CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共12条,第1-10条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
Parallel Transportation in TransVerse: From Foundation Models to DeCAST 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 卷号: 24, 期号: 12, 页码: 15310-15327
作者:  Zhao, Chen;  Wang, Xiao;  Lv, Yisheng;  Tian, Yonglin;  Lin, Yilun;  Wang, Fei-Yue
Adobe PDF(4139Kb)  |  收藏  |  浏览/下载:176/7  |  提交时间:2023/11/16
Intelligent Transportation Systems (ITS)  Cyber-Physical-Social Systems (CPSS)  Artificial Systems, Computational Experiments, Parallel Execution (ACP)  Decentralized/Distributed Autonomous Operations and Organizations (DAO)  
Data Augmented Deep Behavioral Cloning for Urban Traffic Control Operations Under a Parallel Learning Framework 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 卷号: 23, 期号: 6, 页码: 5128-5137
作者:  Li, Xiaoshuang;  Ye, Peijun;  Jin, Junchen;  Zhu, Fenghua;  Wang, Fei-Yue
Adobe PDF(2319Kb)  |  收藏  |  浏览/下载:339/68  |  提交时间:2022/01/27
Generative adversarial networks  Data models  Gallium nitride  Task analysis  Complex systems  Intelligent traffic signal operations  deep behavioral cloning  
An IVC-Based Nuclear Emergency Parallel Evacuation System 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 卷号: 8, 期号: 4, 页码: 844-855
作者:  Tan, Ke;  Yang, Linyao;  Liu, Xin;  Xu, Yancai;  Lin, Jiazhen;  Wang, Xiao;  Wang, Fei-Yue
Adobe PDF(2418Kb)  |  收藏  |  浏览/下载:297/45  |  提交时间:2021/11/02
Computational modeling  Planning  Optimization  Roads  Mathematical model  Collaboration  Power generation  ACP  intelligent vehicle collaborative system  nuclear evacuation  optimization  parallel intelligence  
Multi-object tracking with hard-soft attention network and group-based cost minimization 期刊论文
NEUROCOMPUTING, 2021, 卷号: 447, 页码: 80-91
作者:  Liu, Yating;  Li, Xuesong;  Bai, Tianxiang;  Wang, Kunfeng;  Wang, Fei-Yue
Adobe PDF(2352Kb)  |  收藏  |  浏览/下载:356/89  |  提交时间:2021/08/15
Multi-object tracking  Attention mechanism  Unary and binary costs  Appearance-motion affinity  
3D-RVP: A method for 3D object reconstruction from a single depth view using voxel and point 期刊论文
NEUROCOMPUTING, 2021, 卷号: 430, 期号: 2021, 页码: 94-103
作者:  Zhao, Meihua;  Xiong, Gang;  Zhou, MengChu;  Shen, Zhen;  Wang, Fei-Yue
Adobe PDF(1476Kb)  |  收藏  |  浏览/下载:318/41  |  提交时间:2021/03/29
3D object reconstruction  Encoder-decoder network  Machine learning  Point prediction network  
KM4: Visual reasoning via Knowledge EmbeddingMemoryModel with MutualModulation 期刊论文
INFORMATION FUSION, 2021, 卷号: 67, 页码: 14-28
作者:  Zheng, Wenbo;  Yan, Lan;  Gou, Chao;  Wang, Fei-Yue
收藏  |  浏览/下载:310/0  |  提交时间:2021/03/01
Visual reasoning  Knowledge-based representation learning  Memory network  Knowledge embedding  
Joint image-to-image translation with denoising using enhanced generative adversarial networks 期刊论文
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 卷号: 91, 页码: 9
作者:  Yan, Lan;  Zheng, Wenbo;  Wang, Fei-Yue;  Gou, Chao
Adobe PDF(4437Kb)  |  收藏  |  浏览/下载:320/49  |  提交时间:2021/03/01
Image-to-image translation  Generative adversarial networks  Image enhancement  Image denoising  
A parallel vision approach to scene-specific pedestrian detection 期刊论文
NEUROCOMPUTING, 2020, 卷号: 394, 页码: 114-126
作者:  Zhang, Wenwen;  Wang, Kunfeng;  Liu, Yating;  Lu, Yue;  Wang, Fei-Yue
Adobe PDF(4090Kb)  |  收藏  |  浏览/下载:372/55  |  提交时间:2020/06/22
Pedestrian detection  Specific scene  Synthetic data  Video surveillance  Parallel vision  
Mask SSD: An Effective Single-Stage Approach to Object Instance Segmentation 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2020, 卷号: 29, 期号: 1, 页码: 2078-2093
作者:  Zhang, Hui;  Tian, Yonglin;  Wang, Kunfeng;  Zhang, Wensheng;  Wang, Fei-Yue
浏览  |  Adobe PDF(4983Kb)  |  收藏  |  浏览/下载:378/165  |  提交时间:2020/03/30
Object detection  instance segmentation  feedback features  single-shot detector  
Adversarial attacks on Faster R-CNN object detector 期刊论文
NEUROCOMPUTING, 2020, 卷号: 382, 期号: 无, 页码: 87-95
作者:  Wang, Yutong;  Wang, Kunfeng;  Zhu, Zhanxing;  Wang, Fei-Yue
Adobe PDF(5655Kb)  |  收藏  |  浏览/下载:320/69  |  提交时间:2020/03/30
Adversarial attack  Object detection  White-box attack  Black-box attack