Have a personal or library account? Click to login

Showing 541-552 of 159342

Research on a Lightweight Small Object Detection Method Based on Lite-RFB Modules
Article

Research on a Lightweight Small Object Detection Method Based on Lite-RFB Modules

Wang, Fei, Lu, Liping
Speech Processing Using Dynamic Micro-Block Optimization Based on Deep Learning
Article

Speech Processing Using Dynamic Micro-Block Optimization Based on Deep Learning

Hao, Jiajun, Geng, Chaoyang
An Improved RT-DETR-Based Object Detection Algorithm for UAV Aerial Photography
Article

An Improved RT-DETR-Based Object Detection Algorithm for UAV Aerial Photography

Long, Yingying, Di, Liuhua, Fu, Yanfang, Zhao, Shifeng, Bai, Xiaojun
Three-Dimensional Line-of-Sight Estimation Based on RTACM-Net and Vision Transformer
Article

Three-Dimensional Line-of-Sight Estimation Based on RTACM-Net and Vision Transformer

Sang, Tingjuan, Gao, Wuqi
Research on night vision pedestrian detection algorithm by incorporating attention mechanism
Article

Research on night vision pedestrian detection algorithm by incorporating attention mechanism

Yang, Jiaxue, Liu, Pingping
AG-HybridNet: An Attention-Guided Hybrid CNN-Transformer Network for 3D Gaze Estimation
Article

AG-HybridNet: An Attention-Guided Hybrid CNN-Transformer Network for 3D Gaze Estimation

Li, Yue, Wang, Changyuan
Tight Analysis of Grover-Meets-Simon and Alg-PolyQ2 Attacks via Formalizing Quantum Rank-Solving under Deferred Measurement
Article

Tight Analysis of Grover-Meets-Simon and Alg-PolyQ2 Attacks via Formalizing Quantum Rank-Solving under Deferred Measurement

Xia, Qiqing, Zhu, Qianru, Xie, Huiqin, Yang, Li
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering
Article

Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering

Khan, Jibran Rasheed, Qureshi, Sumaira Mustafa, Siddiqui, Farhan Ahmed, Ali, Syed Asim
Deterministic Quantum Key Distribution with Untrusted Relay and Finite Sources
Article

Deterministic Quantum Key Distribution with Untrusted Relay and Finite Sources

Kang, Guo-Dong, Zhang, Li-Jun, Wu, Xiao-Lu, Zhou, Qing-Ping, Fang, Mao-Fa
Twin-Field Quantum Network Coding for Multi-Party Key Distribution
Article

Twin-Field Quantum Network Coding for Multi-Party Key Distribution

Liu, Yuchen, Shang, Tao, Xiong, Keyu
MD-YOLOV12: Two-Stage Feature Injection for Robust Tool Wear Detection
Article

MD-YOLOV12: Two-Stage Feature Injection for Robust Tool Wear Detection

Cao, Jiaxin, Bai, Yu
A phlogopite-amphibole-plagioclase bearing websterite from Guinadji volcano (Adamawa Plateau, Northern Cameroon): evidence of a cumulate origin and crustal event
Article

A phlogopite-amphibole-plagioclase bearing websterite from Guinadji volcano (Adamawa Plateau, Northern Cameroon): evidence of a cumulate origin and crustal event

Kagarabi, Paterne Mulimbi, Ntaflos, Theodoros, Tamen, Jules, Nkouathio, David G., Tumba, Kaniki