CASIA OpenIR

浏览/检索结果: 共21条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Event-Triggered-Based Consensus Neural Network Tracking Control for Nonlinear Pure-Feedback Multiagent Systems With Delayed Full-State Constraints 期刊论文
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2023, 页码: 11
作者:  Wang, Xiao-An;  Zhang, Guang-Ju;  Niu, Ben;  Wang, Ding;  Wang, Xiao-Mei
收藏  |  浏览/下载:43/0  |  提交时间:2024/02/22
Nonlinear multiagent systems  delayed full state constraints  event-triggered design  asymptotic tracking control  adaptive control  
Efficient spatiotemporal context modeling for action recognition 期刊论文
NEUROCOMPUTING, 2023, 卷号: 545, 页码: 13
作者:  Cao, Congqi;  Lu, Yue;  Zhang, Yifan;  Jiang, Dongmei;  Zhang, Yanning
收藏  |  浏览/下载:77/0  |  提交时间:2023/11/17
Action recognition  Long -range context modeling  Spatiotemporal feature map  Attention module  Relation  
Learning to Adapt Across Dual Discrepancy for Cross-Domain Person Re-Identification 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 2, 页码: 1963-1980
作者:  Luo, Chuanchen;  Song, Chunfeng;  Zhang, Zhaoxiang
Adobe PDF(2539Kb)  |  收藏  |  浏览/下载:215/65  |  提交时间:2023/03/20
Person re-identification  domain adaptation  cross-domain mixup  camera-aware learning  self-paced learning  
Multitask deep active contour-based iris segmentation for off-angle iris images 期刊论文
JOURNAL OF ELECTRONIC IMAGING, 2022, 卷号: 31, 期号: 4, 页码: 21
作者:  Lu, Tianhao;  Wang, Caiyong;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5346Kb)  |  收藏  |  浏览/下载:235/32  |  提交时间:2022/11/14
iris recognition  iris segmentation  off-angle iris image  active contour  attention mechanism  
Perturbation Inactivation Based Adversarial Defense for Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:  Ren, Min;  Zhu, Yuhao;  Wang, Yunlong;  Sun, Zhenan
Adobe PDF(5658Kb)  |  收藏  |  浏览/下载:254/49  |  提交时间:2022/11/14
Face recognition  Perturbation methods  Robustness  Immune system  Principal component analysis  Deep learning  Training  Adversarial machine learning  deep learning  graph neural network  face recognition  
Memory-Modulated Transformer Network for Heterogeneous Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2095-2109
作者:  Luo, Mandi;  Wu, Haoxue;  Huang, Huaibo;  He, Weizan;  He, Ran
Adobe PDF(4712Kb)  |  收藏  |  浏览/下载:344/123  |  提交时间:2022/07/25
Face recognition  Task analysis  Transformers  Encoding  Feature extraction  Image recognition  Memory modules  Heterogeneous face recognition  style transformer  memory network  
A Unified Framework for Biphasic Facial Age Translation With Noisy-Semantic Guided Generative Adversarial Networks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 1513-1527
作者:  Sun, Muyi;  Wang, Jian;  Liu, Jian;  Li, Jianshu;  Chen, Tao;  Sun, Zhenan
收藏  |  浏览/下载:238/0  |  提交时间:2022/06/10
Semantics  Faces  Face recognition  Training  Noise measurement  Layout  Image synthesis  Biphasic facial age translation  noisy semantic injection  generative adversarial network  attention mechanism  feature disentanglement  
Theme-Aware Aesthetic Distribution Prediction With Full-Resolution Photographs 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 页码: 15
作者:  Jia, Gengyun;  Li, Peipei;  He, Ran
Adobe PDF(10845Kb)  |  收藏  |  浏览/下载:242/34  |  提交时间:2022/06/06
Aesthetic quality assessment (AQA)  full resolution  region of image (RoM) pooling  theme  
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 5003-5017
作者:  Luo, Mandi;  Ma, Xin;  Li, Zhihang;  Cao, Jie;  He, Ran
Adobe PDF(4346Kb)  |  收藏  |  浏览/下载:268/55  |  提交时间:2021/12/28
Face recognition  Task analysis  Visualization  Image recognition  Lighting  Feature extraction  Training  Heterogeneous face recognition  near infrared-visible matching  information bottleneck  neural architecture search  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:329/36  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer