U-COPE: Taking a Further Step to Universal 9D Category-Level Object Pose Estimation

L Zhang, W Meng, Y Zhong, B Kong, M Xu, J Du… - … on Computer Vision, 2025 - Springer
Rigid and articulated objects are common in our daily lives. Pose estimation tasks for both
types of objects have been extensively studied within their respective domains. However, a …

Dual-decoding branch contrastive augmentation for image manipulation localization

Q Zeng, H Wang, Y Zhou, R Zhang - Knowledge-Based Systems, 2024 - Elsevier
With the rapid development of image editing techniques, forensic analysis to detect
malicious image manipulation has become an important research topic. The current image …

FMSD: Focal Multi-scale Shape-feature Distillation Network for Small Fasteners Detection in Electric Power Scene

J Yi, J Mao, H Zhang, M Li, K Zeng… - … on Circuits and …, 2024 - ieeexplore.ieee.org
In the electric power scene, fasteners play a pivotal role in securing and connecting
electrical equipment, with small fastener detection (SFD) being crucial for ensuring …

DAE-Net: Dual Attention Mechanism and Edge Supervision Network for Image Manipulation Detection and Localization

C Shi, C Wang, X Zhou, Z Qin - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Image manipulation detection and localization (IMDL) aim to identify tampered regions from
a suspicious image. Although existing works have achieved impressive results, they fail to …

Exploring Multi-view Pixel Contrast for General and Robust Image Forgery Localization

Z Lou, G Cao, K Guo, H Zhu, L Yu - arXiv preprint arXiv:2406.13565, 2024 - arxiv.org
Image forgery localization, which aims to segment tampered regions in an image, is a
fundamental yet challenging digital forensic task. While some deep learning-based forensic …

SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints

Z Sheng, W Lu, X Luo, J Zhou, X Cao - arXiv preprint arXiv:2412.09981, 2024 - arxiv.org
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse
and protecting social safety. However, due to the rapid development of image tampering …

[PDF][PDF] Deep Learning and Machine Learning, Advancing Big Data Analytics and Management: Generative Models

S Chen, T Wang, X Song, B Jing, J Yang, J Song… - osf.io
1Zhejiang University, A1033439225@ gmail. com 2Xi'an Jiaotong-Liverpool University,
Tianyang. Wang21@ student. xjtlu. edu. cn 3Emory University, songxinyuan@ pku. edu. cn …

[PDF][PDF] Mastering Reinforcement Learning: Foundations, Algorithms, and Real-World Applications

K Chen, Z Bi, X Song, Q Niu, J Liu, B Peng, S Zhang… - osf.io
Reinforcement Learning (RL) is a distinct branch of machine learning focused on how
agents should take actions in an environment to maximize cumulative rewards [38]. Unlike …

[PDF][PDF] Transformer: Attention Is All You Need

K Chen, Z Bi, X Song, Q Niu, J Liu, B Peng, S Zhang… - 2019 - files.osf.io
Deep learning is a subset of machine learning that models data using artificial neural
networks with multiple layers [105]. Each layer in the neural network processes the input …