CASIA OpenIR

浏览/检索结果: 共23条,第1-10条 帮助

限定条件                            
已选(0)清除 条数/页:   排序方式:
Stage-Aware Hierarchical Attentive Relational Network for Diagnosis Prediction 期刊论文
IEEE Transactions on Knowledge and Data Engineering (TKDE), 2023, 卷号: 36, 期号: 4, 页码: 1773-1784
作者:  Liping Wang;  Qiang Liu;  Mengqi Zhang;  Yaxuan Hu;  Shu Wu;  Liang Wang
Adobe PDF(2088Kb)  |  收藏  |  浏览/下载:20/7  |  提交时间:2024/06/21
Medical diagnostic imaging  Knowledge graphs  Ontologies  Codes  Data models  Predictive models  Graph neural networks  Diagnosis prediction  electronic health record  knowledge graph  relational graph neural network  
Coarse Mask Guided Interactive Object Segmentation 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2023, 卷号: 32, 页码: 5808-5822
作者:  Li, Jing;  Fan, Junsong;  Wang, Yuxi;  Yang, Yuran;  Zhang, Zhaoxiang
Adobe PDF(4323Kb)  |  收藏  |  浏览/下载:54/2  |  提交时间:2024/02/22
Segmentation  interactive  transformer  annotation tool  
FedBrain: A robust multi-site brain network analysis framework based on federated learning for brain disease diagnosis 期刊论文
NEUROCOMPUTING, 2023, 卷号: 559, 页码: 13
作者:  Zhang, Chang;  Meng, Xiangzhu;  Liu, Qiang;  Wu, Shu;  Wang, Liang;  Ning, Huansheng
Adobe PDF(3483Kb)  |  收藏  |  浏览/下载:136/2  |  提交时间:2023/11/16
Functional magnetic resonance image  Brain network  Federated learning  Deep neural networks  Brain disease diagnosis  
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:358/65  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
Multitask deep active contour-based iris segmentation for off-angle iris images 期刊论文
JOURNAL OF ELECTRONIC IMAGING, 2022, 卷号: 31, 期号: 4, 页码: 21
作者:  Lu, Tianhao;  Wang, Caiyong;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5346Kb)  |  收藏  |  浏览/下载:313/39  |  提交时间:2022/11/14
iris recognition  iris segmentation  off-angle iris image  active contour  attention mechanism  
Memory-Modulated Transformer Network for Heterogeneous Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2095-2109
作者:  Luo, Mandi;  Wu, Haoxue;  Huang, Huaibo;  He, Weizan;  He, Ran
Adobe PDF(4712Kb)  |  收藏  |  浏览/下载:382/131  |  提交时间:2022/07/25
Face recognition  Task analysis  Transformers  Encoding  Feature extraction  Image recognition  Memory modules  Heterogeneous face recognition  style transformer  memory network  
Theme-Aware Aesthetic Distribution Prediction With Full-Resolution Photographs 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 页码: 15
作者:  Jia, Gengyun;  Li, Peipei;  He, Ran
Adobe PDF(10845Kb)  |  收藏  |  浏览/下载:279/41  |  提交时间:2022/06/06
Aesthetic quality assessment (AQA)  full resolution  region of image (RoM) pooling  theme  
From Individual to Whole: Reducing Intra-class Variance by Feature Aggregation 期刊论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2022, 卷号: 130, 期号: 3, 页码: 800-819
作者:  Zhang, Zhaoxiang;  Luo, Chuanchen;  Wu, Haiping;  Chen, Yuntao;  Wang, Naiyan;  Song, Chunfeng
Adobe PDF(1762Kb)  |  收藏  |  浏览/下载:305/42  |  提交时间:2022/06/06
Feature aggregation  Deep learning  Intra-class variance  Person re-identification  Video object detection  
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 5003-5017
作者:  Luo, Mandi;  Ma, Xin;  Li, Zhihang;  Cao, Jie;  He, Ran
Adobe PDF(4346Kb)  |  收藏  |  浏览/下载:309/62  |  提交时间:2021/12/28
Face recognition  Task analysis  Visualization  Image recognition  Lighting  Feature extraction  Training  Heterogeneous face recognition  near infrared-visible matching  information bottleneck  neural architecture search  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:371/46  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer