default search action
Yuqiu Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j13]Qitan Shao, Xinglin Piao, Xiangyu Yao, Yuqiu Kong, Yongli Hu, Baocai Yin, Yong Zhang:
An adaptive composite time series forecasting model for short-term traffic flow. J. Big Data 11(1): 102 (2024) - [j12]Mengnan Zhao, Yuqiu Kong, Lihe Zhang, Baocai Yin:
Class correlation correction for unbiased scene graph generation. Pattern Recognit. 149: 110221 (2024) - [j11]Mengnan Zhao, Lihe Zhang, Wei Wang, Yuqiu Kong, Baocai Yin:
Adversarial Attacks on Scene Graph Generation. IEEE Trans. Inf. Forensics Secur. 19: 3210-3225 (2024) - 2023
- [j10]Mengnan Zhao, Lihe Zhang, Yuqiu Kong, Baocai Yin:
Temporal knowledge graph reasoning triggered by memories. Appl. Intell. 53(23): 28418-28433 (2023) - [j9]Cuili Yao, Lin Feng, Yuqiu Kong, Lin Xiao, Tao Chen:
Transformers and CNNs fusion network for salient object detection. Neurocomputing 520: 342-355 (2023) - [j8]Fang Liu, Yuqiu Kong, Lihe Zhang, Guang Feng, Baocai Yin:
Local-global coordination with transformers for referring image segmentation. Neurocomputing 522: 39-52 (2023) - [j7]Yuqiu Kong, He Wang, Lingwei Kong, Yang Liu, Cuili Yao, Baocai Yin:
Absolute and Relative Depth-Induced Network for RGB-D Salient Object Detection. Sensors 23(7): 3611 (2023) - 2022
- [j6]Cuili Yao, Lin Feng, Yuqiu Kong, Shengming Li, Hang Li:
Double cross-modality progressively guided network for RGB-D salient object detection. Image Vis. Comput. 117: 104351 (2022) - [j5]Mengnan Zhao, Bo Wang, Wei Wang, Yuqiu Kong, Tianhang Zheng, Kui Ren:
Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection. IEEE Trans. Inf. Forensics Secur. 17: 2468-2482 (2022) - 2021
- [j4]Cuili Yao, Lin Feng, Yuqiu Kong, Bo Jin, Yiwei Liu, Leheng Li:
Bi-DAINet: Bi-Directional Discard-Accept-Integrate Network for salient object detection. Neurocomputing 428: 142-152 (2021) - [j3]Yuqiu Kong, Mengyang Feng, Xin Li, Huchuan Lu, Xiuping Liu, Baocai Yin:
Spatial context-aware network for salient object detection. Pattern Recognit. 114: 107867 (2021) - 2020
- [j2]Cuili Yao, Yuqiu Kong, Lin Feng, Bo Jin, Hui Si:
Contour-Aware Recurrent Cross Constraint Network for Salient Object Detection. IEEE Access 8: 218739-218751 (2020) - 2018
- [j1]Yuqiu Kong, Jianming Zhang, Huchuan Lu, Xiuping Liu:
Exemplar-Aided Salient Object Detection via Joint Latent Space Embedding. IEEE Trans. Image Process. 27(10): 5167-5177 (2018)
Conference and Workshop Papers
- 2024
- [c10]Mengnan Zhao, Lihe Zhang, Yuqiu Kong, Baocai Yin:
Catastrophic Overfitting: A Potential Blessing in Disguise. ECCV (42) 2024: 293-310 - [c9]Yuqiu Kong, Junhua Liu, Cuili Yao:
Dual Context Perception Transformer for Referring Image Segmentation. PRCV (5) 2024: 216-230 - 2023
- [c8]Mengnan Zhao, Lihe Zhang, Yuqiu Kong, Baocai Yin:
Fast Adversarial Training with Smooth Convergence. ICCV 2023: 4697-4706 - [c7]Fang Liu, Yuhao Liu, Yuqiu Kong, Ke Xu, Lihe Zhang, Baocai Yin, Gerhard P. Hancke, Rynson W. H. Lau:
Referring Image Segmentation Using Text Supervision. ICCV 2023: 22067-22077 - 2022
- [c6]Yuqiu Kong, Yushuo Zheng, Cuili Yao, Yang Liu, He Wang:
Scale Adaptive Fusion Network for RGB-D Salient Object Detection. ACCV (3) 2022: 608-625 - [c5]Yang Liu, Yingping Li, Chengyu Kong, Yuqiu Kong, Shenglan Liu, Feilong Wang:
Vision Shared and Representation Isolated Network for Person Search. IJCAI 2022: 1216-1222 - [c4]Yang Liu, Wanxiao Yang, Hangyou Yu, Lin Feng, Yuqiu Kong, Shenglan Liu:
Background Suppressed and Motion Enhanced Network for Weakly Supervised Video Anomaly Detection. PRCV (3) 2022: 678-690 - 2021
- [c3]Zihan Li, Yuqiu Kong, Baocai Yin:
Scale-invariant Convolutional Capsule Network. AIAM (ACM) 2021: 230-237 - [c2]Hewen Xiao, Yuqiu Kong, Hongchen Tan, Xiuping Liu, Baocai Yin:
Label2im: Knowledge Graph Guided Image Generation from Labels. BMVC 2021: 303 - 2016
- [c1]Yuqiu Kong, Lijun Wang, Xiuping Liu, Huchuan Lu, Xiang Ruan:
Pattern Mining Saliency. ECCV (6) 2016: 583-598
Informal and Other Publications
- 2024
- [i6]Mengnan Zhao, Lihe Zhang, Tianhang Zheng, Yuqiu Kong, Baocai Yin:
Separable Multi-Concept Erasure from Diffusion Models. CoRR abs/2402.05947 (2024) - [i5]Mengnan Zhao, Lihe Zhang, Yuqiu Kong, Baocai Yin:
Catastrophic Overfitting: A Potential Blessing in Disguise. CoRR abs/2402.18211 (2024) - 2023
- [i4]Mengnan Zhao, Lihe Zhang, Yuqiu Kong, Baocai Yin:
Fast Adversarial Training with Smooth Convergence. CoRR abs/2308.12857 (2023) - [i3]Fang Liu, Yuhao Liu, Yuqiu Kong, Ke Xu, Lihe Zhang, Baocai Yin, Gerhard P. Hancke, Rynson W. H. Lau:
Referring Image Segmentation Using Text Supervision. CoRR abs/2308.14575 (2023) - [i2]Mengnan Zhao, Lihe Zhang, Yuqiu Kong, Baocai Yin:
EipFormer: Emphasizing Instance Positions in 3D Instance Segmentation. CoRR abs/2312.05602 (2023) - 2021
- [i1]Mengnan Zhao, Lihe Zhang, Yuqiu Kong, Baocai Yin:
Temporal Knowledge Graph Reasoning Triggered by Memories. CoRR abs/2110.08765 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint