


default search action
20th ICIC 2024: Tianjin, China - Part VIII
- De-Shuang Huang, Wei Chen, Yijie Pan:
Advanced Intelligent Computing Technology and Applications - 20th International Conference, ICIC 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part VIII. Lecture Notes in Computer Science 14869, Springer 2024, ISBN 978-981-97-5602-5
Image Processing
- Qianyi Zhan, Yuanyuan Liu:
Protecting Image Copyrights Based on the AUL Algorithm and Blockchain. 3-14 - Shixun Wang, Mengjiao Wang, Yuan Li:
MAPNet: A Multi-scale Attention Pooling Network for Ultrasound Medical Image Segmentation. 15-26 - Qian Guo
, Yanlong Xu
, Limin Sun, Tao Yang:
Fusion of Saliency and Edge Map for Multi-operator Image Retargeting Algorithm. 27-43 - Xinyi He
, Ping Ma
, Yiyang Chen
, Yuan Liu
:
MOD-YOLO: Improved YOLOv5 Based on Multi-softmax and Omni-Dimensional Dynamic Convolution for Multi-label Bridge Defect Detection. 44-55 - Lianshan Liu
, Yu Huang:
Color Image Steganography Based on Two-Channel Preprocessing and U-Net Network. 56-68 - Shuqiang Guo, Ming Gao, Bin Xiao, Zhicheng Xie, Wenzhi Ping:
Application of a Hybrid Particle Image Velocimetry Method Based on Window Function in the Field of Turbulence. 69-80 - Zhigao Zeng
, Jin Wang
, Wei Cao, Jianxin Wang, Jianming Zhang
:
Semantics-Enhanced Refiner in Skip Connection for Crack Segmentation. 81-92 - Zhe Lian, Yanjun Yin, Wei Hu, Qiaozhi Xu, Min Zhi, Jingfang Lu, Xuanhao Qi:
Refinement Correction Network for Scene Text Detection. 93-105 - Yutao Jin
, Yue Sun
, Xiaoyan Chen
:
Weight Uncertainty Network for Low-Light Image Enhancement. 106-117 - Yingjie Ma, Shuo Xie, Wei Xu:
Unsupervised Extremely Low-Light Image Enhancement with a Laplacian Pyramid Network. 118-129 - Yun Liu, Zhipeng Wen, Minzhu Jin, Daoxin Fan, Sifan Li, Bo Liu, Jinhe Jiang, Xianda Xiao:
A Multimodal Fake News Detection Model with Self-supervised Unimodal Label Generation. 130-141 - Zhi Wang, Fengying Ma, Peng Ji, Chengcai Fu:
Image Denoising Based on an Improved Wavelet Threshold and Total Variation Model. 142-154 - Caiwang Zhang
, Wei Liu, Xiaoyu Huang, Zhiguo Kang:
A Two-Stage Coupled Learning Network for Image Deblurring. 155-166 - Li Shang, Bo Huang:
Palmprint Recognition Using SC-LNMF Model in Gabor Domain. 167-178 - Xin Jing
, Shushuo Yang, Heyang Zhou, Gao Wang, Keming Mao:
SkinDiff: A Novel Data Synthesis Method Based on Latent Diffusion Model for Skin Lesion Segmentation. 179-191 - Ningzhi Wang, Zhenda Yu, Zerui Li, Zhenyu Qi, Wenjun Lv:
MFAAnet: New Feature Extraction Network in Image Super-Resolution. 192-202 - Shan Yang, Hangyuan Yang, Yanglin Pu, Yanbin Wang, Zhuhong You:
Context-Aware Relative Distinctive Feature Learning for Person Re-identification. 203-215 - Weidong Tian, Wenzheng Xu, Junxiang Zhao, Zhongqiu Zhao:
Image Captioning with Masked Diffusion Model. 216-227 - Yaxin Ji, Lan Di
, Yudi Gu, Zaiyong Zhou:
Textile Defect Detection Based on Multi-proportion Spatial Pyramid Convolution and Adaptive Multi-scale Feature Fusion. 228-240 - Yang Zhang, Chunming Wu:
Real-Time Detection of Multi-scale Traffic Signs Based on Decoupled Heads. 241-252 - Yanglin Pu, Chen Gao, Bo Liu, Si Liu, Shan Yang, Junhua Xiao, Shiliang Pu, Zhuhong You, Yanbin Wang:
LAROD-HD: Low-Cost Adaptive Real-Time Object Detection for High-Resolution Video Surveillance. 253-265 - Daole Wang, Ping Wang, Xiuyang Zhao, Lei Tan, Jinshuo Zhang, Hengxiang Shi, Jun Wang:
Complementary Attention Based Dual-Task Pseudo-labeling for Medical Image Segmentation. 266-278 - Longxia Guo
, Yunlong Yan, Yundong Li:
Unsupervised Subdomain Adaptation Robust to Noisy Pseudo Labels Using Symmetric Loss. 279-292 - Shijie Liu
, Kang Yan
, Feiwei Qin
, Changmiao Wang
, Ruiquan Ge
, Kai Zhang
, Jie Huang
, Yong Peng
, Jin Cao
:
Infrared Image Super-Resolution via Lightweight Information Split Network. 293-304
Information Security
- Tian Wang, Weidong Fang
, Mufan Ni, Xiaoliang Yang, Wei Chen
, Wentao Chen, Wuxiong Zhang
:
Intelligent Computing Making Access Control More Secure: From Cipher to Trust. 307-317 - Wenli Shang, Zifeng Huang, Zhaojun Gu, Zhong Cao, Lei Ding, Shuang Wang:
CWMAGAN-GP-Based Oversampling Technique for Intrusion Detection. 318-330 - Jianrong Li, Zhiqiang Xu, Pengyu Han, Huiying Sun, Ting Ke, Wei Chen, Chuanlei Zhang:
AES Improvement Algorithm Based on the Chaotic System in IIOT. 331-342 - Laijin Meng, Xinghao Jiang, Qiang Xu, Zhongjie Mi:
A Coverless Image Steganography Based on a Robust Object Detection Network. 343-356 - Huazhen Zhong, Jibin Wang, Xuejian Wang, Xin Wang, Wenjie Xiao, Xuehai Tang, Liangjun Zang:
DBPrompt: A Database Anomaly Operation Detection and Analysis via Prompt Learning. 357-368 - Xuelei Liu, Guojun Wang, Mingfei Chen, Peiqiang Li, Jinyao Zhu:
A Vulnerability Detection Method for Smart Contract Using Opcode Sequences with Variable Length. 369-380 - Yu Zhang
, Yanqing Song
, Jianguo Chen
, Long Chen
:
Generative Adversarial Network for Enhancement Network Security Log Detection. 381-390 - Rui Chen
, Waleed Younas, Jing Zhao:
Firm-Vehicle: Trusted Communication Enabled Instruction Embedding Model for Resource-Constrained VANET Environments. 391-402 - Ruizhong Du, Yifan Wang, Mingyue Li, Tao Shang:
Privacy-Preserving Retrieval Scheme Over Medical Images Based on Vision Transformer. 403-415 - Tian Wu
, Xuan Hu, Yijun Hu, Yizhe Wang, Chunnian Liu
, Yiping Zhu:
Robust Generative Steganography via Intermediate State Normal Distribution. 416-426 - Yu Jiang, Pengchuan Wang, Qianmu Li, Nan Liu:
UTPrompt: Cross-Task Backdoor Prompt Attacks Based on Universal Triggers. 427-438 - Jin Qian
, Kaimin Wei
, Yongdong Wu
, Jilian Zhang
, Jinpeng Chen
, Huan Bao
:
GI-SMN: Gradient Inversion Attack Against Federated Learning Without Prior Knowledge. 439-448 - Weinan Zhai, Siqi Liu, Yue Yu, Wei An, Jianjun Yu, Lingling Zhang:
Network Traffic Risk Identification Based on Deep Learning Model. 449-460 - Minglong Cheng
, Wei Chen, Weidong Fang, Jueting Liu, Tingting Xu, Zehua Wang:
Feedback Mechanism-Based Trust Evaluation Model for Mobile Edge Computing in Industrial IoT. 461-469 - Lu Yuan, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Wei Ma:
CoSen-IDS: A Novel Cost-Sensitive Intrusion Detection System on Imbalanced Data in 5G Networks. 470-481 - Chuanyin Wang
, Yifei Zhang
, Neng Gao:
Elevating Privacy in Federated Learning: An Efficient Approach with SAM Optimization for Personalized Local Models. 482-493 - Weimeng Zhang, Junqing Li:
A Knowledge-Driven Cooperative Optimization Algorithm for Multi-objective Energy-Efficient Flexible Job Scheduling with Variable Machine Speeds. 494-505

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.