default search action
Tzu-Yi Hung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Jiacheng Wei, Guosheng Lin, Kim-Hui Yap, Fayao Liu, Tzu-Yi Hung:
Dense Supervision Propagation for Weakly Supervised Semantic Segmentation on 3D Point Clouds. IEEE Trans. Circuits Syst. Video Technol. 34(6): 4367-4377 (2024) - [c19]Chia-Yu Chou, Tzu-Yi Hung, Tsung-Chu Huang:
SievingNet: Ternary-Coded Binary Based Approximate Sieving for Neural Network. ICCE-Taiwan 2024: 9-10 - [i6]Jianping Li, Thien-Minh Nguyen, Muqing Cao, Shenghai Yuan, Tzu-Yi Hung, Lihua Xie:
Graph Optimality-Aware Stochastic LiDAR Bundle Adjustment with Progressive Spatial Smoothing. CoRR abs/2410.14565 (2024) - 2023
- [j5]Weide Liu, Xiangfei Kong, Tzu-Yi Hung, Guosheng Lin:
Cross-Image Region Mining With Region Prototypical Network for Weakly Supervised Segmentation. IEEE Trans. Multim. 25: 1148-1160 (2023) - [j4]Weide Liu, Chi Zhang, Henghui Ding, Tzu-Yi Hung, Guosheng Lin:
Few-Shot Segmentation With Optimal Transport Matching and Message Flow. IEEE Trans. Multim. 25: 5130-5141 (2023) - 2022
- [c18]Shichao Dong, Guosheng Lin, Tzu-Yi Hung:
Learning Regional Purity for Instance Segmentation on 3D Point Clouds. ECCV (30) 2022: 56-72 - 2021
- [c17]Gongjie Zhang, Kaiwen Cui, Tzu-Yi Hung, Shijian Lu:
Defect-GAN: High-Fidelity Defect Synthesis for Automated Defect Inspection. WACV 2021: 2523-2533 - [i5]Gongjie Zhang, Kaiwen Cui, Tzu-Yi Hung, Shijian Lu:
Defect-GAN: High-Fidelity Defect Synthesis for Automated Defect Inspection. CoRR abs/2103.15158 (2021) - [i4]Jiacheng Wei, Guosheng Lin, Kim-Hui Yap, Fayao Liu, Tzu-Yi Hung:
Dense Supervision Propagation for Weakly Supervised Semantic Segmentation on 3D Point Clouds. CoRR abs/2107.11267 (2021) - [i3]Weide Liu, Xiangfei Kong, Tzu-Yi Hung, Guosheng Lin:
Cross-Image Region Mining with Region Prototypical Network for Weakly Supervised Segmentation. CoRR abs/2108.07413 (2021) - [i2]Weide Liu, Chi Zhang, Henghui Ding, Tzu-Yi Hung, Guosheng Lin:
Few-shot Segmentation with Optimal Transport Matching and Message Flow. CoRR abs/2108.08518 (2021) - 2020
- [j3]Jiaxin Cai, Junlin Hu, Xin Tang, Tzu-Yi Hung, Yap-Peng Tan:
Deep historical long short-term memory network for action recognition. Neurocomputing 407: 428-438 (2020) - [j2]Hao Chen, Yongjian Deng, Youfu Li, Tzu-Yi Hung, Guosheng Lin:
RGBD Salient Object Detection via Disentangled Cross-Modal Fusion. IEEE Trans. Image Process. 29: 8407-8416 (2020) - [c16]Jiacheng Wei, Guosheng Lin, Kim-Hui Yap, Tzu-Yi Hung, Lihua Xie:
Multi-Path Region Mining for Weakly Supervised 3D Semantic Segmentation on Point Clouds. CVPR 2020: 4383-4392 - [c15]Hanyu Shi, Guosheng Lin, Hao Wang, Tzu-Yi Hung, Zhenhua Wang:
SpSequenceNet: Semantic Segmentation Network on 4D Point Clouds. CVPR 2020: 4573-4582 - [c14]Weide Liu, Chi Zhang, Guosheng Lin, Tzu-Yi Hung, Chunyan Miao:
Weakly Supervised Segmentation with Maximum Bipartite Graph Matching. ACM Multimedia 2020: 2085-2094 - [i1]Jiacheng Wei, Guosheng Lin, Kim-Hui Yap, Tzu-Yi Hung, Lihua Xie:
Multi-Path Region Mining For Weakly Supervised 3D Semantic Segmentation on Point Clouds. CoRR abs/2003.13035 (2020)
2010 – 2019
- 2019
- [c13]Ziling Huang, Zheng Wang, Tzu-Yi Hung, Shin'ichi Satoh, Chia-Wen Lin:
Group Re-Identification via Transferred Representation and Adaptive Fusion. BigMM 2019: 128-132 - 2017
- [c12]Vidhya Natarajan, Tzu-Yi Hung, Sriram Vaikundam, Liang-Tien Chia:
Convolutional networks for voting-based anomaly classification in metal surface inspection. ICIT 2017: 986-991 - [c11]Tzu-Yi Hung, Sriram Vaikundam, Vidhya Natarajan, Liang-Tien Chia:
Phase Fourier Reconstruction for Anomaly Detection on Metal Surface Using Salient Irregularity. MMM (1) 2017: 290-302 - 2016
- [c10]Sriram Vaikundam, Tzu-Yi Hung, Liang-Tien Chia:
Anomaly region detection and localization in metal surface inspection. ICIP 2016: 759-763 - [c9]Siyi Pan, Tzu-Yi Hung, Liang-Tien Chia:
Using material classification methods for steel surface defect inspection. ISIE 2016: 40-45 - 2014
- [c8]Tzu-Yi Hung, Jiwen Lu, Yap-Peng Tan, Shenghua Gao:
Efficient Sparsity Estimation via Marginal-Lasso Coding. ECCV (4) 2014: 578-592 - 2013
- [c7]Tzu-Yi Hung, Jiwen Lu, Junlin Hu, Yap-Peng Tan, Yongxin Ge:
Activity-based human identification. ICASSP 2013: 2362-2366 - [c6]Tzu-Yi Hung, Jiwen Lu, Yap-Peng Tan:
Graph-based sparse coding and embedding for activity-based human identification. ICME 2013: 1-6 - [c5]Tzu-Yi Hung, Jiwen Lu, Yap-Peng Tan:
Cross-scene abnormal event detection. ISCAS 2013: 2844-2847 - 2012
- [c4]Tzu-Yi Hung, Ce Zhu, Gao Yang, Yap-Peng Tan:
Video organization: Near-Duplicate Video clustering. ISCAS 2012: 1879-1882 - [c3]Guo-Wei Huang, Tzu-Yi Hung, Chin-Tai Chen:
Design, simulation, and verification of fluidic light-guide chips with various geometries of micro polymer channels. NEMS 2012: 179-182 - 2011
- [j1]Tzu-Yi Hung, Zhenzhong Chen, Yap-Peng Tan:
Packet scheduling with playout adaptation for scalable video delivery over wireless networks. J. Vis. Commun. Image Represent. 22(6): 491-503 (2011) - 2010
- [c2]Tzu-Yi Hung, Zhenzhong Chen, Yap-Peng Tan:
Playout adaptation based packet scheduling for scalable video delivery over wireless links. ICME 2010: 1022-1027
2000 – 2009
- 2008
- [c1]Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, Chiou-Ting Hsu:
Video forgery detection using correlation of noise residue. MMSP 2008: 170-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint