CASIA OpenIR

浏览/检索结果: 共10条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
A Parallel Teacher for Synthetic-to-Real Domain Adaptation of Traffic Object Detection 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2022, 卷号: 7, 期号: 3, 页码: 441-455
作者:  Wang, Jiangong;  Shen, Tianyu;  Tian, Yonglin;  Wang, Yutong;  Gou, Chao;  Wang, Xiao;  Yao, Fei;  Sun, Changyin
Adobe PDF(2602Kb)  |  收藏  |  浏览/下载:272/64  |  提交时间:2022/11/28
Object detection  Feature extraction  Data models  Training  Knowledge engineering  Detectors  Computational modeling  Computer vision  Unsupervised Domain Adaptation  Teacher-student learning  Traffic object detection  
Trip Purposes Mining From Mobile Signaling Data 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 卷号: 99, 期号: 99, 页码: 13
作者:  Li, Zhishuai;  Xiong, Gang;  Wei, Zebing;  Zhang, Yu;  Zheng, Meng;  Liu, Xiaoli;  Tarkoma, Sasu;  Huang, Min;  Lv, Yisheng;  Wu, Chuheng
Adobe PDF(3962Kb)  |  收藏  |  浏览/下载:385/72  |  提交时间:2022/01/27
Cellular networks  Trajectory  Semantics  Unsupervised learning  Supervised learning  Resource management  Public transportation  Trip purpose inference  cellular network data  latent Dirichlet allocation  travel behavior  big data  
Multi-object tracking with hard-soft attention network and group-based cost minimization 期刊论文
NEUROCOMPUTING, 2021, 卷号: 447, 页码: 80-91
作者:  Liu, Yating;  Li, Xuesong;  Bai, Tianxiang;  Wang, Kunfeng;  Wang, Fei-Yue
Adobe PDF(2352Kb)  |  收藏  |  浏览/下载:315/79  |  提交时间:2021/08/15
Multi-object tracking  Attention mechanism  Unary and binary costs  Appearance-motion affinity  
3D-RVP: A method for 3D object reconstruction from a single depth view using voxel and point 期刊论文
NEUROCOMPUTING, 2021, 卷号: 430, 期号: 2021, 页码: 94-103
作者:  Zhao, Meihua;  Xiong, Gang;  Zhou, MengChu;  Shen, Zhen;  Wang, Fei-Yue
Adobe PDF(1476Kb)  |  收藏  |  浏览/下载:291/35  |  提交时间:2021/03/29
3D object reconstruction  Encoder-decoder network  Machine learning  Point prediction network  
Parallel Transportation Systems: Toward IoT-Enabled Smart Urban Traffic Control and Management 期刊论文
IEEE Transactions on Intelligent Transportation Systems, 2020, 卷号: 21, 期号: 10, 页码: 4063 - 4071
作者:  Fenghua Zhu;  Yisheng Lv;  Yuanyuan Chen;  Xiao Wang;  Gang Xiong;  Fei-Yue Wang
Adobe PDF(2879Kb)  |  收藏  |  浏览/下载:445/227  |  提交时间:2020/10/15
Intelligent transportation systems  
Parallel control for continuous-time linear systems: A case study 期刊论文
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2020, 卷号: 7, 期号: 4, 页码: 919-928
作者:  Wei, Qinglai;  Li, Hongyang;  Wang, Fei-Yue
Adobe PDF(4146Kb)  |  收藏  |  浏览/下载:253/27  |  提交时间:2020/08/03
Continuous-time linear systems  digital twin  parallel controller  parallel intelligence  parallel systems  
A parallel vision approach to scene-specific pedestrian detection 期刊论文
NEUROCOMPUTING, 2020, 卷号: 394, 页码: 114-126
作者:  Zhang, Wenwen;  Wang, Kunfeng;  Liu, Yating;  Lu, Yue;  Wang, Fei-Yue
Adobe PDF(4090Kb)  |  收藏  |  浏览/下载:343/52  |  提交时间:2020/06/22
Pedestrian detection  Specific scene  Synthetic data  Video surveillance  Parallel vision  
Mask SSD: An Effective Single-Stage Approach to Object Instance Segmentation 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 卷号: 29, 期号: 1, 页码: 2078-2093
作者:  Zhang, Hui;  Tian, Yonglin;  Wang, Kunfeng;  Zhang, Wensheng;  Wang, Fei-Yue
Adobe PDF(4983Kb)  |  收藏  |  浏览/下载:362/160  |  提交时间:2020/03/30
Object detection  instance segmentation  feedback features  single-shot detector  
Progress and Outlook of Visual Tracking: Bibliographic Analysis and Perspective 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 184581-184598
作者:  Liu, Yating;  Wang, Kunfeng;  Li, Xuesong;  Bai, Tianxiang;  Wang, Fei-Yue
Adobe PDF(4276Kb)  |  收藏  |  浏览/下载:200/33  |  提交时间:2020/03/30
Visual tracking  bibliographic analysis  collaboration patterns  research hotspots  parallel vision  
Adversarial attacks on Faster R-CNN object detector 期刊论文
NEUROCOMPUTING, 2020, 卷号: 382, 期号: 无, 页码: 87-95
作者:  Wang, Yutong;  Wang, Kunfeng;  Zhu, Zhanxing;  Wang, Fei-Yue
Adobe PDF(5655Kb)  |  收藏  |  浏览/下载:295/59  |  提交时间:2020/03/30
Adversarial attack  Object detection  White-box attack  Black-box attack