26 results on '"YiXin Zhang"'
Search Results
2. Multiple Access Integrated Adaptive Finite Blocklength for Ultra-Low Delay in 6G Wireless Networks.
3. Adaptive Finite Blocklength for Low Access Delay in 6G Wireless Networks.
4. Dumb RIS-Assisted Random Beamforming for Energy Efficiency Enhancement of Wireless Communications.
5. Performance Analysis and Blocklength Minimization of Uplink RSMA for Short Packet Transmissions in URLLC.
6. Trajectory and Power Optimization for Multi-UAV Enabled Emergency Wireless Communications Networks.
7. Multi-modal Food Recommendation using Clustering and Self-supervised Learning.
8. ClinicalLab: Aligning Agents for Multi-Departmental Clinical Diagnostics in the Real World.
9. Mutilmodal Feature Extraction and Attention-based Fusion for Emotion Estimation in Videos.
10. Smart Agent-Based Modeling: On the Use of Large Language Models in Computer Simulations.
11. Towards Behavioral-aware Crowd Management System.
12. Convolutional Neural Networks Rarely Learn Shape for Semantic Segmentation.
13. Segment Anything Model for Medical Image Analysis: an Experimental Study.
14. Revisiting Foreground and Background Separation in Weakly-supervised Temporal Action Localization: A Clustering-based Approach.
15. How to Efficiently Annotate Images for Best-Performing Deep Learning Based Segmentation Models: An Empirical Study with Weak and Noisy Annotations and Segment Anything Model.
16. On the IRS Deployment in Smart Factories Considering Blockage Effects: Collocated or Distributed?
17. Exploiting Low-confidence Pseudo-labels for Source-free Object Detection.
18. Enhancing Sequential Recommendation with Graph Contrastive Learning.
19. Low-confidence Samples Matter for Domain Adaptation.
20. Who will stay? Using Deep Learning to predict engagement of citizen scientists.
21. Probability Contrastive Learning for Domain Adaptation.
22. Deep Reinforcement Learning for Adaptive Exploration of Unknown Environments.
23. 5th Place Solution for VSPW 2021 Challenge.
24. Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography.
25. Identifying vital nodes based on reverse greedy method.
26. Underwater Anchor-AUV Localization Geometries with an Isogradient Sound Speed Profile: A CRLB-Based Optimality Analysis.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.