咨询与建议

限定检索结果

文献类型

  • 22 篇 期刊文献
  • 16 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 39 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 24 篇 计算机科学与技术...
    • 15 篇 电气工程
    • 6 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 3 篇 软件工程
    • 2 篇 仪器科学与技术
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
    • 1 篇 机械工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 生物医学工程(可授...
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 医学
    • 3 篇 临床医学
    • 1 篇 基础医学(可授医学...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 政治学
    • 1 篇 社会学
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
  • 2 篇 艺术学
    • 1 篇 美术学
  • 1 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 外国语言文学
    • 1 篇 新闻传播学
  • 1 篇 历史学
    • 1 篇 世界史

主题

  • 39 篇 image embedding
  • 6 篇 deep learning
  • 4 篇 steganography
  • 2 篇 image encryption
  • 2 篇 xgboost
  • 2 篇 information secu...
  • 2 篇 qr codes
  • 2 篇 visually meaning...
  • 2 篇 image classifica...
  • 2 篇 computer vision
  • 2 篇 convolutional ne...
  • 2 篇 word embedding
  • 1 篇 image fusion
  • 1 篇 language and vis...
  • 1 篇 image enhancemen...
  • 1 篇 capacity
  • 1 篇 human vision sys...
  • 1 篇 distributional s...
  • 1 篇 secret sharing
  • 1 篇 lexical semantic...

机构

  • 1 篇 universitas padj...
  • 1 篇 deakin univ dept...
  • 1 篇 univ oxford oxfo...
  • 1 篇 henan univ intel...
  • 1 篇 al quds univ dep...
  • 1 篇 univ kentucky el...
  • 1 篇 beihang univ sch...
  • 1 篇 univ petra uop f...
  • 1 篇 univ macau asia ...
  • 1 篇 iit kharagpur el...
  • 1 篇 mathworks natick...
  • 1 篇 ucl dept comp sc...
  • 1 篇 deakin univ sch ...
  • 1 篇 univ maryland co...
  • 1 篇 hong kong univ s...
  • 1 篇 rama devi womens...
  • 1 篇 ajman univ coll ...
  • 1 篇 univ stuttgart s...
  • 1 篇 univ windsor sch...
  • 1 篇 iit kharagpur el...

作者

  • 2 篇 arce gonzalo r.
  • 2 篇 kaur manjit
  • 2 篇 lau daniel l.
  • 2 篇 himthani varsha
  • 1 篇 zou yayi
  • 1 篇 ma lin
  • 1 篇 islam salekul
  • 1 篇 paikaray bijay k...
  • 1 篇 li zhoujun
  • 1 篇 dhaka vijaypal s...
  • 1 篇 polo stephanny v...
  • 1 篇 nittur pavan
  • 1 篇 hasan ahmed rafi
  • 1 篇 abualhaj mosleh
  • 1 篇 peng yang
  • 1 篇 chakravarty suja...
  • 1 篇 sawafteh mohamma...
  • 1 篇 zhang xiaoming
  • 1 篇 yan shen
  • 1 篇 tarun kumar

语言

  • 39 篇 英文
检索条件"主题词=Image embedding"
39 条 记 录,以下是1-10 订阅
排序:
MSEB: Plug and play multi-scale image embedding block for vision backbone
收藏 引用
NEUROCOMPUTING 2025年 617卷
作者: Yuan, Hao Zhang, Bin Wang, Yachuan Xi An Jiao Tong Univ 28 Xian Ning West Rd Xian 710049 Shaanxi Peoples R China
Mainstream backbone networks in computer vision, leveraging sophisticated CNN or Transformer architectures, have achieved remarkable performance across various tasks. However, these works primarily focus on downsample... 详细信息
来源: 评论
image embedding for Detecting Irregularity  3rd
Image Embedding for Detecting Irregularity
收藏 引用
3rd International Conference on Computer Vision and image Processing (CVIP)
作者: Sharma, M. K. Sheet, D. Biswas, Prabir Kumar IIT Kharagpur Adv Technol Dev Ctr Kharagpur W Bengal India IIT Kharagpur Elect Engn Kharagpur W Bengal India IIT Kharagpur Elect & Elect Commun Engn Kharagpur W Bengal India
Detecting irregularity in an image or video is an important task in quality control or automatic visual inspection. This paper presents an image embedding technique for detecting an irregularity or abnormality in imag... 详细信息
来源: 评论
QR images: Optimized image embedding in QR Codes
收藏 引用
IEEE TRANSACTIONS ON image PROCESSING 2014年 第7期23卷 2842-2853页
作者: Garateguy, Gonzalo J. Arce, Gonzalo R. Lau, Daniel L. Villarreal, Ofelia P. Mathworks Natick MA 01760 USA Univ Delaware Dept Elect & Comp Engn Newark DE 19711 USA Univ Kentucky Dept Elect & Comp Engn Lexington KY 40506 USA
This paper introduces the concept of QR images, an automatic method to embed QR codes into color images with bounded probability of detection error. These embeddings are compatible with standard decoding applications ... 详细信息
来源: 评论
VISAtlas: An image-Based Exploration and Query System for Large Visualization Collections via Neural image embedding
收藏 引用
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2024年 第7期30卷 3224-3240页
作者: Ye, Yilin Huang, Rong Zeng, Wei Hong Kong Univ Sci & Technol Guangzhou Guangzhou 511400 Guangdong Peoples R China Hong Kong Univ Sci & Technol Hong Kong Peoples R China
High-quality visualization collections are beneficial for a variety of applications including visualization reference and data-driven visualization design. The visualization community has created many visualization co... 详细信息
来源: 评论
image embedding into Generative Adversarial Networks
Image Embedding into Generative Adversarial Networks
收藏 引用
作者: Abdal, Rameen King Abdullah University of Science and Technology
学位级别:硕士
We propose an e cient algorithm to embed a given image into the latent space of StyleGAN. This embedding enables semantic image editing operations that can be applied to existing photographs. Taking the StyleGAN train... 详细信息
来源: 评论
Colored-QRNet: Fast QR Code Color image embedding  30
Colored-QRNet: Fast QR Code Color Image Embedding
收藏 引用
30th European Signal Processing Conference (EUSIPCO)
作者: Pena-Pena, Karelia Lau, Daniel L. Arce, Gonzalo R. Univ Delaware Elect & Comp Engn Newark DE 19716 USA Univ Kentucky Elect & Comp Engn Lexington KY 40506 USA
Quick Response (QR) codes are widely used to connect offline and online content, and thus many efforts have aimed at improving the visual quality of QR codes to be easily included in publicity designs in billboards an... 详细信息
来源: 评论
Effectiveness of Deep image embedding Clustering Methods on Tabular Data  15
Effectiveness of Deep Image Embedding Clustering Methods on ...
收藏 引用
15th International Conference on Advanced Computational Intelligence (ICACI)
作者: Abrar, Sakib Sekmen, Ali Samad, Manar D. Tennessee State Univ Dept Comp Sci Nashville TN 37203 USA
Deep learning methods are commonly benchmarked on image data sets, which may not be suitable or effective baselines for non-image tabular data. In this paper, we take a data-centric view to perform one of the first st... 详细信息
来源: 评论
Garbage Classification Using Inception V3 as image embedding and Extreme Gradient Boosting
Garbage Classification Using Inception V3 as Image Embedding...
收藏 引用
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
作者: Yulita, Intan Nurma Ardiansyah, Firman Sholahuddin, Asep Rosadi, Rudi Trisanto, Agus Ramdhani, Muhammad Rasyid Universitas Padjadjaran Department of Computer Science Sumedang Indonesia Institut Teknologi Dan Bisnis Ahmad Dahlan Lamongan Management Lamongan Indonesia Universitas Padjadjaran Department of Electrical Engineering Sumedang Indonesia
Employing the image embedding method with the Inception V3 model, this study explored the possibility of utilizing visual features for garbage classification. Several algorithms, including Extreme Gradient Boosting (X... 详细信息
来源: 评论
An improved region-based embedding technique for data hiding and image recovery using multiple ROI and RONI
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS 2023年 第2期15卷 101-113页
作者: Paikaray, Bijay Kumar Swain, Debabala Chakravarty, Sujata Centurion Univ Technol & Management Dept CSE R Sitapur Odisha India Rama Devi Womens Univ Dept Comp Sci Bhubaneswar Odisha India Centurion Univ Technol & Management Dept CSE R Sitapur Odisha India
To preserve the sensitive contents of digital images during their transmission, it is essential to hide them with maximum imperceptibility so that intruders will not be able to identify them visually. The image recove... 详细信息
来源: 评论
A deep learning-driven multi-layered steganographic approach for enhanced data security
收藏 引用
SCIENTIFIC REPORTS 2025年 第1期15卷 1-30页
作者: Sanjalawe, Yousef Al-E'mari, Salam Fraihat, Salam Abualhaj, Mosleh Alzubi, Emran Univ Jordan JU King AbdullahSchool Informat Technol 2 Dept Informat Technol Amman 11942 Jordan Univ Petra UoP Fac Informat Technol Dept Informat Secur Amman 11196 Jordan Ajman Univ Coll Engn & Informat Technol Artificial Intelligence Res Ctr AIRC Ajman U Arab Emirates Al Ahliyya Amman Univ Fac Informat Technol Dept Networks & Informat Secur Amman 19328 Jordan Northern Border Univ NBU Coll Business Adm Ar Ar 91431 Saudi Arabia
In the digital era, ensuring data integrity, authenticity, and confidentiality is critical amid growing interconnectivity and evolving security threats. This paper addresses key limitations of traditional steganograph... 详细信息
来源: 评论