Zobrazeno 1 - 10
of 120
pro vyhledávání: '"WENG Bin"'
Publikováno v:
Rock and Soil Mechanics, Vol 43, Iss 4, Pp 857-867 (2022)
In order to realize the visualization of unsaturated preferential flow migration of soil, a column device was designed to carry out unsaturated seepage tests. The transparent soil and digital image processing technology were used to establish the rel
Externí odkaz:
https://doaj.org/article/34e27a2a94f1478fbbd574622c0a8f31
The security of the Person Re-identification(ReID) model plays a decisive role in the application of ReID. However, deep neural networks have been shown to be vulnerable, and adding undetectable adversarial perturbations to clean images can trick dee
Externí odkaz:
http://arxiv.org/abs/2101.08783
Publikováno v:
In Journal of Hydrology February 2024 630
We have proposed to develop a global hybrid deep learning framework to predict the daily prices in the stock market. With representation learning, we derived an embedding called Stock2Vec, which gives us insight for the relationship among different s
Externí odkaz:
http://arxiv.org/abs/2010.01197
Publikováno v:
网络与信息安全学报, Vol 7, Iss 2, Pp 151-160 (2021)
In view of the existing Deepfake detection algorithms, such problems as low accuracy and poor interpretability are common. A neural network model combining the double attention was proposed, which used channel attention to capture the abnormal featur
Externí odkaz:
https://doaj.org/article/8e8627ca060844718b0aa33052cf54a6
Autor:
Weng Bin Ueng, 翁文彬
88
Conventional In-vehicle Route Guidance Systems often utilize closed and centralized architectures by placing road database management and optimal route calculation tasks in the computer on-board of the vehicle. Such approach usually has compl
Conventional In-vehicle Route Guidance Systems often utilize closed and centralized architectures by placing road database management and optimal route calculation tasks in the computer on-board of the vehicle. Such approach usually has compl
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/85675784602371187953
Publikováno v:
网络与信息安全学报, Vol 5, Iss 5, Pp 64-79 (2019)
The traditional video passive forensics method using only the principle of similarity between adjacent frames will cause a lot of false detection for the video with severe motion.Aiming at this problem, a video tamper detection method combining spati
Externí odkaz:
https://doaj.org/article/50c6dee5dbee43819f7834c72c8bc6ea
Publikováno v:
In Expert Systems With Applications 1 December 2018 112:258-273
Autor:
Weng, Bin, Martinez, Waldyn, Tsai, Yao-Te, Li, Chen, Lu, Lin, Barth, James R., Megahed, Fadel M.
Publikováno v:
In Applied Soft Computing October 2018 71:685-697
Autor:
Lin, Zhaoyu, Sun, Lijuan, Xie, Shule, Zhang, Shanyi, Fan, Song, Li, Qunxing, Chen, Weixiong, Pan, Guokai, Wang, Weiwei, Weng, Bin, Zhang, Zhang, Liu, Bodu, Li, Jinsong
Publikováno v:
In Molecular Therapy 6 June 2018 26(6):1494-1508