Author of the publication

The Comparison of Attention Mechanisms with Different Embedding Modes for Performance Improvement of Fine-Grained Classification.

, , , and . IEICE Trans. Inf. Syst., 106 (5): 590-600 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images., , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1168-1184 (2016)An Efficient Algorithm of Facial Expression Recognition by TSG-RNN Network., , , , , , , and . MMM (2), volume 11962 of Lecture Notes in Computer Science, page 161-174. Springer, (2020)An efficient general data hiding scheme based on image interpolation., , , , and . J. Inf. Secur. Appl., (2020)A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding., , , and . Int. J. Netw. Secur., 22 (4): 575-583 (2020)Efficient Pixel Prediction Algorithm for Reversible Data Hiding., , , and . Int. J. Netw. Secur., 18 (4): 750-757 (2016)Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy., , and . Int. J. Netw. Secur., 15 (5): 405-410 (2013)Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism., , , and . Image Vis. Comput., 31 (4): 311-321 (2013)A multi-threshold secret image sharing scheme based on MSP., , and . Pattern Recognit. Lett., 33 (12): 1594-1600 (2012)An Information Theoretically Secure E-Lottery Scheme Based on Symmetric Bivariate Polynomials., , , and . Symmetry, 11 (1): 88 (2019)Multi-Layer Mini-Sudoku Based High-Capacity Data Hiding Method., , , and . IEEE Access, (2020)