default search action
Limin Xia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Limin Xia, Xiaoyue Ding:
Human-object interaction detection based on cascade multi-scale transformer. Appl. Intell. 54(3): 2831-2850 (2024) - [j21]Limin Xia, Xiaoyue Ding:
Human-object interaction recognition based on interactivity detection and multi-feature fusion. Clust. Comput. 27(2): 1169-1183 (2024) - [j20]Limin Xia, Weiye Fu:
Spatial-temporal multiscale feature optimization based two-stream convolutional neural network for action recognition. Clust. Comput. 27(8): 11611-11626 (2024) - [j19]Limin Xia, Qiyue Xiao:
Human-object interaction detection based on disentangled axial attention transformer. Mach. Vis. Appl. 35(4): 72 (2024) - [j18]Jun Wang, Limin Xia, Xin Wen:
Cmf-transformer: cross-modal fusion transformer for human action recognition. Mach. Vis. Appl. 35(5): 114 (2024) - [j17]Limin Xia, Xin Wen:
Multi-stream network with key frame sampling for human action recognition. J. Supercomput. 80(9): 11958-11988 (2024) - 2023
- [j16]Lunzheng Tan, Guoluan Chen, Rui Ding, Limin Xia:
Unsupervised learning of local features for person re-identification with loss function. Int. J. Auton. Adapt. Commun. Syst. 16(6): 536-551 (2023) - [j15]Lunzheng Tan, Yu Weng, Limin Xia, Jiusheng Xiao:
Abnormal event detection based on masked reconstruction and dual-channel adversarial prediction. J. Electronic Imaging 32(6) (2023) - [j14]Limin Xia, Xin Wen:
Zero-shot action recognition by clustered representation with redundancy-free features. Mach. Vis. Appl. 34(6): 116 (2023) - 2022
- [j13]Limin Xia, Changhong Wei:
Abnormal event detection in surveillance videos based on multi-scale feature and channel-wise attention mechanism. J. Supercomput. 78(11): 13470-13490 (2022) - 2021
- [j12]Limin Xia, Jiahui Zhu, Zhimin Yu:
Real-World Person Re-Identification via Super-Resolution and Semi-Supervised Methods. IEEE Access 9: 35834-35845 (2021) - [j11]Jun Wang, Limin Xia, Wentao Ma:
Human Action Recognition Based on Motion Feature and Manifold Learning. IEEE Access 9: 89287-89299 (2021) - [j10]Limin Xia, Zhimin Yu, Wentao Ma, Jiahui Zhu:
Refining Pseudo Labels for Unsupervised Domain Adaptive Person Re-Identification. IEEE Access 9: 121288-121301 (2021) - [j9]Limin Xia, Wentao Ma, Lu Feng:
Semantic features and high-order physical features fusion for action recognition. Clust. Comput. 24(4): 3515-3529 (2021) - [j8]Limin Xia, Zhenmin Li:
An abnormal event detection method based on the Riemannian manifold and LSTM network. Neurocomputing 463: 144-154 (2021) - [j7]Limin Xia, Zhenmin Li:
A new method of abnormal behavior detection using LSTM network with temporal attention mechanism. J. Supercomput. 77(4): 3223-3241 (2021) - [j6]Limin Xia, Wentao Ma:
Human action recognition using high-order feature of optical flows. J. Supercomput. 77(12): 14230-14251 (2021) - 2020
- [j5]Limin Xia, Rui Li:
Multi-stream neural network fused with local information and global information for HOI detection. Appl. Intell. 50(12): 4495-4505 (2020)
2010 – 2019
- 2019
- [j4]Jun Wang, Limin Xia:
Abnormal behavior detection in videos using deep learning. Clust. Comput. 22(Supplement): 9229-9239 (2019) - 2018
- [j3]Wei Fang, Limin Xia:
Simulation of Knowledge Transfer Process Model Between Universities: A Perspective of Cluster Innovation Network. Complex. 2018: 5983531:1-5983531:13 (2018) - 2016
- [j2]Yongliang Xiao, Limin Xia:
Human action recognition using modified slow feature analysis and multiple kernel learning. Multim. Tools Appl. 75(21): 13041-13056 (2016) - 2013
- [j1]Hongbin Tu, Limin Xia, Lunzheng Tan:
Adaptive Self-Occlusion Behavior Recognition Based on pLSA. J. Appl. Math. 2013: 506752:1-506752:9 (2013)
2000 – 2009
- 2008
- [c1]Yongliang Xiao, Limin Xia:
A New Hyper-Chaotic Algorithm for Image Encryption. ICYCS 2008: 2814-2818
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint