Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Data-Driven Tennis Strategy Evaluation through Hierarchical Markov Models
ICIIP '24: Proceedings of the 2024 9th International Conference on Intelligent Information ProcessingPages 219–225https://doi.org/10.1145/3696952.3696982This study introduces a novel methodology for evaluating tennis player performance through the application of Hierarchical Markov Models (HMM). By dissecting the game's flow and modeling the transitions between states, our proposed model captures the ...
- research-articleNovember 2024
Toward real text manipulation detection: New dataset and new solution
AbstractWith the surge in realistic text tampering, detecting fraudulent text in images has gained prominence for maintaining information security. However, the high costs associated with professional text manipulation and annotation limit the ...
Highlights- A new dataset for text manipulation detection with diverse handcraft manipulations
- An asymmetric dual-stream baseline framework to exploit different transformed domains
- An aggregation hub and a fusion module for efficient multi-...
- research-articleNovember 2024
Robust watermarking against arbitrary scaling and cropping attacks
AbstractDigital watermarking technology has wide application prospects due to its excellent performance in copyright protection and traceability. However, there are still some gaps in robustness when it comes to arbitrary scaling and cropping attacks ...
Highlights- A robust watermarking framework for arbitrary scaling and cropping attacks is proposed, which improves the attack degree of geometric attacks.
- An algorithm based on machine learning to estimate arbitrary scaling attack parameters is ...
- research-articleNovember 2024
Unsupervised domain adaptive building semantic segmentation network by edge-enhanced contrastive learning
AbstractUnsupervised domain adaptation (UDA) is a weakly supervised learning technique that classifies images in the target domain when the source domain has labeled samples, and the target domain has unlabeled samples. Due to the complexity of imaging ...
- research-articleNovember 2024
UDANet: An unsupervised domain adaptive vehicle density estimation network based on joint adversarial learning
Engineering Applications of Artificial Intelligence (EAAI), Volume 137, Issue PAhttps://doi.org/10.1016/j.engappai.2024.109138AbstractUnsupervised domain adaptive vehicle density estimation aims to transfer the knowledge learned from the labeled source domain to the unlabeled target domain, which has received extensive attention due to its practicality and effectiveness. ...
-
- research-articleOctober 2024
Selection and Reconstruction of Key Locals: A Novel Specific Domain Image-Text Retrieval Method
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 5653–5662https://doi.org/10.1145/3664647.3681421In recent years, Vision-Language Pre-training (VLP) models have demonstrated rich prior knowledge for multimodal alignment, prompting investigations into their application in Specific Domain Image-Text Retrieval(SDITR) such as Text-Image Person Re-...
- research-articleOctober 2024
Accurate and Lightweight Learning for Specific Domain Image-Text Retrieval
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 9719–9728https://doi.org/10.1145/3664647.3681280Recent advances in vision-language pre-trained models like CLIP have greatly enhanced general domain image-text retrieval performance. This success has led scholars to develop methods for applying CLIP to Specific Domain Image-Text Retrieval (SDITR) ...
- research-articleOctober 2024
RSC-SNN: Exploring the Trade-off Between Adversarial Robustness and Accuracy in Spiking Neural Networks via Randomized Smoothing Coding
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 2748–2756https://doi.org/10.1145/3664647.3680639Spiking Neural Networks (SNNs) have received widespread attention due to their unique neuronal dynamics and low-power nature. Previous research empirically shows that SNNs with Poisson coding are more robust than Artificial Neural Networks (ANNs) on ...
- research-articleOctober 2024
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 7395–7403https://doi.org/10.1145/3664647.3680585Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. However, existing countermeasures still serve a classification ...
- research-articleOctober 2024
A novel structure adaptive discrete grey Bernoulli model and its application in renewable energy power generation prediction
Expert Systems with Applications: An International Journal (EXWA), Volume 255, Issue PAhttps://doi.org/10.1016/j.eswa.2024.124481AbstractCurrently, the renewable energy power generation industry has entered a new stage, and accurate renewable energy power generation prediction is of great significance for the strategic planning of energy systems. However, renewable energy power ...
- research-articleNovember 2024
Enhancing text-based knowledge graph completion with zero-shot large language models: A focus on semantic enhancement
AbstractThe design and development of text-based knowledge graph completion (KGC) methods leveraging textual entity descriptions are at the forefront of research. These methods involve advanced optimization techniques such as soft prompts and contrastive ...
- research-articleSeptember 2024
<italic>TouchMark</italic>: Partial Tactile Feedback Design for Upper Limb Rehabilitation in Virtual Reality
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 30, Issue 11Pages 7430–7440https://doi.org/10.1109/TVCG.2024.3456173The use of Virtual Reality (VR) technology, especially in medical rehabilitation, has expanded to include tactile cues along with visual stimuli. For patients with upper limb hemiplegia, tangible handles with haptic stimuli could improve their ability to ...
- research-articleJuly 2024
Global adaptive histogram feature network for automatic segmentation of infection regions in CT images
- Xinren Min,
- Yang Liu,
- Shengjing Zhou,
- Huihua Huang,
- Li Zhang,
- Xiaojun Gong,
- Dongshan Yang,
- Menghao Wang,
- Rui Yang,
- Mingyang Zhong
AbstractAccurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to lung CT image segmentation for accurate disease diagnosis. We discuss the limitations of current ...
- research-articleNovember 2024
Combining Parameterized Pulses and Contextual Subspace for More Practical VQE
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceArticle No.: 122, Pages 1–6https://doi.org/10.1145/3649329.3656245In this paper, we explore the integration of parameterized quantum pulses with the contextual subspace method. The advent of parameterized quantum pulses marks a transition from traditional quantum gates to a more flexible and efficient approach to ...
- research-articleJune 2024JUST ACCEPTED
Deepfake Video Detection Using Facial Feature Points and Ch-Transformer
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Just Accepted https://doi.org/10.1145/3672566With the development of Metaverse technology, the avatar in Metaverse has faced serious security and privacy concerns. Analyzing facial features to distinguish between genuine and manipulated facial videos holds significant research importance for ...
- research-articleJuly 2024
ProDiv: Prototype-driven consistent pseudo-bag division for whole-slide image classification
Computer Methods and Programs in Biomedicine (CBIO), Volume 249, Issue Chttps://doi.org/10.1016/j.cmpb.2024.108161Abstract Background and ObjectivePathology image classification is one of the most essential auxiliary processes in cancer diagnosis. To overcome the problem of inadequate Whole-Slide Image (WSI) samples with weak labels, pseudo-bag-based multiple ...
Highlights- Prototype-driven pseudo-bag division scheme is proposed for WSI classification.
- Attention-based prototype generation is designed for pseudo-bags.
- A pseudo-bag division by instance similarities is designed.
- research-articleJune 2024
Continual learning for cross-modal image-text retrieval based on domain-selective attention
AbstractCross-modal image-text retrieval (CMITR) has been a high-value research topic for more than a decade. In most of the previous studies, the data for all tasks are trained as a single set. However, in reality, a more likely scenario is that the ...
Highlights- A novel continual learning for cross-modal image-text retrieval (CLCMR) method has been proposed.
- A multilayer domain-selective attention (MDSA) module has been used to select parameters specific to particular previous tasks.
- A ...
- research-articleSeptember 2024
Detection of back acupoints based on improved OpenPose
FAIML '24: Proceedings of the 2024 3rd International Conference on Frontiers of Artificial Intelligence and Machine LearningPages 329–335https://doi.org/10.1145/3653644.3655692It is better to use physiotherapy to solve sub-health problems than to medicine. Identifying acupoints is an important part of the physiotherapy. Currently, identifying acupoints is highly dependent on doctors, which is time-consuming and labor-...
Understanding Transaction Bugs in Database Systems
- Ziyu Cui,
- Wensheng Dou,
- Yu Gao,
- Dong Wang,
- Jiansen Song,
- Yingying Zheng,
- Tao Wang,
- Rui Yang,
- Kang Xu,
- Yixin Hu,
- Jun Wei,
- Tao Huang
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 163, Pages 1–13https://doi.org/10.1145/3597503.3639207Transactions are used to guarantee data consistency and integrity in Database Management Systems (DBMSs), and have become an indispensable component in DBMSs. However, faulty designs and implementations of DBMSs' transaction processing mechanisms can ...
- research-articleJune 2024
Soft Adversarial Offline Reinforcement Learning via Reducing the Attack Strength for Generalization
ICMLC '24: Proceedings of the 2024 16th International Conference on Machine Learning and ComputingPages 498–505https://doi.org/10.1145/3651671.3651762Improving the generalization ability in offline reinforcement learning (RL) has received much attention in recent years. Existing adversarial RL approaches use adversarial training for the policy improvement, thus enhancing the generalization ability of ...