Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
PointAttN: you only need attention for point cloud completion
AAAI'24/IAAI'24/EAAI'24: Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 608, Pages 5472–5480https://doi.org/10.1609/aaai.v38i6.28356Point cloud completion referring to completing 3D shapes from partial 3D point clouds is a fundamental problem for 3D point cloud analysis tasks. Benefiting from the development of deep neural networks, researches on point cloud completion have made ...
- research-articleJanuary 2024
Adaptive Activation Network for Weakly Supervised Semantic Segmentation
IEEE Transactions on Multimedia (TOM), Volume 26Pages 6078–6089https://doi.org/10.1109/TMM.2023.3307941Class activation maps generated by image classifiers are widely used as priors for image-level weakly supervised semantic segmentation. However, these activation maps mainly focus on the sparse discriminative regions, which has been a bottleneck for the ...
- ArticleDecember 2023
Boosting One-Stage Multi Object Tracking with Attention Learning
AbstractOne-stage multi-object tracking methods have achieved promising results by showing their great balance between accuracy and speed. However, the internal differences and relationships between detection and re-identification (re-ID) lead to worse ...
- ArticleOctober 2023
Dual Temporal Memory Network for Video Salient Object Detection
AbstractVideo salient object detection (VSOD) aims at distinguishing the salient objects from the complex background and highlighting them uniformly in the spatiotemporal domain. One of the fundamental challenges in VSOD is how to make the most use of the ...
- research-articleJuly 2023
Physical layer security of single‐input multiple‐out relay networks over Beaulieu‐Xie fading channels
AbstractWith the progress of communication technology, the increasing wireless devices are hooked up the networks, and the consequent security problems cannot be ignored. At present, the solutions mainly include secret key system and physical layer ...
The single‐input multiple‐out (SIMO) system considered is the Wyner eavesdropper model with decoding and forwarding (DF) relay over Beaulieu‐Xie fading. The two performance evaluation indicators of secure outage probability (SOP) and strictly positive ...
-
- research-articleJanuary 2023
An accurate estimation algorithm for structural change points of multi-dimensional stochastic models
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 44, Issue 3Pages 4817–4829https://doi.org/10.3233/JIFS-222821In order to improve the estimation accuracy of structural change points of multi-dimensional stochastic model, the accurate estimation algorithm of structural change points of multi-dimensional stochastic model is studied. A multi-dimensional stochastic ...
- research-articleJanuary 2022
Clinical Effect of Acupuncture Combined with Traditional Chinese Medicine Application on the Treatment of Functional Dyspepsia in Children and the Influence on Serum 5-HT and NO Levels
Objective. To explore the clinical effect of acupuncture combined with traditional Chinese medicine (TCM) application on the treatment of functional dyspepsia (FD) in children and the influence on serum 5-HT and NO levels. Methods. 94 FD children admitted ...
- ArticleNovember 2021
- research-articleOctober 2021
Body parts relevance learning via expectation–maximization for human pose estimation
Multimedia Systems (MUME), Volume 27, Issue 5Pages 927–939https://doi.org/10.1007/s00530-021-00755-zAbstractRecently, most existing human pose estimation methods fuse multi-stage convolutional modules to learn a shared feature representation. In this paper, we propose a expectation–maximization (EM) mapping-based network to learn specific related body ...
- research-articleJanuary 2021
Secrecy Performance Analysis of a Cognitive Network for IoT over k-μ Channels
With the development of Internet of Things (IoTs), devices are now connecting and communicating together on a heretofore unheard-of scale, forming huge heterogeneous networks of mobile IoT-enabled devices. For beyond 5G- (B5G-) enabled networks, this ...
- research-articleJanuary 2021
Stacked U-Shape Network With Channel-Wise Attention for Salient Object Detection
IEEE Transactions on Multimedia (TOM), Volume 23Pages 1397–1409https://doi.org/10.1109/TMM.2020.2997192This paper addresses the core issue of how to learn powerful features for saliency. We have two major observations. First, feature maps of different layers in convolutional neural networks play different roles in saliency detection. Second, different ...
- ArticleOctober 2020
Top-Down Fusing Multi-level Contextual Features for Salient Object Detection
AbstractRecently, benefiting from the fast development of deep convolutional neural networks, salient object detection (SOD) has achieved gratifying performance in a variety of challenging scenarios. Among them, how to learn more discriminative features ...
- research-articleAugust 2020
Blind motion deblurring with cycle generative adversarial networks
The Visual Computer: International Journal of Computer Graphics (VISC), Volume 36, Issue 8Pages 1591–1601https://doi.org/10.1007/s00371-019-01762-yAbstractBlind motion deblurring is one of the most basic and challenging problems in image processing and computer vision. It aims to recover a sharp image from its blurred version knowing nothing about the blurring process. Many existing methods use the ...
- research-articleJanuary 2020
Secrecy Wireless-Powered Sensor Networks for Internet of Things
This paper investigates a secure wireless-powered sensor network (WPSN) with the aid of a cooperative jammer (CJ). A power station (PS) wirelessly charges for a user equipment (UE) and the CJ to securely transmit information to an access point (AP) in the ...
- ArticleNovember 2019
Local Context Embedding Neural Network for Scene Semantic Segmentation
AbstractThis paper presents a novel and effective architecture for scene semantic segmentation, named Local Context Embedding (LCE) network. Unlike previous work, in this paper we characterize local context by exploiting the content of image patches to ...
- research-articleJune 2018
Mortality prediction based on imbalanced high-dimensional ICU big data
Computers in Industry (CIIN), Volume 98, Issue CPages 218–225https://doi.org/10.1016/j.compind.2018.01.017Graphical abstractDisplay Omitted
Highlights- Focusing on the characteristics of ICU data, machine learning methods are used to realize the mortality prediction.
With the development of biomedical equipment and healthcare level, large amounts of data have been brought out in hospital, especially in Intensive Care Unit (ICU). However, how to better exploit meaningful information from these rich ...
- research-articleApril 2017
Category-specific object segmentation via unsupervised discriminant shape
Pattern Recognition (PATT), Volume 64, Issue CPages 202–214https://doi.org/10.1016/j.patcog.2016.11.009Category-specific object segmentation has been a long-standing research topic in pattern recognition. This paper presents an unsupervised discriminant shape (UDS) to address category-specific object segmentation by incorporating the proposed shape prior ...
- research-articleSeptember 2016
Double Low Rank Matrix Recovery for Saliency Fusion
IEEE Transactions on Image Processing (TIP), Volume 25, Issue 9Pages 4421–4432https://doi.org/10.1109/TIP.2016.2588331In this paper, we address the problem of fusing various saliency detection methods such that the fusion result outperforms each of the individual methods. We observe that the saliency regions shown in different saliency maps are with high probability ...
- articleJanuary 2016
Full time-division broadband communication system-based MIMO OFDM technology
International Journal of Information and Communication Technology (IJICT), Volume 8, Issue 4Pages 371–388In current broadband system schemes, such as VSF-OFCDM, TDD-MIMO-OFDM, TDD-CDM-OFDM and so on, CDMA or OFDMA was adopted as multi-access schemes. The channel estimation overhead and multiuser detection complexity, were the main factors that limited ...
- ArticleDecember 2015
Object Extraction from Bounding Box Prior with Double Sparse Reconstruction
ICCVW '15: Proceedings of the 2015 IEEE International Conference on Computer Vision Workshop (ICCVW)Pages 903–911https://doi.org/10.1109/ICCVW.2015.120Extracting objects from natural images has long been an active problem in image processing. Despite various attempts, it has not been completely solved up to date. Current state-of-the-art object proposal methods tend to extract a set of object segments ...