CSpace

浏览/检索结果: 共4条,第1-4条 帮助

限定条件            
已选(0)清除 条数/页:   排序方式:
Weakly Supervised Anomaly Detection in Videos Considering the Openness of Events 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 页码: 13
作者:  Zhang, Chen;  Li, Guorong;  Xu, Qianqian;  Zhang, Xinfeng;  Su, Li;  Huang, Qingming
收藏  |  浏览/下载:23/0  |  提交时间:2022/12/07
Anomaly detection  Videos  Open data  Data models  Training  Feature extraction  Predictive models  Anomaly detection  surveillance videos  openness  meta-learning  
Syntax-Guided Hierarchical Attention Network for Video Captioning 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 卷号: 32, 期号: 2, 页码: 880-892
作者:  Deng, Jincan;  Li, Liang;  Zhang, Beichen;  Wang, Shuhui;  Zha, Zhengjun;  Huang, Qingming
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Syntactics  Feature extraction  Visualization  Generators  Semantics  Two dimensional displays  Three-dimensional displays  Video captioning  syntax attention  content attention  global sentence-context  
I(2)Transformer: Intra- and Inter-Relation Embedding Transformer for TV Show Captioning 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 3565-3577
作者:  Tu, Yunbin;  Li, Liang;  Su, Li;  Gao, Shengxiang;  Yan, Chenggang;  Zha, Zheng-Jun;  Yu, Zhengtao;  Huang, Qingming
收藏  |  浏览/下载:20/0  |  提交时间:2022/12/07
Transformers  Semantics  Task analysis  Visualization  TV  Electronic mail  Graph neural networks  TV Show captioning  video and subtitle  intra-relation embedding  inter-relation embedding  transformer  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack