×

软件 cvpr

软件论文(软件论文范文)

访客 访客 发表于2022-05-05 13:28:00 浏览650 评论3

3人参与发表评论

顶级会议

1.刘夏雷 Representation c++ompensation Networks for Continual Semantic Segmentation. cvpr 2022

2.刘夏雷 Improving Task Adaptation for cross-domain Few-shot Learning. CVPR 2022

3.刘夏雷 Learning Multiple Dense Prediction Tasks from Partially Annotated data. CVPR 2022

4.郭春乐 FocusCut: Diving into a Focus view in Interactive Segmentation. CVPR 2022

5.侯淇彬 Localization Distillation for Dense object Detection. CVPR 2022

6.郭春乐(一作) Image Dehazing transformer with transmission-aware 3D Position Embedding. CVPR 2022

7.郭春乐 Towards an End-to-end framework for flow-guided video inpainting. CVPR 2022

8.Qi Han(并列一作) On the connection between local attention and dynamic depth-wise convolution. IcmL 2022 Spotlight

顶刊论文

1.刘晓光、王刚 An NVM SSD-based High Performance Query Processing Framework for Search Engines. tkDE

2.Wen Weilei(一作) Video Super-Resolution via a spatio-Temporal Alignment Network. TIP

3.刘哲理 secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 applications. TII

4.侯淇彬 Vision Permutator: A Permutable MLP-Like Architecture for Visual Recognition. TPAMI

5.高铁杠 DetectPMFL: Privacy-Preserving Momentum Federated Learning Considering Unreliable Industrial Agents. TII

6.程明明 PoolNet+: Exploring the Potential of Pooling for Salient Object Detection. TPAMI

7.杨巨峰 SSL++: Improving Self-Supervised Learning by Mitigating the Proxy Task-Specificity Problem. TIP

8.程明明 Semantic Edge Detection with Diverse Deep Supervision. IJCV

9.蒲凌君(一作) Cost-Efficient and Skew-Aware Data Scheduling for Incremental Learning in 5g Networks. IEEE jsAC

10.Wen Yanlong Mitigating the Backdoor Attack by Federated Filters for Industrial IoT Applications. TII

11.程明明 Leveraging instance-, Image- and Dataset-Level information for Weakly Supervised Instance Segmentation. TPAMI

12.汪定 Authentication Protocol Based on Extended Chaotic-maps for Mobile Lightweight Devices. TDSC

13.汪定 Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. TDSC

14.汪定 Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. TDSC

15.Zhang Shenglin Detecting Outlier machine Instances Through Gaussian Mixture Variational Autoencoder With One Dimensional CNN. IEEE TOC

16.宁博 Extremal problems of Erdős, Faudree, Schelp and Simonovits on paths and cycles. JCTB

17.徐夏(一作) Deep Autoencoder for Hyperspectral Unmixing via Global-Local Smoothing. TGRS

群贤毕至

访客
鸠骨雨铃 鸠骨雨铃2023-11-11 07:48:29 | 回复 d Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightwe
鸽吻旧我 鸽吻旧我2023-11-11 06:07:56 | 回复 xtended Chaotic-Maps for Mobile Lightweight Devices. TDSC14.汪定 Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor
青迟僚兮 青迟僚兮2023-11-10 23:29:19 | 回复 顶级会议1.刘夏雷 Representation c++ompensation Networks for Continual Semantic Segmentation. cvpr 20222.刘夏雷 Improving Task Adaptation for cross-domai