default search action
Junxi Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Wenhao Zhu, Jiya Tian, Mingzhi Chen, Lingna Chen, Junxi Chen:
MSS-UNet: A Multi-Spatial-Shift MLP-based UNet for skin lesion segmentation. Comput. Biol. Medicine 168: 107719 (2024) - [j10]Yifeng Yao, Xingxing Duan, Aiping Qu, Mingzhi Chen, Junxi Chen, Lingna Chen:
DFCG: A Dual-Frequency Cascade Graph model for semi-supervised ultrasound image segmentation with diffusion model. Knowl. Based Syst. 300: 112261 (2024) - [c10]Junxi Chen, Liang Li, Li Su, Zheng-Jun Zha, Qingming Huang:
Prompt-Enhanced Multiple Instance Learning for Weakly Supervised Video Anomaly Detection. CVPR 2024: 18319-18329 - [c9]Junhao Dong, Piotr Koniusz, Junxi Chen, Z. Jane Wang, Yew-Soon Ong:
Robust Distillation via Untargeted and Targeted Intermediate Adversarial Samples. CVPR 2024: 28432-28442 - [c8]Junhao Dong, Piotr Koniusz, Junxi Chen, Xiaohua Xie, Yew-Soon Ong:
Adversarially Robust Few-shot Learning via Parameter Co-distillation of Similarity and Class Concept Learners. CVPR 2024: 28535-28544 - [c7]Junhao Dong, Piotr Koniusz, Junxi Chen, Yew-Soon Ong:
Adversarially Robust Distillation by Reducing the Student-Teacher Variance Gap. ECCV (4) 2024: 92-111 - [c6]Guangxing Wu, Junxi Chen, Qiu Li, Wentao Zhang, Wei-Shi Zheng, Ruixuan Wang:
Region Attention Fine-tuning with CLIP for Few-shot Classification. ICME 2024: 1-6 - [i3]Junxi Chen, Junhao Dong, Xiaohua Xie:
Exploring Adversarial Attacks against Latent Diffusion Model from the Perspective of Adversarial Transferability. CoRR abs/2401.07087 (2024) - 2023
- [j9]Xuping Huang, Qian Wang, Junxi Chen, Lingna Chen, Zhiyi Chen:
Effective hybrid attention network based on pseudo-color enhancement in ultrasound image segmentation. Image Vis. Comput. 137: 104742 (2023) - [j8]Zhifang Hong, Mingzhi Chen, Weijie Hu, Shiyu Yan, Aiping Qu, Lingna Chen, Junxi Chen:
Dual encoder network with transformer-CNN for multi-organ segmentation. Medical Biol. Eng. Comput. 61(3): 661-671 (2023) - [c5]Guangxing Wu, Junxi Chen, Wentao Zhang, Ruixuan Wang:
Feature Adaptation with CLIP for Few-shot Classification. MMAsia 2023: 26:1-26:7 - [c4]Mengfan Xu, Shuai Su, Taogang Hou, Xuan Pei, Junxi Chen:
Lightweight Map Storage and Retrieval Method for Autonomous Navigation of UAVs in Large-Scale Cylindrical Spaces. ROBIO 2023: 1-6 - [i2]Junhao Dong, Junxi Chen, Xiaohua Xie, Jianhuang Lai, Hao Chen:
Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications. CoRR abs/2303.14133 (2023) - [i1]Junxi Chen, Junhao Dong, Xiaohua Xie:
Releasing Inequality Phenomena in L∞-Adversarial Training via Input Gradient Distillation. CoRR abs/2305.09305 (2023) - 2022
- [j7]Xuping Huang, Junxi Chen, Mingzhi Chen, Lingna Chen, Yaping Wan:
TDD-UNet: Transformer with double decoder UNet for COVID-19 lesions segmentation. Comput. Biol. Medicine 151(Part): 106306 (2022) - 2021
- [j6]Hewen Xi, Junxi Chen, Dongping Xiong, Xiaofeng He, Aiping Qu, Lingna Chen:
A Densely Connected UNet3D Network Combined Attention Mechanism for Liver and Tumor Segmentation. J. Medical Imaging Health Informatics 11(5): 1463-1470 (2021) - [c3]Junxi Chen, Liangben Cao, Kaihan Yu:
EMD-LSTM based deep learning inbound and outbound passenger flow prediction. ICAIIS 2021: 174:1-174:6 - 2020
- [j5]Junhui He, Junxi Chen, Shaohua Tang:
Reversible Data Hiding in JPEG Images Based on Negative Influence Models. IEEE Trans. Inf. Forensics Secur. 15: 2121-2133 (2020)
2010 – 2019
- 2019
- [j4]Junhui He, Junxi Chen, Weiqi Luo, Shaohua Tang, Jiwu Huang:
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(12): 3501-3515 (2019) - [c2]Yufeng Wang, Lezhi Chen, Junyi He, Lingna Chen, Junxi Chen, Liangwei Jiang:
A Dynamic Model of Opioid Epidemic based on Cellular Automata and Principal Component Analysis. ICBBS 2019: 126-129 - 2018
- [j3]Junhui He, Junxi Chen, Shichang Xiao, Xiaoyu Huang, Shaohua Tang:
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition. Secur. Commun. Networks 2018: 7080673:1-7080673:11 (2018) - 2016
- [j2]Xiaoling Deng, Yubin Lan, Tiansheng Hong, Junxi Chen:
Citrus greening detection using visible spectrum imaging and C-SVC. Comput. Electron. Agric. 130: 177-183 (2016) - [j1]Xianzhang Chen, Edwin Hsing-Mean Sha, Qingfeng Zhuge, Weiwen Jiang, Junxi Chen, Jun Chen, Jun Xu:
A unified framework for designing high performance in-memory and hybrid memory file systems. J. Syst. Archit. 68: 51-64 (2016) - [c1]Xianzhang Chen, Edwin Hsing-Mean Sha, Weiwen Jiang, Qingfeng Zhuge, Junxi Chen, Jiejie Qin, Yuansong Zeng:
The design of an efficient swap mechanism for hybrid DRAM-NVM systems. EMSOFT 2016: 22:1-22:10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint