Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Bangjie Yin"'
Autor:
Pu Wu, Sinan Xie, Yunshi Cai, Hu Liu, Yinghao Lv, Ying Yang, Yucheng He, Bangjie Yin, Tian Lan, Hong Wu
Publikováno v:
Frontiers in Immunology, Vol 15 (2024)
BackgroundObservational studies have indicated that immune dysregulation in primary sclerosing cholangitis (PSC) primarily involves intestinal-derived immune cells. However, the causal relationship between peripheral blood immune cells and PSC remain
Externí odkaz:
https://doaj.org/article/d0778ccd052a4d6599f89b079e3ea11c
Autor:
Changjiu Chen, Zheng Yang, Bangjie Yin, Akihisa Inoue, Jinyong Zhang, Weiming Yang, Ze Sun, Qiaowen Luo, Zheng Chen, Yezeng He, Baolong Shen
Publikováno v:
Journal of Alloys and Compounds. 948:169629
Publikováno v:
IEEE Transactions on Mobile Computing. 20:3131-3147
Since 2016, all of four major U.S. operators have rolled out Wi-Fi calling services. They enable mobile users to place cellular calls over Wi-Fi networks based on the 3GPP IMS technology. Compared with conventional cellular voice solutions, the major
Various facial manipulation techniques have drawn serious public concerns in morality, security, and privacy. Although existing face forgery classifiers achieve promising performance on detecting fake images, these methods are vulnerable to adversari
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::63a8c15069bc033c97c79757de68786c
http://arxiv.org/abs/2203.15674
http://arxiv.org/abs/2203.15674
Autor:
Jilin Li, Yanwei Fu, Xiangyang Xue, Wenxuan Wang, Shouhong Ding, Bangjie Yin, Taiping Yao, Feiyue Huang, Li Zhang
Publikováno v:
CVPR
Deep models have shown their vulnerability when processing adversarial samples. As for the black-box attack, without access to the architecture and weights of the attacked model, training a substitute model for adversarial attacks has attracted wide
Publikováno v:
IJCB
In pursuit of consolidating the face verification systems, prior face anti-spoofing studies excavate the hidden cues in original images to discriminate real persons and diverse attack types with the assistance of auxiliary supervision. However, limit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::706348820de694df1e9b1d14f2f6608f
Publikováno v:
ICCV
Deep CNNs have been pushing the frontier of visual recognition over past years. Besides recognition accuracy, strong demands in understanding deep CNNs in the research community motivate developments of tools to dissect pre-trained models to visualiz
Publikováno v:
Sensors and Actuators B: Chemical. 344:130225
Hydrazine is an important chemical reagent, which has been widely used in chemical industry. However, the extensive usage of N2H4 poses a potential threat to water and air safety due to its good water solubility, strong volatility and high toxicity.
Publikováno v:
SPIE Proceedings.
Multiple-instance learning (MIL) has been successfully utilized in image retrieval. Existing approaches cannot select positive instances correctly from positive bags which may result in a low accuracy. In this paper, we propose a new image retrieval
Publikováno v:
Artificial Intelligence Science and Technology.