Остановите войну!
for scientists:
default search action
Zhaoqiang Xia
- > Home > Persons > Zhaoqiang Xia
Publications
- 2024
- [j46]Chen Dang, Zhaoqiang Xia, Jing Dai, Jie Gao, Lei Li, Xiaoyi Feng:
SCPAD: An approach to explore optical characteristics for robust static presentation attack detection. Multim. Tools Appl. 83(5): 14503-14520 (2024) - [j45]Lili Liu, Zhaoqiang Xia, Xiaobiao Zhang, Jinye Peng, Xiaoyi Feng, Guoying Zhao:
Information-Enhanced Network for Noncontact Heart Rate Estimation From Facial Videos. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2136-2150 (2024) - 2023
- [j42]Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Maura Pintor, Battista Biggio, Fabio Roli:
Why adversarial reprogramming works, when it fails, and how to tell the difference. Inf. Sci. 632: 130-143 (2023) - [j41]Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Maura Pintor, Ambra Demontis, Battista Biggio, Fabio Roli:
Stateful detection of adversarial reprogramming. Inf. Sci. 642: 119093 (2023) - [j40]Yang Zheng, Luca Demetrio, Antonio Emanuele Cinà, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Battista Biggio, Fabio Roli:
Hardening RGB-D object recognition systems against adversarial patch attacks. Inf. Sci. 651: 119701 (2023) - [j39]Jie Gao, Zhaoqiang Xia, Jing Dai, Chen Dang, Xiaoyue Jiang, Xiaoyi Feng:
Vulnerable point detection and repair against adversarial attacks for convolutional neural networks. Int. J. Mach. Learn. Cybern. 14(12): 4163-4192 (2023) - [j36]Xiaobiao Zhang, Zhaoqiang Xia, Lili Liu, Xiaoyi Feng:
Demodulation Based Transformer for rPPG Generation and Heart Rate Estimation. IEEE Signal Process. Lett. 30: 1042-1046 (2023) - [j35]Feng Zhang, Xiaoyue Jiang, Zhaoqiang Xia, Moncef Gabbouj, Jinye Peng, Xiaoyi Feng:
Non-Local Color Compensation Network for Intrinsic Image Decomposition. IEEE Trans. Circuits Syst. Video Technol. 33(1): 132-145 (2023) - [j34]Sihang Dang, Zhaoqiang Xia, Xiaoyue Jiang, Shuliang Gui, Xiaoyi Feng:
Inclusive Consistency-Based Quantitative Decision-Making Framework for Incremental Automatic Target Recognition. IEEE Trans. Geosci. Remote. Sens. 61: 1-14 (2023) - [j33]Xiaobiao Zhang, Zhaoqiang Xia, Jing Dai, Lili Liu, Jinye Peng, Xiaoyi Feng:
MSDN: A Multistage Deep Network for Heart-Rate Estimation From Facial Videos. IEEE Trans. Instrum. Meas. 72: 1-15 (2023) - [i10]Yang Zheng, Luca Demetrio, Antonio Emanuele Cinà, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Battista Biggio, Fabio Roli:
Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks. CoRR abs/2309.07106 (2023) - 2022
- [j31]Fang Tan, Zhaoqiang Xia, Yupeng Ma, Xiaoyi Feng:
3D Sensor Based Pedestrian Detection by Integrating Improved HHA Encoding and Two-Branch Feature Fusion. Remote. Sens. 14(3): 645 (2022) - [j30]Dong Huang, Xiaoyi Feng, Haixi Zhang, Zitong Yu, Jinye Peng, Guoying Zhao, Zhaoqiang Xia:
Spatio-Temporal Pain Estimation Network With Measuring Pseudo Heart Rate Gain. IEEE Trans. Multim. 24: 3300-3313 (2022) - [i9]Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Maura Pintor, Ambra Demontis, Battista Biggio, Fabio Roli:
Stateful Detection of Adversarial Reprogramming. CoRR abs/2211.02885 (2022) - 2021
- [j28]Junmei Feng, Zhaoqiang Xia, Xiaoyi Feng, Jinye Peng:
RBPR: A hybrid model for the new user cold start problem in recommender systems. Knowl. Based Syst. 214: 106732 (2021) - [j26]Yupeng Ma, Xiaoyue Jiang, Zhaoqiang Xia, Moncef Gabbouj, Xiaoyi Feng:
CasQNet: Intrinsic Image Decomposition Based on Cascaded Quotient Network. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2661-2674 (2021) - [c23]Shuoyang Feng, Jianing Kang, Xiaoyi Feng, Lei Tang, Zhaoqiang Xia:
Remote Heart Rate Estimation Based on Convolutional Neural Network and Regional Adaptive Weighting. ICBBT 2021: 217-223 - [i8]Yang Zheng, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Ambra Demontis, Maura Pintor, Battista Biggio, Fabio Roli:
Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference. CoRR abs/2108.11673 (2021) - 2020
- [j25]Lei Li, Zhaoqiang Xia, Xiaoyue Jiang, Yupeng Ma, Fabio Roli, Xiaoyi Feng:
3D face mask presentation attack detection based on intrinsic image analysis. IET Biom. 9(3): 100-108 (2020) - [j24]Lei Li, Zhaoqiang Xia, Huijian Han, Guiqing He, Fabio Roli, Xiaoyi Feng:
Infrared and visible image fusion using a shallow CNN and structural similarity constraint. IET Image Process. 14(14): 3562-3571 (2020) - [j23]Lei Li, Zhaoqiang Xia, Xiaoyue Jiang, Fabio Roli, Xiaoyi Feng:
CompactNet: learning a compact space for face presentation attack detection. Neurocomputing 409: 191-207 (2020) - [j22]Dong Huang, Zhaoqiang Xia, Joshua Mwesigye, Xiaoyi Feng:
Pain-attentive network: a deep spatio-temporal attention model for pain estimation. Multim. Tools Appl. 79(37-38): 28329-28354 (2020) - [j21]Zhaoqiang Xia, Wei Peng, Huai-Qian Khor, Xiaoyi Feng, Guoying Zhao:
Revealing the Invisible With Model and Data Shrinking for Composite-Database Micro-Expression Recognition. IEEE Trans. Image Process. 29: 8590-8605 (2020) - [j20]Zhaoqiang Xia, Xiaopeng Hong, Xingyu Gao, Xiaoyi Feng, Guoying Zhao:
Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-Expressions. IEEE Trans. Multim. 22(3): 626-640 (2020) - [j19]Zhaoqiang Xia, Xiaopeng Hong, Xingyu Gao, Xiaoyi Feng, Guoying Zhao:
Corrections to "Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-Expressions". IEEE Trans. Multim. 22(4): 1111 (2020) - [i7]Zhaoqiang Xia, Wei Peng, Huai-Qian Khor, Xiaoyi Feng, Guoying Zhao:
Revealing the Invisible with Model and Data Shrinking for Composite-database Micro-expression Recognition. CoRR abs/2006.09674 (2020) - 2019
- [j17]Xihan Wang, Xiaoyi Feng, Zhaoqiang Xia:
Scene video text tracking based on hybrid deep text detection and layout constraint. Neurocomputing 363: 223-235 (2019) - [j16]Dong Huang, Zhaoqiang Xia, Lei Li, Kunwei Wang, Xiaoyi Feng:
Pain-awareness multistream convolutional neural network for pain estimation. J. Electronic Imaging 28(4): 043008 (2019) - [j15]Zhaoqiang Xia, Jie Lin, Xiaoyi Feng:
Trademark image retrieval via transformation-invariant deep hashing. J. Vis. Commun. Image Represent. 59: 108-116 (2019) - [j14]Lei Li, Zhaoqiang Xia, Abdenour Hadid, Xiaoyue Jiang, Haixi Zhang, Xiaoyi Feng:
Replayed Video Attack Detection Based on Motion Blur Analysis. IEEE Trans. Inf. Forensics Secur. 14(9): 2246-2261 (2019) - [c21]Xiaobiao Zhang, Xiaoyi Feng, Zhaoqiang Xia:
Analysis of Factors on BVP Signal Extraction Based on Imaging Principle. ICBEA 2019: 48-55 - [c20]Zhaoqiang Xia, Huan Liang, Xiaopeng Hong, Xiaoyi Feng:
Cross-database Micro-Expression Recognition with Deep Convolutional Networks. ICBEA 2019: 56-60 - [i4]Zhaoqiang Xia, Xiaopeng Hong, Xingyu Gao, Xiaoyi Feng, Guoying Zhao:
Spatiotemporal Recurrent Convolutional Networks for Recognizing Spontaneous Micro-expressions. CoRR abs/1901.04656 (2019) - [i3]Lei Li, Zhaoqiang Xia, Xiaoyue Jiang, Yupeng Ma, Fabio Roli, Xiaoyi Feng:
3D Face Mask Presentation Attack Detection Based on Intrinsic Image Analysis. CoRR abs/1903.11303 (2019) - 2018
- [j13]Zhaoqiang Xia, Xianlin Peng, Xiaoyi Feng, Abdenour Hadid:
Scarce face recognition via two-layer collaborative representation. IET Biom. 7(1): 56-62 (2018) - [j11]Xihan Wang, Zhaoqiang Xia, Jinye Peng, Xiaoyi Feng:
Multiorientation scene text detection via coarse-to-fine supervision-based convolutional networks. J. Electronic Imaging 27(03): 033032 (2018) - [j10]Lei Li, Xiaoyi Feng, Zhaoqiang Xia, Xiaoyue Jiang, Abdenour Hadid:
Face spoofing detection with local binary pattern network. J. Vis. Commun. Image Represent. 54: 182-192 (2018) - [c18]Tian Lan, Xiaoyi Feng, Lei Li, Zhaoqiang Xia:
Similar Trademark Image Retrieval Based on Convolutional Neural Network and Constraint Theory. IPTA 2018: 1-6 - [c17]Yupeng Ma, Xiaoyi Feng, Lujing Chao, Dong Huang, Zhaoqiang Xia, Xiaoyue Jiang:
A New Database for Evaluating Underwater Image Processing Methods. IPTA 2018: 1-6 - [c16]Zhaoqiang Xia, Xiaoyi Feng, Xiaopeng Hong, Guoying Zhao:
Spontaneous Facial Micro-expression Recognition via Deep Convolutional Network. IPTA 2018: 1-6 - [i2]Lei Li, Zhaoqiang Xia, Abdenour Hadid, Xiaoyue Jiang, Fabio Roli, Xiaoyi Feng:
Face Presentation Attack Detection in Learned Color-liked Space. CoRR abs/1810.13170 (2018) - 2017
- [j7]Minghui Zhang, Huifang Li, Zhaoqiang Xia, Xiaoyi Feng, Jinye Peng:
Semiquantum secure direct communication using EPR pairs. Quantum Inf. Process. 16(5): 117 (2017) - [j6]Zhaoqiang Xia, Xiaoyi Feng, Jie Lin, Abdenour Hadid:
Deep convolutional hashing using pairwise multi-label supervision for large-scale visual search. Signal Process. Image Commun. 59: 109-116 (2017) - [c15]Tian Lan, Xiaoyi Feng, Zhaoqiang Xia, Shijie Pan, Jinye Peng:
Similar Trademark Image Retrieval Integrating LBP and Convolutional Neural Network. ICIG (3) 2017: 231-242 - [c14]Xihan Wang, Xiaoyi Feng, Zhaoqiang Xia, Jinye Peng, Eric Granger:
Multi-orientation Scene Text Detection Leveraging Background Suppression. ICIG (1) 2017: 555-566 - [c13]Yupeng Ma, Xiaoyi Feng, Xiaoyue Jiang, Zhaoqiang Xia, Jinye Peng:
Intrinsic Image Decomposition: A Comprehensive Review. ICIG (1) 2017: 626-638 - [c12]Lei Li, Xiaoyi Feng, Xiaoyue Jiang, Zhaoqiang Xia, Abdenour Hadid:
Face anti-spoofing via deep local binary patterns. ICIP 2017: 101-105 - 2016
- [j5]Zhaoqiang Xia, Xiaoyi Feng, Jinye Peng, Xianlin Peng, Guoying Zhao:
Spontaneous micro-expression spotting via geometric deformation modeling. Comput. Vis. Image Underst. 147: 87-94 (2016) - [c11]Xianlin Peng, Zhaoqiang Xia, Lei Li, Xiaoyi Feng:
Towards Facial Expression Recognition in the Wild: A New Database and Deep Recognition System. CVPR Workshops 2016: 1544-1550 - [c10]Lei Li, Xiaoyi Feng, Xiaoting Wu, Zhaoqiang Xia, Abdenour Hadid:
Kinship Verification from Faces via Similarity Metric Based Convolutional Neural Network. ICIAR 2016: 539-548 - [c9]Xiaoyue Jiang, Jie Lian, Zhaoqiang Xia, Xiaoyi Feng, Abdenour Hadid:
Fast Chinese character detection from complex scenes. IPTA 2016: 1-4 - [c8]Lei Li, Xiaoyi Feng, Zinelabidine Boulkenafet, Zhaoqiang Xia, Mingming Li, Abdenour Hadid:
An original face anti-spoofing approach using partial convolutional neural network. IPTA 2016: 1-6 - [c6]Zhaoqiang Xia, Xiaoyi Feng, Jinye Peng, Abdenour Hadid:
Unsupervised deep hashing for large-scale visual search. IPTA 2016: 1-5 - [c5]Zhaoqiang Xia, Wenhao Zhang, Fang Tan, Xiaoyi Feng, Abdenour Hadid:
An accurate eye localization approach for smart embedded system. IPTA 2016: 1-5 - [i1]Zhaoqiang Xia, Xiaoyi Feng, Jinye Peng, Abdenour Hadid:
Unsupervised Deep Hashing for Large-scale Visual Search. CoRR abs/1602.00206 (2016) - 2015
- [j4]Zhaoqiang Xia, Xiaoyi Feng, Jinye Peng, Jun Wu, Jianping Fan:
A regularized optimization framework for tag completion and image retrieval. Neurocomputing 147: 500-508 (2015) - [j3]Zhaoqiang Xia, Yi Shen, Xiaoyi Feng, Jinye Peng, Jianping Fan:
Automatic tag-to-region assignment via multiple instance learning. Multim. Tools Appl. 74(3): 979-1002 (2015) - [j2]Zhaoqiang Xia, Xiaoyi Feng, Jinye Peng, Jianping Fan:
Content-Irrelevant Tag Cleansing via Bi-Layer Clustering and Peer Cooperation. J. Signal Process. Syst. 81(1): 29-44 (2015) - 2014
- [j1]Zhaoqiang Xia, Jinye Peng, Xiaoyi Feng, Jianping Fan:
Automatic Abstract Tag Detection for Social Image Tag Refinement and Enrichment. J. Signal Process. Syst. 74(1): 5-18 (2014) - 2013
- [c2]Zhaoqiang Xia, Jinye Peng, Xiaoyi Feng, Jianping Fan:
Multiple Instance Learning for Automatic Image Annotation. MMM (2) 2013: 194-205 - 2012
- [c1]Zhaoqiang Xia, Jinye Peng, Xiaoyi Feng, Jianping Fan:
Social Tag Enrichment via Automatic Abstract Tag Refinement. PCM 2012: 198-209
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-22 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint