CASIA OpenIR

浏览/检索结果: 共112条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
Adversarial Attacks on Scene Graph Generation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 3210-3225
作者:  Zhao, Mengnan;  Zhang, Lihe;  Wang, Wei;  Kong, Yuqiu;  Yin, Baocai
收藏  |  浏览/下载:6/0  |  提交时间:2024/07/03
Task analysis  Object detection  Windows  Visualization  Mirrors  Predictive models  Perturbation methods  Scene graph generation  adversarial attack  bounding box relabeling  two-step weighted attack  
Improving Generalization of Deepfake Detectors by Imposing Gradient Regularization 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 期号: 2024, 页码: 5345-5356
作者:  Weinan Guan;  Wei Wang;  Jing Dong;  Bo Peng
Adobe PDF(1989Kb)  |  收藏  |  浏览/下载:43/14  |  提交时间:2024/06/21
Deepfake detection  forgery texture patterns  
Pavement Defect Detection with Deep Learning: A Comprehensive Survey 期刊论文
IEEE Transactions on Intelligent Vehicles, 2023, 卷号: 9, 期号: 3, 页码: 4292 - 4311
作者:  Lili Fan;  Dandan Wang;  Junhao Wang;  Yunjie Li;  Yifeng Cao;  Yi Liu;  Xiaoming Chen;  Yutong Wang
Adobe PDF(6287Kb)  |  收藏  |  浏览/下载:50/13  |  提交时间:2024/06/06
Deep learning  pavement defect detection  computer vision  image processing  3D image  
SlowFastFormer for 3D human pose estimation 期刊论文
Computer Vision and Image Understanding, 2024, 卷号: 243, 期号: 243, 页码: 103992
作者:  Zhou Lu;  Chen Yingying;  Wang Jinqiao
Adobe PDF(989Kb)  |  收藏  |  浏览/下载:51/19  |  提交时间:2024/06/03
SlowFastFormer  Transformer  Blending  3D human pose estimation  Hierarchical supervision  
Toward a Fast and Robust MI-BCI: Online Adaptation of Stimulus Paradigm and Classification Model 期刊论文
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2024, 卷号: 73, 页码: 12
作者:  Wang, Jiaxing;  Wang, Weiqun;  Su, Jianqiang;  Wang, Yihan;  Hou, Zeng-Guang
Adobe PDF(1810Kb)  |  收藏  |  浏览/下载:73/10  |  提交时间:2024/05/30
Brain-computer interface (BCI)  classification model adaption  information transfer rate (ITR)  motor imagery (MI) duration  stimulus paradigm adjustment  
A Multi-Modal Classification Method for Early Diagnosis of Mild Cognitive Impairment and Alzheimer's Disease Using Three Paradigms With Various Task Difficulties 期刊论文
IEEE Transactions on Neural Systems and Rehabilitation Engineering, 2024, 卷号: 32, 页码: 1456-1465
作者:  Chen Sheng;  Zhang Chutian;  Yang Hongjun;  Peng Liang;  Xie Haiqun;  Lv Zeping;  Hou Zeng-Guang
Adobe PDF(10190Kb)  |  收藏  |  浏览/下载:50/15  |  提交时间:2024/05/29
Dementia  multi-modal  machine learning  domain-adversarial neural network  
Covariant Peak Constraint for Accurate Keypoint Detection and Keypoint-Specific Descriptor Learning 期刊论文
IEEE Transactions on Multimedia, 2024, 卷号: 26, 页码: 5383 - 5397
作者:  Fu Yujie;  Zhang Pengju;  Tang Fulin;  Wu Yihong
Adobe PDF(15150Kb)  |  收藏  |  浏览/下载:47/11  |  提交时间:2024/05/28
Image Matching  Local Feature Extraction  Covariant Peak Constraint  Conditional Neural Reprojection Error  
Computational Experiments for Complex Social Systems: Integrated Design of Experiment System 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 5, 页码: 1175-1189
作者:  Xiao Xue;  Xiangning Yu;  Deyu Zhou;  Xiao Wang;  Chongke Bi;  Shufang Wang;  Fei-Yue Wang
Adobe PDF(11890Kb)  |  收藏  |  浏览/下载:63/8  |  提交时间:2024/04/10
Artificial society  computational experiments  model integration  operation engine  technology integration  
Subband fusion of complex spectrogram for fake speech detection 期刊论文
SPEECH COMMUNICATION, 2023, 卷号: 155, 页码: 8
作者:  Fan, Cunhang;  Xue, Jun;  Dong, Shunbo;  Ding, Mingming;  Yi, Jiangyan;  Li, Jinpeng;  Lv, Zhao
收藏  |  浏览/下载:57/0  |  提交时间:2024/03/26
Automatic speaker verification  Complex spectrogram  Fake speech detection  Phase information  Subband  
Novel methods for locating and matching IC cells based on standard cell libraries 期刊论文
MICROELECTRONIC ENGINEERING, 2024, 卷号: 283, 页码: 12
作者:  Liu, Can;  Wang, Kaige;  Li, Qing;  Zhao, Fazhan;  Zhao, Kun;  Ma, Hongtu
收藏  |  浏览/下载:89/0  |  提交时间:2024/02/22
Reverse engineering  Integrated circuits  Scanning electron microscopy  Image processing  Hardware security