CASIA OpenIR

浏览/检索结果: 共17条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Learning to Adapt Across Dual Discrepancy for Cross-Domain Person Re-Identification 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 2, 页码: 1963-1980
作者:  Luo, Chuanchen;  Song, Chunfeng;  Zhang, Zhaoxiang
Adobe PDF(2539Kb)  |  收藏  |  浏览/下载:207/61  |  提交时间:2023/03/20
Person re-identification  domain adaptation  cross-domain mixup  camera-aware learning  self-paced learning  
Temporal sparse adversarial attack on sequence-based gait recognition 期刊论文
PATTERN RECOGNITION, 2023, 卷号: 133, 页码: 11
作者:  He, Ziwen;  Wang, Wei;  Dong, Jing;  Tan, Tieniu
Adobe PDF(1435Kb)  |  收藏  |  浏览/下载:294/53  |  提交时间:2022/11/21
Adversarial attack  Gait recognition  Temporal sparsity  
Pixel type classification based reversible data hiding for hyperspectral images 期刊论文
KNOWLEDGE-BASED SYSTEMS, 2022, 卷号: 254, 页码: 11
作者:  Fan, Guojun;  Pan, Zhibin;  Zhou, Quan;  Dong, Jing;  Zhang, Xiaoran
收藏  |  浏览/下载:137/0  |  提交时间:2022/11/14
Hyperspectral images  Pixel classifying  Adaptive prediction  Three -components complexity  Reversible data hiding  
Memory-Modulated Transformer Network for Heterogeneous Face Recognition 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2095-2109
作者:  Luo, Mandi;  Wu, Haoxue;  Huang, Huaibo;  He, Weizan;  He, Ran
Adobe PDF(4712Kb)  |  收藏  |  浏览/下载:333/117  |  提交时间:2022/07/25
Face recognition  Task analysis  Transformers  Encoding  Feature extraction  Image recognition  Memory modules  Heterogeneous face recognition  style transformer  memory network  
Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2022, 卷号: 16, 期号: 3, 页码: 11
作者:  Fan, Junsong;  Wang, Yuxi;  Guan, He;  Song, Chunfeng;  Zhang, Zhaoxiang
Adobe PDF(4804Kb)  |  收藏  |  浏览/下载:273/46  |  提交时间:2022/06/10
domain adaptation  semantic segmentation  
Theme-Aware Aesthetic Distribution Prediction With Full-Resolution Photographs 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 页码: 15
作者:  Jia, Gengyun;  Li, Peipei;  He, Ran
Adobe PDF(10845Kb)  |  收藏  |  浏览/下载:233/32  |  提交时间:2022/06/06
Aesthetic quality assessment (AQA)  full resolution  region of image (RoM) pooling  theme  
From Individual to Whole: Reducing Intra-class Variance by Feature Aggregation 期刊论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2022, 卷号: 130, 期号: 3, 页码: 800-819
作者:  Zhang, Zhaoxiang;  Luo, Chuanchen;  Wu, Haiping;  Chen, Yuntao;  Wang, Naiyan;  Song, Chunfeng
Adobe PDF(1762Kb)  |  收藏  |  浏览/下载:262/34  |  提交时间:2022/06/06
Feature aggregation  Deep learning  Intra-class variance  Person re-identification  Video object detection  
Adversarial-Metric Learning for Audio-Visual Cross-Modal Matching 期刊论文
IEEE TRANSACTIONS ON MULTIMEDIA, 2022, 卷号: 24, 页码: 338-351
作者:  Zheng, Aihua;  Hu, Menglan;  Jiang, Bo;  Huang, Yan;  Yan, Yan;  Luo, Bin
收藏  |  浏览/下载:230/0  |  提交时间:2022/03/17
Visualization  Task analysis  Measurement  Speech recognition  Videos  Location awareness  Image recognition  Adversarial learning  audio-visual matching  cross-modal learning  metric learning  
Partial NIR-VIS Heterogeneous Face Recognition With Automatic Saliency Search 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 5003-5017
作者:  Luo, Mandi;  Ma, Xin;  Li, Zhihang;  Cao, Jie;  He, Ran
Adobe PDF(4346Kb)  |  收藏  |  浏览/下载:259/53  |  提交时间:2021/12/28
Face recognition  Task analysis  Visualization  Image recognition  Lighting  Feature extraction  Training  Heterogeneous face recognition  near infrared-visible matching  information bottleneck  neural architecture search  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:319/33  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer