CSpace

浏览/检索结果: 共204条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
LA-Net: layer attention network for 3D-to-2D retinal vessel segmentation in OCTA images 期刊论文
PHYSICS IN MEDICINE AND BIOLOGY, 2024, 卷号: 69, 期号: 4, 页码: 15
作者:  Yang, Chaozhi;  Li, Bei;  Xiao, Qian;  Bai, Yun;  Li, Yachuan;  Li, Zongmin;  Li, Hongyi;  Li, Hua
收藏  |  浏览/下载:3/0  |  提交时间:2024/05/20
retinal vessel segmentation  3D-to-2D  multi-scale layer attention  reverse boundary attention  OCTA volume  
Local Feature Matters: Cascade Multi-Scale MLP for Edge Segmentation of Medical Images 期刊论文
IEEE TRANSACTIONS ON NANOBIOSCIENCE, 2023, 卷号: 22, 期号: 4, 页码: 828-835
作者:  Lv, Jinkai;  Hu, Yuyong;  Fu, Quanshui;  Hu, Yuqiang;  Lv, Lin;  Yang, Guoqing;  Li, Jinpeng;  Zhao, Yi
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
MLP  medical image segmentation  semantic segmentation  
Rotated Object Detection with Circular Gaussian Distribution 期刊论文
ELECTRONICS, 2023, 卷号: 12, 期号: 15, 页码: 12
作者:  Xu, Hang;  Liu, Xinyuan;  Ma, Yike;  Zhu, Zunjie;  Wang, Shuai;  Yan, Chenggang;  Dai, Feng
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
rotated object detection  circular Gaussian  CenterNet  CGD  
BoAu: Malicious traffic detection with noise labels based on boundary augmentation 期刊论文
COMPUTERS & SECURITY, 2023, 卷号: 131, 页码: 13
作者:  Yuan, Qingjun;  Liu, Chang;  Yu, Wentao;  Zhu, Yuefei;  Xiong, Gang;  Wang, Yongjuan;  Gou, Gaopeng
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Malicious traffic detection  Deep learning  Learning with noise labels  Decision boundaries  Encrypted traffic  
Context-Aware Proposal-Boundary Network With Structural Consistency for Audiovisual Event Localization 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 页码: 11
作者:  Wang, Hao;  Zha, Zheng-Jun;  Li, Liang;  Chen, Xuejin;  Luo, Jiebo
收藏  |  浏览/下载:8/0  |  提交时间:2023/12/04
Audiovisual learning  context learning  event localization  
SceneHGN: Hierarchical Graph Networks for 3D Indoor Scene Generation With Fine-Grained Geometry 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 7, 页码: 8902-8919
作者:  Gao, Lin;  Sun, Jia-Mu;  Mo, Kaichun;  Lai, Yu-Kun;  Guibas, Leonidas J.;  Yang, Jie
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
3Dindoor scene synthesis  deep generative model  fine-grained mesh generation  graph neural network  recursive neural network  relationship graphs  variational autoencoder  
MIFNet: Multiple instances focused temporal action proposal generation 期刊论文
NEUROCOMPUTING, 2023, 卷号: 538, 页码: 13
作者:  Wang, Lining;  Yao, Hongxun;  Yang, Haosen;  Wang, Sibo;  Jin, Sheng
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Video understanding  Temporal action proposal  Temporal action detection  Contrastive learning  Multiple instances  
Website-Aware Protocol Confusion Network for Emergent HTTP/3 Website Fingerprinting 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 卷号: 18, 页码: 2427-2439
作者:  Zhan, Mengqi;  Li, Yang;  Zhu, Yongchun;  Yu, Guangxi;  Zhang, Yan;  Li, Bo;  Wang, Weiping
收藏  |  浏览/下载:8/0  |  提交时间:2023/12/04
Protocols  Feature extraction  Monitoring  Training  Servers  Metadata  Web sites  Website fingerprinting  HTTP/3  QUIC  traffic analysis  
Scaling Poisson Solvers on Many Cores via MMEwald 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 卷号: 33, 期号: 8, 页码: 1888-1901
作者:  Wu, Mingchuan;  Wu, Yangjun;  Shang, Honghui;  Liu, Ying;  Cui, Huimin;  Li, Fang;  Duan, Xiaohui;  Zhang, Yunquan;  Feng, Xiaobing
收藏  |  浏览/下载:36/0  |  提交时间:2022/06/21
Optimization  Bandwidth  Supercomputers  Electric potential  Boundary conditions  Electrostatics  Silicon  Poisson solver  architecture-specific optimizations  many-core processor  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack