmentation via tensor-based salient co-peak search
Instance co-segmentation aims to segment the co-occurrent instances among two images. This task heavily relies on instance-related cues provided by...
-
Weakly supervised semantic segmentation for skin cancer via CNN superpixel region response
Precise segmentation for skin cancer lesions at different stages is conducive to early detection and further treatment. We propose a weakly...
-
Real-time global path planning for mobile robots with a complex 3-D shape in large-scale 3-D environment
Real-time global path planning in a large-scale dynamic environment for mobile robots is a complex task, especially when the 3-D configurations of...
-
Robust Human Matting via Semantic Guidance
Automatic human matting is highly desired for many real applications. We investigate recent human matting methods and show that common bad cases... -
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
The success of blockchains has led to ever-growing ledgers that are stored by all participating full nodes. In contrast, light clients only store... -
Personalized Re-ranking for Recommendation with Mask Pretraining
Re-ranking is to refine the candidate ranking list of recommended items, such that the re-ranked list attracts users to purchase or click more items...
-
Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption
Mix-nets are protocols that allow a set of senders to send messages anonymously. Faonio et al. (ASIACRYPT’19) showed how to instantiate mix-net... -
-
A Systematic Review of AI Privileges to Combat Widen Threat of Flavivirus
In order to prevent the extraordinary spread of sickness caused by Flavivirus, the healthcare business as well as public health are working... -
A Review of Goal Search Algorithms for Multi-robot Systems Based on Blockchain
The main focus of this paper is to review the task allocation and goal search of multi-robot systems. This paper will sort out the development and... -
Progressive residual networks for image super-resolution
The recent advances in deep convolutional neural networks (DCNNs) have convincingly demonstrated high-capability reconstruction for single image...
-
Multi-domain fusion deep graph convolution neural network for EEG emotion recognition
Electroencephalogram (EEG)-based emotion recognition has become a hot research field, with the most attention given to decoding three basic types of...
-
LKAU-Net: 3D Large-Kernel Attention-Based U-Net for Automatic MRI Brain Tumor Segmentation
Automatic segmentation of brain tumors from multi-modal magnetic resonance images (MRI) using deep learning methods has emerged in assisting the... -
Machine Learning with the Wolfram Language
This chapter introduces the gradient descent algorithm as an optimization method for linear regression; the corresponding computations are shown, as... -
Frequency Information Matters for Image Matting
Image matting aims to estimate the opacity of foreground objects in order to accurately extract them from the background. Existing methods are only... -
Iterative Solution for the Narrow Passage Problem in Motion Planning
Finding a path in a narrow passage is a bottleneck for randomised sampling-based motion planning methods. This paper introduces a technique that... -
Chinese Relation Extraction with Bi-directional Context-Based Lattice LSTM
Chinese entity relation extraction (Chinese RE) is a crucial task for various NLP applications. It aims to automatically extract relationships... -
ViTAEv2: Vision Transformer Advanced by Exploring Inductive Bias for Image Recognition and Beyond
Vision transformers have shown great potential in various computer vision tasks owing to their strong capability to model long-range dependency using...
-
Revealing the character of journals in higher-order citation networks
Revealing the character of journals based on citation data remains an interesting issue nowadays. It aims to establish a reasonable journal...
-
Identity-Based Encryption in DDH Hard Groups
The concept of Identity-Based Encryption was first introduced by Shamir (CRYPTO 1984) but were not realised until much later by Sakai, Ohgishi and...