default search action
Fengyuan Zuo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Haiyan Jin, Yujia Chen, Fengyuan Zuo, Haonan Su, Yuanlin Zhang:
Zero-CSC: Low-light image enhancement with zero-reference color self-calibration. J. Vis. Commun. Image Represent. 104: 104293 (2024) - [j10]Fengyuan Zuo, Jinhai Liu, Zhaolin Chen, Mingrui Fu, Lei Wang:
TGADHead: An efficient and accurate task-guided attention-decoupled head for single-stage object detection. Knowl. Based Syst. 302: 112349 (2024) - [j9]Lei Wang, Huaguang Zhang, Jinhai Liu, Xiangkai Shen, Fengyuan Zuo:
Irregular Defect Size Estimation for the Magnetic Flux Leakage Detection System via Expertise-Informed Collaborative Network. IEEE Trans. Ind. Electron. 71(10): 13189-13200 (2024) - [j8]Lei Wang, Jinhai Liu, Huaguang Zhang, Fengyuan Zuo:
KMSA-Net: A Knowledge-Mining-Based Semantic-Aware Network for Cross-Domain Industrial Process Fault Diagnosis. IEEE Trans. Ind. Informatics 20(2): 2738-2750 (2024) - [j7]Fengyuan Zuo, Jinhai Liu, Mingrui Fu, Lei Wang, Zhen Zhao:
An Efficient Anchor-Free Defect Detector With Dynamic Receptive Field and Task Alignment. IEEE Trans. Ind. Informatics 20(6): 8536-8547 (2024) - [j6]Fengyuan Zuo, Jinhai Liu, Mingrui Fu, Lei Wang, Zhen Zhao:
STMA-Net: A Spatial Transformation-Based Multiscale Attention Network for Complex Defect Detection With X-Ray Images. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - 2023
- [j5]Lei Wang, Huaguang Zhang, Jinhai Liu, Fuming Qu, Fengyuan Zuo:
Defect Size Quantification for Pipeline Magnetic Flux Leakage Detection System via Multilevel Knowledge-Guided Neural Network. IEEE Trans. Ind. Electron. 70(9): 9550-9560 (2023) - [j4]Jinhai Liu, Hengguang Li, Fengyuan Zuo, Zhen Zhao, Senxiang Lu:
KD-LightNet: A Lightweight Network Based on Knowledge Distillation for Industrial Defect Detection. IEEE Trans. Instrum. Meas. 72: 1-13 (2023) - 2022
- [j3]Fengyuan Zuo, Yongdong Huang, Qiufu Li, Weijian Su:
Infrared and visible image fusion using multi-scale pyramid network. Int. J. Wavelets Multiresolution Inf. Process. 20(5): 2250019:1-2250019:20 (2022) - [j2]Weijian Su, Yongdong Huang, Qiufu Li, Fengyuan Zuo, Lijun Liu:
Infrared and Visible Image Fusion Based on Adversarial Feature Extraction and Stable Image Reconstruction. IEEE Trans. Instrum. Meas. 71: 1-14 (2022) - [j1]Huaguang Zhang, Lei Wang, Jianfeng Wang, Fengyuan Zuo, Jifeng Wang, Jinhai Liu:
A Pipeline Defect Inversion Method With Erratic MFL Signals Based on Cascading Abstract Features. IEEE Trans. Instrum. Meas. 71: 1-11 (2022)
Conference and Workshop Papers
- 2024
- [c4]Fengyuan Zuo, Zhaolin Xiao, Haiyan Jin, Haonan Su:
CEDFlow: Latent Contour Enhancement for Dark Optical Flow Estimation. AAAI 2024: 7909-7916 - [c3]Quanquan Xiao, Haiyan Jin, Haonan Su, Fengyuan Zuo, Yuanlin Zhang, Zhaolin Xiao, Bin Wang:
SPGFusion: A Semantic Prior Guided Infrared and Visible Image Fusion Network. ICASSP 2024: 2405-2409 - [c2]Haiyan Jin, Yifan Shuai, Fengyuan Zuo, Haonan Su, Zhaolin Xiao, Bin Wang, Yuanlin Zhang:
A Channel-Wise Guidance Sparse Transformer for Effective Dark Image Enhancement. ICME 2024: 1-6 - 2023
- [c1]Fengyuan Zuo, Jinhai Liu, Mingrui Fu, Jin Lu, Haichao Liu:
An Effective Detection Method for Complex Weld Defects Based on Adaptive Feature Pyramid. SAFEPROCESS 2023: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint