Institution
Hefei University of Technology
Education•Hefei, China•
About: Hefei University of Technology is a education organization based out in Hefei, China. It is known for research contribution in the topics: Computer science & Microstructure. The organization has 28093 authors who have published 24935 publications receiving 324989 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A novel sequential vector of locally aggregated descriptor (VLAD) layer is developed to combine a trainable VLAD encoding process and the RCNs architecture into a whole framework to aggregate not only detailed spatial information in separate video frames but also fine motion information in successive video frames.
Abstract: As characterizing videos simultaneously from spatial and temporal cues has been shown crucial for the video analysis, the combination of convolutional neural networks and recurrent neural networks, i.e., recurrent convolution networks (RCNs), should be a native framework for learning the spatio-temporal video features. In this paper, we develop a novel sequential vector of locally aggregated descriptor (VLAD) layer, named SeqVLAD, to combine a trainable VLAD encoding process and the RCNs architecture into a whole framework. In particular, sequential convolutional feature maps extracted from successive video frames are fed into the RCNs to learn soft spatio-temporal assignment parameters, so as to aggregate not only detailed spatial information in separate video frames but also fine motion information in successive video frames. Moreover, we improve the gated recurrent unit (GRU) of RCNs by sharing the input-to-hidden parameters and propose an improved GRU-RCN architecture named shared GRU-RCN (SGRU-RCN). Thus, our SGRU-RCN has a fewer parameters and a less possibility of overfitting. In experiments, we evaluate SeqVLAD with the tasks of video captioning and video action recognition. Experimental results on Microsoft Research Video Description Corpus, Montreal Video Annotation Dataset, UCF101, and HMDB51 demonstrate the effectiveness and good performance of our method.
91 citations
••
TL;DR: In this article, graphite oxide was successfully functionalised by 3-aminopropyltriethoxysilane ionic liquid and used as a filler material in a polybenzimidazole (PBI) membrane for high temperature proton exchange membrane fuel cells.
91 citations
••
TL;DR: In this article, the impact of domestic final use and international trade on energy consumption in China was analyzed using decomposition analysis and embodied energy and its variation across sectors were quantified to identify the key sectors contributing to the growth of energy consumption.
91 citations
••
07 Aug 2017TL;DR: This method does not modify the content of the image itself, therefore, can effectively resist steganalysis tools and is compared with state-of-art coverless steganography method which also based on image hash, and experimental results show that it has higher capacity, robustness and security than the method proposed in [15].
Abstract: Traditional image steganography modifies the content of the image more or less, it is hard to resist the detection of image steganalysis tools. New kind of steganography methods, coverless steganography methods, attract research attention recently due to its virtue of do not modify the content of the stego image at all. In this paper, we propose a new coverless steganography method based on robust image hashing. Firstly, we design an effective and stable image hash by using the orientation information of the SIFT feature points. Then the local image database is created and the corresponding hash values of these images in the database are computed. Secondly, the secret message is divided into segments with the same length as the hash sequences. And a series of images are chosen from the image database by matching the secret information segments and the hash sequences of all the images. Finally, these images are transmitted as the carriers of the secret information. When the receiver receives these images, the secret information is extracted by using the shared hash method. Due to the characteristics that SIFT features can resist common image attacks in a certain extent, the secret information corresponding to the hash has strong robustness. To improve the retrieval and matching efficiency of the hashing system, an inverted index of quadtree structure is designed. Compared with the traditional image steganography, this method does not modify the content of the image itself, therefore, can effectively resist steganalysis tools. Furthermore, we compare the proposed method with state-of-art coverless steganography method which also based on image hash, and experimental results show that our method has higher capacity, robustness and security than the method proposed in [15].
91 citations
••
TL;DR: The experimental results show that the SVM parameters selected by the proposed DCQGA-SVM contribute to higher diagnosis accuracy than other methods referred in this paper.
91 citations
Authors
Showing all 28292 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yi Chen | 217 | 4342 | 293080 |
Xiang Zhang | 154 | 1733 | 117576 |
Jun Chen | 136 | 1856 | 77368 |
Shuicheng Yan | 123 | 810 | 66192 |
Yang Li | 117 | 1319 | 63111 |
Jian Liu | 117 | 2090 | 73156 |
Han-Qing Yu | 105 | 718 | 39735 |
Jianqiao Ye | 101 | 962 | 42647 |
Wei Liu | 96 | 1538 | 42459 |
Wei Zhou | 93 | 1640 | 39772 |
Panos M. Pardalos | 87 | 1207 | 39512 |
Zhong Chen | 80 | 1000 | 28171 |
Yong Zhang | 78 | 665 | 36388 |
Rong Cao | 76 | 568 | 21747 |
Qian Zhang | 76 | 891 | 25517 |