no code implementations • 26 May 2021 • Guoqing Zhang, Yuhao Chen, Weisi Lin, Arun Chandran, Xuan Jing
As a prevailing task in video surveillance and forensics field, person re-identification (re-ID) aims to match person images captured from non-overlapped cameras.
1 code implementation • 25 May 2021 • Yuhao Chen, Guoqing Zhang, Yujiang Lu, zhenxing Wang, yuhui Zheng, Ruili Wang
Text-based person search is a sub-task in the field of image retrieval, which aims to retrieve target person images according to a given textual description.
Ranked #4 on Text based Person Retrieval on CUHK-PEDES
1 code implementation • 25 May 2021 • Guoqing Zhang, Yu Ge, Zhicheng Dong, Hao Wang, yuhui Zheng, ShengYong Chen
Compared with the state-of-the-art methods, our proposed PS-HRNet improves 3. 4\%, 6. 2\%, 2. 5\%, 1. 1\% and 4. 2\% at Rank-1 on MLR-Market-1501, MLR-CUHK03, MLR-VIPeR, MLR-DukeMTMC-reID, and CAVIAR datasets, respectively.
no code implementations • 21 Mar 2021 • Guoqing Zhang, Yuhao Chen, Yang Dai, yuhui Zheng, Yi Wu
Due to the inaccurate person detections and pose changes, pedestrian misalignment significantly increases the difficulty of feature extraction and matching.
1 code implementation • 16 Sep 2020 • Guoqing Zhang, Junchuan Yang, yuhui Zheng, Yi Wu, Sheng-Yong Chen
Finally, we reconstruct the feature extractor to ensure that our model can obtain more richer and robust features.
no code implementations • 24 Aug 2020 • Jianwei Zhang, zhenxing Wang, yuhui Zheng, Guoqing Zhang
With the development of the super-resolution convolutional neural network (SRCNN), deep learning technique has been widely applied in the field of image super-resolution.
Ranked #1 on Image Super-Resolution on BSD200 - 2x upscaling
no code implementations • 19 Dec 2012 • Suqi Cheng, Hua-Wei Shen, Junming Huang, Guoqing Zhang, Xue-Qi Cheng
We point out that the essential reason of the dilemma is the surprising fact that the submodularity, a key requirement of the objective function for a greedy algorithm to approximate the optimum, is not guaranteed in all conventional greedy algorithms in the literature of influence maximization.
Social and Information Networks Data Structures and Algorithms Physics and Society F.2.2; D.2.8