This paper proposes a novel method for early action prediction based on 3D skeleton data. Our method combines the advantages of graph convolutional networks (GCNs) and adversarial learning to avoid the problems of ins...
详细信息
This paper proposes a novel method for early action prediction based on 3D skeleton data. Our method combines the advantages of graph convolutional networks (GCNs) and adversarial learning to avoid the problems of insufficient spatio-temporal feature extraction and difficulty in predicting actions in the early execution stage of actions. In our method, GCNs, which have outstanding performance in the field of action recognition, are used to extract the spatio-temporal features of the skeleton. The model learns how to optimize the feature distribution of partial videos from the features of full videos through adversarial learning. Experiments on two challenging action prediction datasets show that our method performs well on skeleton-based early action prediction. State-of-the-art performance is reported in some observation ratios.
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
While deep learning techniques have shown promising performance in the Major Depressive Disorder (MDD) detection task, they still face limitations in real-world scenarios. Specifically, given the data scarcity, some e...
详细信息
Point cloud object detection is gradually playing a key role in autonomous driving tasks. To address the issue of insensitivity to sparse objects in point cloud object detection, we have made improvements to the voxel...
详细信息
As mission scenarios grow more complex, the role of a single unmanned aerial vehicle(UAV) is limited. The UAV swarm,surpassing the single UAV, dynamically establishes temporary communication networks, ensuring high tr...
详细信息
As mission scenarios grow more complex, the role of a single unmanned aerial vehicle(UAV) is limited. The UAV swarm,surpassing the single UAV, dynamically establishes temporary communication networks, ensuring high transmission rates and expansive communication coverage [1]. Unlike a single UAV, a swarm faces increased security risks, requiring specific capabilities.(1) Anomalies detection.
Along with the explosive demand for massive data computation, federated local-edge-cloud computing enables many IoT task offloading processes and has recently gained widespread attention in consumer-centric healthcare...
详细信息
This paper introduces a new network model - the Image Guidance Encoder-Decoder Model (IG-ED), designed to enhance the efficiency of image captioning and improve predictive accuracy. IG-ED, a fusion of the convolutiona...
详细信息
As many countries face the challenges of an aging population and declining birth rates, the demand for labor, particularly for assisting the elderly, is increasing. Traditional robots, being standardized products, req...
详细信息
With the increasingly complex blockchain technology environment and emerging security threats, the detection and prevention of vulnerabilities in blockchain smart contracts have become crucial for ensuring the healthy...
详细信息
Relation extraction aims at extracting semantic relations between given pairs of entities from unstructured textual data and is a critical task in information extraction. A relation extraction model based on cross-att...
详细信息
暂无评论