UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

4 5 6 7 8
hits: 297
51.
  • PyraPVConv: Efficient 3D Po... PyraPVConv: Efficient 3D Point Cloud Perception with Pyramid Voxel Convolution and Sharable Attention
    Chen, Yuhong; Peng, Weilong; Tang, Keke ... Computational intelligence and neuroscience, 2022, Volume: 2022
    Journal Article
    Peer reviewed
    Open access

    Designing efficient deep learning models for 3D point cloud perception is becoming a major research direction. Point-voxel convolution (PVConv) Liu et al. (2019) is a pioneering research work in this ...
Full text
52.
Full text

PDF
53.
  • Rethinking Perturbation Dir... Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds
    Tang, Keke; Shi, Yawen; Lou, Tianrui ... IEEE internet of things journal, 03/2023, Volume: 10, Issue: 6
    Journal Article

    Adversarial attacks have been successfully extended to the field of point clouds. Besides applying the common perturbation guided by the gradient, adversarial attacks on point clouds can be conducted ...
Full text
54.
  • Node Injection Attack Based... Node Injection Attack Based on Label Propagation Against Graph Neural Network
    Zhu, Peican; Pan, Zechen; Tang, Keke ... IEEE transactions on computational social systems, 06/2024
    Journal Article
    Peer reviewed
    Open access

    Graph neural network (GNN) has achieved remarkable success in various graph learning tasks, such as node classification, link prediction, and graph classification. The key to the success of GNN lies ...
Full text
55.
  • Multi-task super resolution... Multi-task super resolution method for vector field critical points enhancement
    Yang, Yilun; Hao, Zhou; Peng, Weilong ... Metaverse, 06/2022, Volume: 3, Issue: 1
    Journal Article
    Open access

    It is a challenging task to handle the vector field visualization at  local critical points. Generally, topological based methods firstly divide critical regions into different categories, and then ...
Full text
56.
  • Multi-task super resolution... Multi-task super resolution method for vector field critical points enhancement
    Yang, Yilun; Hao, Zhou; Peng, Weilong ... Metaverse, 06/2022, Volume: 3, Issue: 1
    Journal Article
    Open access

    It is a challenging task to handle the vector field visualization at  local critical points. Generally, topological based methods firstly divide critical regions into different categories, and then ...
Full text
57.
  • NormalAttack: Curvature-Awa... NormalAttack: Curvature-Aware Shape Deformation along Normals for Imperceptible Point Cloud Attack
    Tang, Keke; Shi, Yawen; Wu, Jianpeng ... Security and communication networks, 08/2022, Volume: 2022
    Journal Article
    Peer reviewed
    Open access

    Many efforts have been made on developing adversarial attack methods on point clouds. However, without fully considering the geometric property of point clouds, existing methods tend to produce ...
Full text
58.
  • Tuning lamellar structure d... Tuning lamellar structure distribution around elliptical notch in Ti-6Al-4V for fatigue performance
    Tang, Keke; Chen, Kunrong; Ferro, Paolo ... Procedia Structural Integrity, 2022, 2022-00-00, Volume: 39
    Journal Article
    Open access

    The paper is aimed to investigate the effect of lamellar structure distribution around elliptical notch in bimodal titanium alloys of Ti-6Al-4V. In this regard, within the framework of crystal ...
Full text
59.
  • Mechanical anisotropy of tw... Mechanical anisotropy of two-dimensional metamaterials: a computational study
    Liu, Ning; Becton, Mathew; Zhang, Liuyang ... Nanoscale advances, 08/2019, Volume: 1, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Metamaterials, rationally designed multiscale composite systems, have attracted extensive interest because of their potential for a broad range of applications due to their unique properties such as ...
Full text

PDF
60.
  • Effective Single-Step Adver... Effective Single-Step Adversarial Training With Energy-Based Models
    Tang, Keke; Lou, Tianrui; Peng, Weilong ... IEEE transactions on emerging topics in computational intelligence, 2024
    Journal Article
    Peer reviewed

    Adversarial training (AT) is one of the most effective ways against adversarial attacks. However, multi-step AT is time-consuming while single-step AT is ineffective. In this paper, we propose an ...
Full text
4 5 6 7 8
hits: 297

Load filters