Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Nie, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.11475  [pdf, other

    cs.CV

    TrackGo: A Flexible and Efficient Method for Controllable Video Generation

    Authors: Haitao Zhou, Chuang Wang, Rui Nie, Jinxiao Lin, Dongdong Yu, Qian Yu, Changhu Wang

    Abstract: Recent years have seen substantial progress in diffusion-based controllable video generation. However, achieving precise control in complex scenarios, including fine-grained object parts, sophisticated motion trajectories, and coherent background movement, remains a challenge. In this paper, we introduce TrackGo, a novel approach that leverages free-form masks and arrows for conditional video gene… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  2. arXiv:2312.07934  [pdf, other

    eess.IV cs.CV

    Toward Real World Stereo Image Super-Resolution via Hybrid Degradation Model and Discriminator for Implied Stereo Image Information

    Authors: Yuanbo Zhou, Yuyang Xue, Jiang Bi, Wenlin He, Xinlin Zhang, Jiajun Zhang, Wei Deng, Ruofeng Nie, Junlin Lan, Qinquan Gao, Tong Tong

    Abstract: Real-world stereo image super-resolution has a significant influence on enhancing the performance of computer vision systems. Although existing methods for single-image super-resolution can be applied to improve stereo images, these methods often introduce notable modifications to the inherent disparity, resulting in a loss in the consistency of disparity between the original and the enhanced ster… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  3. arXiv:2210.15446  [pdf, other

    cs.CR cs.LG

    LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels

    Authors: Jiebao Zhang, Wenhua Qian, Rencan Nie, Jinde Cao, Dan Xu

    Abstract: Deep neural networks are vulnerable to adversarial attacks. Most $L_{0}$-norm based white-box attacks craft perturbations by the gradient of models to the input. Since the computation cost and memory limitation of calculating the Hessian matrix, the application of Hessian or approximate Hessian in white-box attacks is gradually shelved. In this work, we note that the sparsity requirement on pertur… ▽ More

    Submitted 6 April, 2023; v1 submitted 25 October, 2022; originally announced October 2022.

    Comments: 15 pages, 7 figures

  4. arXiv:2207.05756  [pdf, other

    cs.LG cs.AI

    Exploring Adversarial Examples and Adversarial Robustness of Convolutional Neural Networks by Mutual Information

    Authors: Jiebao Zhang, Wenhua Qian, Rencan Nie, Jinde Cao, Dan Xu

    Abstract: A counter-intuitive property of convolutional neural networks (CNNs) is their inherent susceptibility to adversarial examples, which severely hinders the application of CNNs in security-critical fields. Adversarial examples are similar to original examples but contain malicious perturbations. Adversarial training is a simple and effective defense method to improve the robustness of CNNs to adversa… ▽ More

    Submitted 26 July, 2022; v1 submitted 12 July, 2022; originally announced July 2022.

    Comments: initial submit 3

  5. UFA-FUSE: A novel deep supervised and hybrid model for multi-focus image fusion

    Authors: Yongsheng Zang, Dongming Zhou, Changcheng Wang, Rencan Nie, Yanbu Guo

    Abstract: Traditional and deep learning-based fusion methods generated the intermediate decision map to obtain the fusion image through a series of post-processing procedures. However, the fusion results generated by these methods are easy to lose some source image details or results in artifacts. Inspired by the image reconstruction techniques based on deep learning, we propose a multi-focus image fusion n… ▽ More

    Submitted 20 April, 2021; v1 submitted 12 January, 2021; originally announced January 2021.

    Comments: 17pages,11 figures, 7 tables. IEEE Transactions on Instrumentation and Measurement

  6. arXiv:2009.14481  [pdf, other

    cs.IT

    Impact and Calibration of Nonlinear Reciprocity Mismatch in Massive MIMO

    Authors: Rongjiang Nie, Li Chen, Nan Zhao, Yunfei Chen, Weidong Wang, Xianbin Wang

    Abstract: Time-division-duplexing massive multiple-input multiple-output (MIMO) systems estimate the channel state information (CSI) by leveraging the uplink-downlink channel reciprocity, which is no longer valid when the mismatch arises from the asymmetric uplink and downlink radio frequency (RF) chains. Existing works treat the reciprocity mismatch as constant for simplicity. However, the practical RF cha… ▽ More

    Submitted 30 September, 2020; originally announced September 2020.

  7. arXiv:2004.02805  [pdf

    eess.IV cs.CV cs.LG stat.ML

    Application of Structural Similarity Analysis of Visually Salient Areas and Hierarchical Clustering in the Screening of Similar Wireless Capsule Endoscopic Images

    Authors: Rui Nie, Huan Yang, Hejuan Peng, Wenbin Luo, Weiya Fan, Jie Zhang, Jing Liao, Fang Huang, Yufeng Xiao

    Abstract: Small intestinal capsule endoscopy is the mainstream method for inspecting small intestinal lesions,but a single small intestinal capsule endoscopy will produce 60,000 - 120,000 images, the majority of which are similar and have no diagnostic value. It takes 2 - 3 hours for doctors to identify lesions from these images. This is time-consuming and increase the probability of misdiagnosis and missed… ▽ More

    Submitted 1 April, 2020; originally announced April 2020.