296 results on '"Le, Wang"'
Search Results
2. Temporal Correlation Vision Transformer for Video Person Re-Identification.
3. Can Telemedicine Improve Offline Healthcare Accessibility? Evidence from Empirical Research in China.
4. Can the Dual-Channel Healthcare Model Alleviate the Problem of 'Difficult and Expensive Access to Medical Care'?
5. The Impact of Physician's Social Support on Patient Engagement in Free Live-Streamed Medical Consultation.
6. Trajectory Unified Transformer for Pedestrian Trajectory Prediction.
7. Parallel Attention Interaction Network for Few-Shot Skeleton-based Action Recognition.
8. Learning from Noisy Pseudo Labels for Semi-Supervised Temporal Action Localization.
9. Sparse Instance Conditioned Multimodal Trajectory Prediction.
10. Full reliability characterization of three-terminal SOT-MTJ devices and corresponding arrays.
11. Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings.
12. Unsupervised Video Anomaly Detection with Self-Attention Based Feature Aggregating.
13. Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks.
14. MotionTrack: Learning Robust Short-Term and Long-Term Motions for Multi-Object Tracking.
15. Anti-Breast Cancer Active Compound Screening Method Based on Simulated Annealing Algorithm and BP Neural Network.
16. Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis.
17. Knowledge Graph Embedding via Adaptive Negative Subsampling.
18. Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph Embeddings.
19. DAoB: A Transferable Adversarial Attack via Boundary Information for Speaker Recognition Systems.
20. DDoS Attack Detection Through Digital Twin Technique in Metaverse.
21. Why Trick Me: The Honeypot Traps on Decentralized Exchanges.
22. Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense.
23. Multi-Stream Representation Learning for Pedestrian Trajectory Prediction.
24. An Algorithm for Mining Fixed-Length High Utility Itemsets.
25. NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems.
26. Understanding Flash-Loan-based Wash Trading.
27. Learning to Refactor Action and Co-occurrence Features for Temporal Action Localization.
28. A Multi-step Attack Detection Framework for the Power System Network.
29. Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise.
30. Improving Robustness of Language Models from a Geometry-aware Perspective.
31. Physical Logic Enhanced Network for Small-Sample Bi-layer Metallic Tubes Bending Springback Prediction.
32. Metaverse and Human-Computer Interaction: A Technology Framework for 3D Virtual Worlds.
33. Research on Healthy City Construction from the Perspective of City Brand: Focus on Case of Seoul.
34. Social Interpretable Tree for Pedestrian Trajectory Prediction.
35. Learning Disentangled Classification and Localization Representations for Temporal Action Localization.
36. Complementary Attention Gated Network for Pedestrian Trajectory Prediction.
37. Lightweight Bimodal Rail Surface Defect Detection Method: Parallel-YOLOv4-Tiny.
38. Unlimited Neighborhood Interaction for Heterogeneous Trajectory Prediction.
39. Practical Relative Order Attack in Deep Ranking.
40. Meta Pairwise Relationship Distillation for Unsupervised Person Re-identification.
41. Enriching Local and Global Contexts for Temporal Action Localization.
42. Free-Space Phase-Matching Quantum Key Distribution.
43. SGCN: Sparse Graph Convolution Network for Pedestrian Trajectory Prediction.
44. Generate Adversarial Examples Combined with Image Entropy Distribution.
45. A Universal Targeted Attack Method against Image Classification.
46. An OAM Mode Measurement Method by Rotation Angle Estimation.
47. A Nested Incentive Scheme for Distributed File Sharing Systems.
48. From Digital Model to Reality Application: A Domain Adaptation Method for Rail Defect Detection.
49. Word-Level Textual Adversarial Attack in the Embedding Space.
50. Adaptive Event-triggered Control for Uncertain Nonlinear Systems based Command Filtering.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.