Search

Your search keyword '"Tang, Yuan Yan"' showing total 1,010 results

Search Constraints

Start Over You searched for: Author "Tang, Yuan Yan" Remove constraint Author: "Tang, Yuan Yan"
1,010 results on '"Tang, Yuan Yan"'

Search Results

1. Underwater Organism Color Enhancement via Color Code Decomposition, Adaptation and Interpolation

2. Improving Fast Adversarial Training via Self-Knowledge Guidance

3. CFVNet: An End-to-End Cancelable Finger Vein Network for Recognition

4. Unrevealed Threats: A Comprehensive Study of the Adversarial Robustness of Underwater Image Enhancement Models

5. Improving Fast Adversarial Training Paradigm: An Example Taxonomy Perspective

6. Illumination Controllable Dehazing Network based on Unsupervised Retinex Embedding

8. MASK-CNN-Transformer For Real-Time Multi-Label Weather Recognition

9. Fooling the Image Dehazing Models by First Order Gradient

10. Exploring the Coordination of Frequency and Attention in Masked Image Modeling

11. AlignVE: Visual Entailment Recognition Based on Alignment Relations

12. PFENet++: Boosting Few-shot Semantic Segmentation with the Noise-filtered Context-aware Prior Mask

15. Low-Rank Matrix Recovery from Noise via an MDL Framework-based Atomic Norm

16. Learning a Deep Part-based Representation by Preserving Data Distribution

20. Simultaneous Spectral-Spatial Feature Selection and Extraction for Hyperspectral Images

21. Bayes Imbalance Impact Index: A Measure of Class Imbalanced Dataset for Classification Problem

24. Garbage Classification Detection Model Based on YOLOv4 with Lightweight Neural Network Feature Fusion

26. Constrained Manifold Learning for Hyperspectral Imagery Visualization

27. Modal Regression based Atomic Representation for Robust Face Recognition

30. Defend against advanced persistent threats: An optimal control approach

31. A cost-effective rumor-containing strategy

32. Security evaluation of cyber networks under advanced persistent threats

33. Assessing the risk of advanced persistent threats

34. The damage inflicted by a computer virus: A new estimation method

35. On the effectiveness of the truth-spreading/rumor-blocking strategy for restraining rumors

36. Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors

37. Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study

38. A discount strategy in word-of-mouth marketing and its assessment

39. Secure Data Transmission of Smart Home Networks Based on Information Hiding

47. Unsupervised Cross-Domain Recognition by Identifying Compact Joint Subspaces

49. Improved quaternion robust principal component analysis for color image recovery.

50. Federated learning on non-IID and globally long-tailed data via meta re-weighting networks.

Catalog

Books, media, physical & digital resources