518 results on '"Le, Wang"'
Search Results
2. Temporal Correlation Vision Transformer for Video Person Re-Identification.
3. A semi-supervised video dehazing method based on CNNs.
4. Consumer-Centric Insights Into Resilient Small Object Detection: SCIoU Loss and Recursive Transformer Network.
5. Worst Perception Scenario Search via Recurrent Neural Controller and K-Reciprocal Re-Ranking.
6. PrivGrid: Privacy-Preserving Individual Load Forecasting Service for Smart Grid.
7. Abnormal Ratios Guided Multi-Phase Self-Training for Weakly-Supervised Video Anomaly Detection.
8. Fully Distributed Secure Tracking for Leader-Following Nonlinear Multiagent Systems With Multi-Link Sequence Scaling Attacks.
9. Labels Are Culprits: Defending Gradient Attack on Privacy.
10. STBCIoT: Securing the Transmission of Biometric Images in Customer IoT.
11. A variable population size opposition-based learning for differential evolution algorithm and its applications on feature selection.
12. Semi-supervised dehazing network using multiple scattering model and fuzzy image prior.
13. Completely Distributed Secure Consensus for Multiagent Systems With a General Directed Graph Under Interaction Link Attacks.
14. A Micro Radial-Torsional Vibration Ultrasonic Motor Driven by Single-Phase Signal.
15. Adaptive Asymptotic Tracking Control for High-Order Nonlinear Systems With Prescribed Transient Performance.
16. Rethinking multi-spatial information for transferable adversarial attacks on speaker recognition systems.
17. A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection.
18. Optimization-improved thermal-mechanical simulation of welding residual stresses in welded connections.
19. Throughput Maximization for Covert UAV Relaying System.
20. Adversarial Attack and Defense in Deep Ranking.
21. Manufacturer encroachment and quality investment decisions in a two-period supply chain.
22. Inverse Adversarial Diversity Learning for Network Ensemble.
23. Can Telemedicine Improve Offline Healthcare Accessibility? Evidence from Empirical Research in China.
24. Can the Dual-Channel Healthcare Model Alleviate the Problem of 'Difficult and Expensive Access to Medical Care'?
25. The Impact of Physician's Social Support on Patient Engagement in Free Live-Streamed Medical Consultation.
26. R3D-AD: Reconstruction via Diffusion for 3D Anomaly Detection.
27. Advancing Pre-trained Teacher: Towards Robust Feature Discrepancy for Anomaly Detection.
28. Robust Noisy Label Learning via Two-Stream Sample Distillation.
29. Merging Parameter Estimation and Classification Using LASSO.
30. Diversifying Query: Region-Guided Transformer for Temporal Sentence Grounding.
31. Recurrent Aligned Network for Generalized Pedestrian Trajectory Prediction.
32. Learning Discriminative Spatio-temporal Representations for Semi-supervised Action Recognition.
33. Boosting Semi-Supervised Temporal Action Localization by Learning from Non-Target Classes.
34. Towards Generalizable Multi-Object Tracking.
35. Trajectory Unified Transformer for Pedestrian Trajectory Prediction.
36. Parallel Attention Interaction Network for Few-Shot Skeleton-based Action Recognition.
37. Learning from Noisy Pseudo Labels for Semi-Supervised Temporal Action Localization.
38. Sparse Instance Conditioned Multimodal Trajectory Prediction.
39. Full reliability characterization of three-terminal SOT-MTJ devices and corresponding arrays.
40. Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings.
41. Unsupervised Video Anomaly Detection with Self-Attention Based Feature Aggregating.
42. Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks.
43. MotionTrack: Learning Robust Short-Term and Long-Term Motions for Multi-Object Tracking.
44. Anti-Breast Cancer Active Compound Screening Method Based on Simulated Annealing Algorithm and BP Neural Network.
45. Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis.
46. Knowledge Graph Embedding via Adaptive Negative Subsampling.
47. Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph Embeddings.
48. DAoB: A Transferable Adversarial Attack via Boundary Information for Speaker Recognition Systems.
49. DDoS Attack Detection Through Digital Twin Technique in Metaverse.
50. Why Trick Me: The Honeypot Traps on Decentralized Exchanges.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.