Abstract: The perception of night scenes is of crucial importance for driving safety. In the dimly lit night environment, as the visibility of objects decreases, both experienced and inexperienced ...
Abstract: Camouflaged object detection (COD) is a challenging task that struggles to accurately detect the objects concealed in the surrounding environment. This is largely attributed to the intrinsic ...
Millimeter-wave radar object detection has become pivotal for autonomous driving systems requiring all-weather reliability. While conventional CFAR methods face limitations in classification ...
PoroDet is a Python package for the contrast-based detection and analysis of nanoporosities in Fresnel-contrast transmission electron microscopy (TEM) images. It utilizes a U-Net convolutional neural ...
Abstract: Object detection is a critical task in computer vision, with applications ranging from autonomous driving to medical imaging. Traditional object detection models, such as Fast R-CNN, have ...
Abstract: Traditional 3D object detectors, whether fully-, semi-, or weakly-supervised, rely heavily on extensive human annotations. In contrast, this paper introduces an unsupervised 3D object ...
Abstract: Small object detection in remote sensing images is severely hampered by the significant scale variation even among small objects. Conventional methods often rely on a static receptive field ...
Abstract: Space noncooperative object detection (SNCOD) is an essential part of space situation awareness. The localization and segmentation capabilities of the salient object detection (SOD) method ...
Abstract: Realizing unified 3D object detection, including both indoor and outdoor scenes, holds great importance in applications like robot navigation. However, involving various scenarios of data to ...
Abstract: Single-Domain Generalization Object Detection (Single-DGOD) refers to training a model with only one source domain, enabling the model to generalize to any unseen domain. For instance, a ...
Abstract: To address the problems of relying on electronic repositories and being vulnerable to network influence in obtaining key information of literature in mainstream literature management ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results