Facial expressions can provide a better understanding of people's mental status and attitudes towards specific things. However, facial occlusion in real world is an unfavorable phenomenon that greatly affects the ...
详细信息
This study introduces a novel framework for video-based 3D human pose and shape estimation, termed Selective sampling and Temporal Positional Encoding (STPE). Our method leverages selective sampling and advanced posit...
详细信息
Aiming at the security of data sharing in the Internet of vehicles environment, we propose a user-searchable and revocable data-sharing scheme in the Multi-Fog-IoVs. The scheme utilizes a fog node to alleviate the com...
详细信息
Current synthetic speech detection methods often overlook the emotional distinctions between synthetic and real speech. To comprehensively leverage emotional information and deep features to further enhance the accura...
详细信息
With the prosperity of the intelligent surveillance, multiple cameras have been applied to localize pedestrians more accurately. However, previous methods rely on laborious annotations of pedestrians in every frame an...
详细信息
High-performance computing (HPC) systems has entered the exascale era, but I/O performance has lagged behind due to storage hardware limitations, creating a "storage wall effect"that hinders HPC systems full...
详细信息
In contrast to the single intelligent reflecting surface (S-IRS) systems, improved performance is attainable by employing double-IRS (D-IRS) in a wireless-communication system. Nevertheless, precise channel estimation...
详细信息
This paper delves into the innovative application of quantum computing to solve complex multi-die FPGA (FieldProgrammable Gate Array) routing challenges. Leveraging the Quantum Approximate Optimization Algorithm (QAOA...
详细信息
With the rapid development of autonomous driving technology, public's opinion of this technology shows diversification and complexity. The discussion about autonomous driving online has a large quantity and divers...
详细信息
In this paper, we propose a malicious user detection scheme for overlapping communities based on community topic propagation prediction. First, we construct a malicious topic classification model based on topic text f...
详细信息
暂无评论