相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article
Computer Science, Artificial Intelligence
Youwei Pang et al.
Summary: Most existing bi-modal salient object detection methods use convolution operation and complex fusion structures. This work proposes a cross-modal view-mixed transformer (CAVER) that aligns and transforms global information. CAVER uses a sequence-to-sequence context propagation and update process with a novel view-mixed attention mechanism. It also simplifies operations with a parameter-free patch-wise token re-embedding strategy. Experimental results show that CAVER surpasses recent state-of-the-art methods on RGB-D and RGB-T SOD datasets when equipped with the proposed components.
IEEE TRANSACTIONS ON IMAGE PROCESSING
(2023)
Article
Engineering, Electrical & Electronic
Yang Zhao et al.
Summary: This paper introduces a method for accurately predicting the quality of TMIs: RETI. Based on the characteristics of HDR images, three important elements including authenticity, energy and information preservation, and scene expressiveness are considered, combined with subjective quality for training. The results show that the method has good prediction and generalization abilities compared to some state-of-the-art methods.
Article
Computer Science, Artificial Intelligence
Jiachen Yang et al.
Summary: With the development of computer vision, the research on human activity understanding has been greatly promoted. This paper proposes a core weight entropy data information evaluation method based on feature distribution analysis, which effectively reduces data consumption and achieves high performance using a small amount of high information human activity data.
Article
Multidisciplinary Sciences
Shashank Kotyan et al.
Summary: The robustness assessment of machine learning algorithms is a challenging task due to different types of adversarial attacks and defences, as well as the inherent bias in these attacks and defences. This study proposes a model-agnostic adversarial robustness assessment method based on L-0 and L-infinity distance-based norms and robustness levels to address the problems faced. The assessment results show that the robustness may vary significantly depending on the metric used and that L-1 and L-2 metrics alone are not sufficient to avoid spurious adversarial samples. The study also introduces a novel L-infinity black-box adversarial method with lower perturbation than the One-Pixel Attack.
Proceedings Paper
Computer Science, Artificial Intelligence
Kaleel Mahmood et al.
Summary: This study investigates the robustness of Vision Transformers to adversarial examples, finding that these examples do not readily transfer between CNNs and Transformers. The researchers introduce a new attack called the self-attention blended gradient attack and analyze the security of a simple ensemble defense of CNNs and Transformers.
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021)
(2021)
Article
Computer Science, Artificial Intelligence
Jiawei Su et al.
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
(2019)
Article
Computer Science, Artificial Intelligence
Yan-Feng Lu et al.
Article
Engineering, Electrical & Electronic
Rajkumar Kannan et al.
IEEE SIGNAL PROCESSING LETTERS
(2015)
Article
Computer Science, Artificial Intelligence
Olga Russakovsky et al.
INTERNATIONAL JOURNAL OF COMPUTER VISION
(2015)
Article
Computer Science, Artificial Intelligence
Sebastian Montabone et al.
IMAGE AND VISION COMPUTING
(2010)