default search action
20th ICIC 2024: Tianjin, China - Part VIII
- De-Shuang Huang, Wei Chen, Yijie Pan:
Advanced Intelligent Computing Technology and Applications - 20th International Conference, ICIC 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part VIII. Lecture Notes in Computer Science 14869, Springer 2024, ISBN 978-981-97-5602-5
Image Processing
- Qianyi Zhan, Yuanyuan Liu:
Protecting Image Copyrights Based on the AUL Algorithm and Blockchain. 3-14 - Shixun Wang, Mengjiao Wang, Yuan Li:
MAPNet: A Multi-scale Attention Pooling Network for Ultrasound Medical Image Segmentation. 15-26 - Qian Guo, Yanlong Xu, Limin Sun, Tao Yang:
Fusion of Saliency and Edge Map for Multi-operator Image Retargeting Algorithm. 27-43 - Xinyi He, Ping Ma, Yiyang Chen, Yuan Liu:
MOD-YOLO: Improved YOLOv5 Based on Multi-softmax and Omni-Dimensional Dynamic Convolution for Multi-label Bridge Defect Detection. 44-55 - Lianshan Liu, Yu Huang:
Color Image Steganography Based on Two-Channel Preprocessing and U-Net Network. 56-68 - Shuqiang Guo, Ming Gao, Bin Xiao, Zhicheng Xie, Wenzhi Ping:
Application of a Hybrid Particle Image Velocimetry Method Based on Window Function in the Field of Turbulence. 69-80 - Zhigao Zeng, Jin Wang, Wei Cao, Jianxin Wang, Jianming Zhang:
Semantics-Enhanced Refiner in Skip Connection for Crack Segmentation. 81-92 - Zhe Lian, Yanjun Yin, Wei Hu, Qiaozhi Xu, Min Zhi, Jingfang Lu, Xuanhao Qi:
Refinement Correction Network for Scene Text Detection. 93-105 - Yutao Jin, Yue Sun, Xiaoyan Chen:
Weight Uncertainty Network for Low-Light Image Enhancement. 106-117 - Yingjie Ma, Shuo Xie, Wei Xu:
Unsupervised Extremely Low-Light Image Enhancement with a Laplacian Pyramid Network. 118-129 - Yun Liu, Zhipeng Wen, Minzhu Jin, Daoxin Fan, Sifan Li, Bo Liu, Jinhe Jiang, Xianda Xiao:
A Multimodal Fake News Detection Model with Self-supervised Unimodal Label Generation. 130-141 - Zhi Wang, Fengying Ma, Peng Ji, Chengcai Fu:
Image Denoising Based on an Improved Wavelet Threshold and Total Variation Model. 142-154 - Caiwang Zhang, Wei Liu, Xiaoyu Huang, Zhiguo Kang:
A Two-Stage Coupled Learning Network for Image Deblurring. 155-166 - Li Shang, Bo Huang:
Palmprint Recognition Using SC-LNMF Model in Gabor Domain. 167-178 - Xin Jing, Shushuo Yang, Heyang Zhou, Gao Wang, Keming Mao:
SkinDiff: A Novel Data Synthesis Method Based on Latent Diffusion Model for Skin Lesion Segmentation. 179-191 - Ningzhi Wang, Zhenda Yu, Zerui Li, Zhenyu Qi, Wenjun Lv:
MFAAnet: New Feature Extraction Network in Image Super-Resolution. 192-202 - Shan Yang, Hangyuan Yang, Yanglin Pu, Yanbin Wang, Zhuhong You:
Context-Aware Relative Distinctive Feature Learning for Person Re-identification. 203-215 - Weidong Tian, Wenzheng Xu, Junxiang Zhao, Zhongqiu Zhao:
Image Captioning with Masked Diffusion Model. 216-227 - Yaxin Ji, Lan Di, Yudi Gu, Zaiyong Zhou:
Textile Defect Detection Based on Multi-proportion Spatial Pyramid Convolution and Adaptive Multi-scale Feature Fusion. 228-240 - Yang Zhang, Chunming Wu:
Real-Time Detection of Multi-scale Traffic Signs Based on Decoupled Heads. 241-252 - Yanglin Pu, Chen Gao, Bo Liu, Si Liu, Shan Yang, Junhua Xiao, Shiliang Pu, Zhuhong You, Yanbin Wang:
LAROD-HD: Low-Cost Adaptive Real-Time Object Detection for High-Resolution Video Surveillance. 253-265 - Daole Wang, Ping Wang, Xiuyang Zhao, Lei Tan, Jinshuo Zhang, Hengxiang Shi, Jun Wang:
Complementary Attention Based Dual-Task Pseudo-labeling for Medical Image Segmentation. 266-278 - Longxia Guo, Yunlong Yan, Yundong Li:
Unsupervised Subdomain Adaptation Robust to Noisy Pseudo Labels Using Symmetric Loss. 279-292 - Shijie Liu, Kang Yan, Feiwei Qin, Changmiao Wang, Ruiquan Ge, Kai Zhang, Jie Huang, Yong Peng, Jin Cao:
Infrared Image Super-Resolution via Lightweight Information Split Network. 293-304
Information Security
- Tian Wang, Weidong Fang, Mufan Ni, Xiaoliang Yang, Wei Chen, Wentao Chen, Wuxiong Zhang:
Intelligent Computing Making Access Control More Secure: From Cipher to Trust. 307-317 - Wenli Shang, Zifeng Huang, Zhaojun Gu, Zhong Cao, Lei Ding, Shuang Wang:
CWMAGAN-GP-Based Oversampling Technique for Intrusion Detection. 318-330 - Jianrong Li, Zhiqiang Xu, Pengyu Han, Huiying Sun, Ting Ke, Wei Chen, Chuanlei Zhang:
AES Improvement Algorithm Based on the Chaotic System in IIOT. 331-342 - Laijin Meng, Xinghao Jiang, Qiang Xu, Zhongjie Mi:
A Coverless Image Steganography Based on a Robust Object Detection Network. 343-356 - Huazhen Zhong, Jibin Wang, Xuejian Wang, Xin Wang, Wenjie Xiao, Xuehai Tang, Liangjun Zang:
DBPrompt: A Database Anomaly Operation Detection and Analysis via Prompt Learning. 357-368 - Xuelei Liu, Guojun Wang, Mingfei Chen, Peiqiang Li, Jinyao Zhu:
A Vulnerability Detection Method for Smart Contract Using Opcode Sequences with Variable Length. 369-380 - Yu Zhang, Yanqing Song, Jianguo Chen, Long Chen:
Generative Adversarial Network for Enhancement Network Security Log Detection. 381-390 - Rui Chen, Waleed Younas, Jing Zhao:
Firm-Vehicle: Trusted Communication Enabled Instruction Embedding Model for Resource-Constrained VANET Environments. 391-402 - Ruizhong Du, Yifan Wang, Mingyue Li, Tao Shang:
Privacy-Preserving Retrieval Scheme Over Medical Images Based on Vision Transformer. 403-415 - Tian Wu, Xuan Hu, Yijun Hu, Yizhe Wang, Chunnian Liu, Yiping Zhu:
Robust Generative Steganography via Intermediate State Normal Distribution. 416-426 - Yu Jiang, Pengchuan Wang, Qianmu Li, Nan Liu:
UTPrompt: Cross-Task Backdoor Prompt Attacks Based on Universal Triggers. 427-438 - Jin Qian, Kaimin Wei, Yongdong Wu, Jilian Zhang, Jinpeng Chen, Huan Bao:
GI-SMN: Gradient Inversion Attack Against Federated Learning Without Prior Knowledge. 439-448 - Weinan Zhai, Siqi Liu, Yue Yu, Wei An, Jianjun Yu, Lingling Zhang:
Network Traffic Risk Identification Based on Deep Learning Model. 449-460 - Minglong Cheng, Wei Chen, Weidong Fang, Jueting Liu, Tingting Xu, Zehua Wang:
Feedback Mechanism-Based Trust Evaluation Model for Mobile Edge Computing in Industrial IoT. 461-469 - Lu Yuan, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Wei Ma:
CoSen-IDS: A Novel Cost-Sensitive Intrusion Detection System on Imbalanced Data in 5G Networks. 470-481 - Chuanyin Wang, Yifei Zhang, Neng Gao:
Elevating Privacy in Federated Learning: An Efficient Approach with SAM Optimization for Personalized Local Models. 482-493 - Weimeng Zhang, Junqing Li:
A Knowledge-Driven Cooperative Optimization Algorithm for Multi-objective Energy-Efficient Flexible Job Scheduling with Variable Machine Speeds. 494-505
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.