Zobrazeno 1 - 10
of 184
pro vyhledávání: '"JIALIE SHEN"'
Publikováno v:
IET Image Processing, Vol 15, Iss 14, Pp 3487-3497 (2021)
Abstract Motion information has been widely exploited for group activity recognition in sports video. However, in order to model and extract the various motion information between the adjacent frames, existing algorithms only use the coarse video‐l
Externí odkaz:
https://doaj.org/article/631c0cbd2e244026b895fee7983080bd
Publikováno v:
ACM Transactions on Information Systems. 41:1-25
Deep cross-modal hashing retrieval models inherit the vulnerability of deep neural networks. They are vulnerable to adversarial attacks, especially for the form of subtle perturbations to the inputs. Although many adversarial attack methods have been
Publikováno v:
IEEE Transactions on Image Processing. 32:2215-2227
Autor:
Liang Peng, Yujie Mo, Jie Xu, Jialie Shen, Xiaoshuang Shi, Xiaoxiao Li, Heng Tao Shen, Xiaofeng Zhu
Publikováno v:
IEEE Transactions on Neural Networks and Learning Systems. :1-14
Publikováno v:
IEEE Transactions on Cognitive and Developmental Systems. 14:892-901
Few-shot learning aims at heuristically resolving new tasks with limited labeled data; most of the existing approaches are affected by knowledge learned from similar experiences. However, inter-class barriers and new samples insufficiency limit the t
Learned Pair Weighting and Contextual Memory for Deep Metric Learning.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::22ea5c3b09595f45eb2a6372b23eabb2
https://doi.org/10.36227/techrxiv.22361128
https://doi.org/10.36227/techrxiv.22361128
Autor:
Deyin Liu, Lin (Yuanbo) Wu, Richang Hong, Zongyuan Ge, Jialie Shen, Farid Boussaid, Mohammed Bennamoun
The vulnerability of re-identification (re-ID) models under adversarial attacks is of significant concern as criminals may use adversarial perturbations to evade surveillance systems. Unlike a closed-world re-ID setting (i.e., a fixed number of train
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2e859bfbd13d11041cf903adbac08f06
https://cronfa.swan.ac.uk/Record/cronfa63558
https://cronfa.swan.ac.uk/Record/cronfa63558
Autor:
Suping Zhou, Jia Jia, Zhiyong Wu, Zhihan Yang, Yanfeng Wang, Wei Chen, Fanbo Meng, Shuo Huang, Jialie Shen, Xiaochuan Wang
Publikováno v:
Proceedings of the AAAI Conference on Artificial Intelligence. 35:6039-6047
Effective emotion inference from user queries helps to give a more personified response for Voice Dialogue Applications(VDAs). The tremendous amounts of VDA users bring in diverse emotion expressions. How to achieve a high emotion inferring performan
Publikováno v:
Computers, Materials & Continua. 68:3045-3060
Publikováno v:
Computers, Materials & Continua. 68:1505-1517