Loading [MathJax]/extensions/MathZoom.js
Baohua Qiang - IEEE Xplore Author Profile

Showing 1-25 of 36 results

Results

Image super-resolution (SR) plays an important role in vision-based measurements, and reference-based image super-resolution (RefSR) is one such SR technique that enhances the resolution of a low-resolution (LR) image using an external high-resolution (HR) reference image. However, most existing RefSR methods search for the best-matching correspondence in the reference image, typically a single pa...Show More
When detecting small objects in complex environment, the features of small objects will become blurred or even lost as the number of network layers increases. To address this problem, we constructed a Dense Connection and Feature Extraction Network, termed DCFEN. First, we designed a dense-connected multi-scale feature enhancement framework, which can effectively extract and fuse multi-scale featu...Show More
In order to solve the problem of under-tainting caused by insufficient coverage in dynamic taint analysis and the inability to perform fine-grained level analysis, a dynamic taint analysis method combining symbolic execution and constraint association is proposed. First, through code coverage to guide symbolic execution path exploration and test case generation, code coverage of dynamic taint anal...Show More
Accurate lightweight (LW) pose estimation is still a challenging task influenced by different human poses and various complex backgrounds in 2-D human images. To address the above problems, we propose a lightweight single-branch pose distillation network, termed LSPD, which is a lightweight powerful fully convolutional pose network that can be executed quickly with a low computational cost for acc...Show More
Cross-modality person re-identification (cm-ReID) aims to match pedestrian images from visible and infrared cameras. Most existing methods ignore data bias due to different cameras and views and overlook the strong dependence between feature maps that hinders modal alignment. In this paper, we propose a unified method named Joint Robust Representation and Generalization Enhancement (RRGE) to allev...Show More
Nowadays, robots have been widely used in various manufacturing assemblies. However, in the mobile phone flexible printed circuit (FPC) assembly task, robots are still far from trustworthy because the connector and receiver of FPC are very small in size, and detection for them is influenced by the partial occlusion of the robot end manipulator in operation. This makes it difficult to measure the s...Show More
Fast and accurate image retrieval is an important and challenging task in massive image data scenarios. As the core technology of image retrieval tasks, deep metric learning aims at learning effective embedding representations that possess two properties among data points: positive concentrated and negative separated. In this work, we propose a multilevel similarity-aware method based on deep loca...Show More
Using the features of malicious family to detect malicious code can improve the analysis efficiency and reduce the workload. Aiming at the problems of low efficiency and low accuracy of classifiers in analyzing and detecting malicious code using traditional machine learning, a new malicious family identification method 2MFI-FT is proposed. Firstly, the more comprehensive and essential features of ...Show More
The influence maximization (IM) problem, which aims to find $k$ most influential individuals from a social network to maximize the influence spread, has been extensively studied. Existing works all rely on the assumption that influenced individuals will definitely try to propagate the information to their neighbors through social trust. However, in real-world this assumption can be over-simplistic...Show More
At present, more and more researches focus on fault prediction of industrial equipments and medical equipments. But the existing approaches cannot effectively deal with the problem of large amount of noisy data and low value density from massive equipments status information, so the prediction accuracy is lower. To cope with these problems, we propose an extreme gradient boosting (XGBoost) algorit...Show More
In this paper, we exploit a method for identifying flaws on product surface based on spatial connectivity domain. A number of algorithms for detecting local features exist that were established to enhance the efficiency and accuracy of identifying interest features, such as AKAZE, BFSIFT, BRIEF, BRISK, ORB, SURF, SIFT and PCA-SIFT algorithm. But the data of flaws on product surface which is simila...Show More
Influence maximization, which seeks to find top influential individuals from a social network, has been extensively investigated in recent years. However, previous studies mainly focused on single diffusion or the diffusion of positive and negative messages, in which a competitor dominates the diffusion process. However, in a more realistic scenario, there is a level playing field between similar ...Show More
In this paper, we propose a seamless multimodal binary learning method for cross-modal retrieval. First, we utilize adversarial learning to learn modality-independent representations of different modalities. Second, we formulate loss function through the Bayesian approach, which aims to jointly maximize correlations of modality-independent representations and learn the common quantizer codebooks f...Show More
In this paper, we propose distribution-aware hierarchical weighting (DHW) method for deep metric learning. First, we formulate the distributions of different classes according to the form of gaussian curves, and update distributions as the training process. Second, depending on the learnable distribution, we propose a loss function named distribution-aware loss with dynamic mining margins and hier...Show More
In spite of widely discussed, drawing order recovery (DOR) from static images is still a great challenge task. Based on the idea that drawing trajectories are able to be recovered by connecting their trajectory components in correct orders, this work proposes a novel DOR method from static images. The method contains two steps: firstly, we adopt a convolution neural network (CNN) to predict the ne...Show More
Accurate fast hand detection and gesture recognition for hand understanding are still challenging tasks that are influenced by the diversity of hands and the complexity of the scene in color images. To address the above problem, we propose a novel SqueezeNet and fusion network-based fully convolutional network (SF-FCNet) to accurately and quickly perform hand detection and gesture recognition in c...Show More
With the fast development of mobile technologies, mobile marketing has become an import task for telecom operators. As a result, customer classification has attracted the attention of many scholars and companies. Decision tree is a computational intelligence technique having been widely used in the field of machine learning and data mining. To solve the customer classification problem, we propose ...Show More
The issue of employee turnover is always critical for companies, and accurate predictions can help them prepare in time. Most past studies on employee turnover have focused on analyzing impact factors or using simple network centrality measures. In this paper, we study the problem from a completely new perspective by modeling users' historical job records as a dynamic bipartite graph. Specifically...Show More
Learning based hashing has been widely used in approximate nearest neighbor search for image retrieval. However, most of the existing hashing methods are designed to learn only simplex feature similarity while ignored the location similarity among multiple objects, thus cannot work well on multi-label image retrieval tasks. In this paper, we propose a novel supervised hashing method which fusions ...Show More
In human resource management, employee turnover prediction is very important for company operation since the leave of key employees can bring great loss to companies. However, most existing researches focused on employee-centered turnover prediction, while ignored the historical events of turnover behaviors as well as the longitudinal data of each work. Therefore, in this paper we propose a turnov...Show More
In recent years, increasing deep hashing methods have been applied in large-scale multi-label image retrieval. However, in the existing deep network models, the extracted low-level features cannot effectively integrate the multi-level semantic information and the similarity ranking information of pairwise multi-label images into one hash coding learning scheme. Therefore, we cannot obtain an effic...Show More
Deep learning (DL) has achieved excellent results in dealing with various types of single-modal problems, and many researchers have applied DL in the field of cross-modal retrieval, in which the popular approaches are based on two-stage learning. The first stage obtains a separate representation of each modality, and the second stage is responsible for learning the inter-modal correlation, which i...Show More
In multi-criteria collaborative filtering, the data sparsity is a critical factor affecting the effectiveness of the algorithm. Existing solutions generally remove low-efficiency data through dimensionality reduction, decomposition, etc. While at lower data dimension, they also lose original data information, which impacts the accuracy of predicted ratings. This paper adopts a new processing strat...Show More
Most generative models are generating images at a time, but in fact, painting is usually done iteratively and repeatedly. Generative Adversarial Networks (GAN) are well known for generating images, however, it is hard to train stably. To tackle this problem, we propose a framework named the Wasserstein generative recurrent adversarial networks (WGRAN), which merges Wasserstein distance with recurr...Show More
The problem of influence maximization (IM) has been extensively studied in recent years and has many practical applications such as social advertising and viral marketing. Given the network and diffusion model, IM aims to find an influential set of seed nodes so that targeting them as diffusion sources will trigger the maximum cascade of influenced individuals. The largest challenge of the IM prob...Show More