CASIA OpenIR

浏览/检索结果: 共16条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Molecular Contrastive Pretraining with Collaborative Featurizations 期刊论文
Journal of Chemical Information and Modeling (JCIM), 2024, 卷号: 64, 期号: 4, 页码: 1112–1122
作者:  Yanqiao Zhu;  Dingshuo Chen;  Yuanqi Du;  Yingze Wang;  Qiang Liu;  Shu Wu
Adobe PDF(1868Kb)  |  收藏  |  浏览/下载:23/9  |  提交时间:2024/06/21
Unsupervised Graph Representation Learning with Cluster-aware Self-training and Refining 期刊论文
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 卷号: 14, 期号: 5, 页码: 21
作者:  Zhu, Yanqiao;  Xu, Yichen;  Yu, Feng;  Liu, Qiang;  Wu, Shu
Adobe PDF(1686Kb)  |  收藏  |  浏览/下载:100/5  |  提交时间:2023/12/21
Cluster-aware self-training and refining  unsupervised learning  graph representation learning  
Learning to Adapt Across Dual Discrepancy for Cross-Domain Person Re-Identification 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 2, 页码: 1963-1980
作者:  Luo, Chuanchen;  Song, Chunfeng;  Zhang, Zhaoxiang
Adobe PDF(2539Kb)  |  收藏  |  浏览/下载:265/80  |  提交时间:2023/03/20
Person re-identification  domain adaptation  cross-domain mixup  camera-aware learning  self-paced learning  
Multitask deep active contour-based iris segmentation for off-angle iris images 期刊论文
JOURNAL OF ELECTRONIC IMAGING, 2022, 卷号: 31, 期号: 4, 页码: 21
作者:  Lu, Tianhao;  Wang, Caiyong;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5346Kb)  |  收藏  |  浏览/下载:324/40  |  提交时间:2022/11/14
iris recognition  iris segmentation  off-angle iris image  active contour  attention mechanism  
Perturbation Inactivation Based Adversarial Defense for Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:  Ren, Min;  Zhu, Yuhao;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5658Kb)  |  收藏  |  浏览/下载:291/59  |  提交时间:2022/11/14
Face recognition  Perturbation methods  Robustness  Immune system  Principal component analysis  Deep learning  Training  Adversarial machine learning  deep learning  graph neural network  face recognition  
Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2022, 卷号: 16, 期号: 3, 页码: 11
作者:  Fan, Junsong;  Wang, Yuxi;  Guan, He;  Song, Chunfeng;  Zhang, Zhaoxiang
Adobe PDF(4804Kb)  |  收藏  |  浏览/下载:324/56  |  提交时间:2022/06/10
domain adaptation  semantic segmentation  
VAG: A Uniform Model for Cross-Modal Visual-Audio Mutual Generation 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 页码: 13
作者:  Hao, Wangli;  Guan, He;  Zhang, Zhaoxiang
Adobe PDF(37909Kb)  |  收藏  |  浏览/下载:240/0  |  提交时间:2022/06/10
Task analysis  Instruments  Visualization  Image reconstruction  Generators  Decoding  Generative adversarial networks  Cross modality  cross-modal generation  mutual generation  visual and audio  
From Individual to Whole: Reducing Intra-class Variance by Feature Aggregation 期刊论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2022, 卷号: 130, 期号: 3, 页码: 800-819
作者:  Zhang, Zhaoxiang;  Luo, Chuanchen;  Wu, Haiping;  Chen, Yuntao;  Wang, Naiyan;  Song, Chunfeng
Adobe PDF(1762Kb)  |  收藏  |  浏览/下载:311/43  |  提交时间:2022/06/06
Feature aggregation  Deep learning  Intra-class variance  Person re-identification  Video object detection  
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 5003-5017
作者:  Luo, Mandi;  Ma, Xin;  Li, Zhihang;  Cao, Jie;  He, Ran
Adobe PDF(4346Kb)  |  收藏  |  浏览/下载:314/63  |  提交时间:2021/12/28
Face recognition  Task analysis  Visualization  Image recognition  Lighting  Feature extraction  Training  Heterogeneous face recognition  near infrared-visible matching  information bottleneck  neural architecture search  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:376/47  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer