{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:35:38Z","timestamp":1769283338607,"version":"3.49.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T00:00:00Z","timestamp":1645833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T00:00:00Z","timestamp":1645833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100019687","name":"Hamad bin Khalifa University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100019687","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Image recognition based on computers is something human beings have been working on for many years. It is one of the most difficult tasks in the field of computer science, and improvements to this system are made when we speak. In this paper, we propose a methodology to automatically propose an appropriate title and add a specific sound to the image. Two models have been extensively trained and combined to achieve this effect. Sounds are recommended based on the image scene and the headings are generated using a combination of natural language processing and state-of-the-art computer vision models. A Top 5 accuracy of 67% and a Top 1 accuracy of 53% have been achieved. It is also worth mentioning that this is also the first model of its kind to make this forecast.<\/jats:p>","DOI":"10.1007\/s00530-022-00902-0","type":"journal-article","created":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T07:02:43Z","timestamp":1645858963000},"page":"2951-2959","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Image and audio caps: automated captioning of background sounds and images using deep learning"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6801-6138","authenticated-orcid":false,"given":"M.","family":"Poongodi","sequence":"first","affiliation":[]},{"given":"Mounir","family":"Hamdi","sequence":"additional","affiliation":[]},{"given":"Huihui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,26]]},"reference":[{"key":"902_CR1","doi-asserted-by":"publisher","unstructured":"Baccour, E., Foufou, S., Hamila, R., Hamdi, M.: A survey of wireless data center networks. In: 2015 49th Annual conference on information sciences and systems (CISS), pp. 1\u20136. (2015). https:\/\/doi.org\/10.1109\/CISS.2015.7086853","DOI":"10.1109\/CISS.2015.7086853"},{"key":"902_CR2","doi-asserted-by":"publisher","unstructured":"Poongodi, M., Bose, S.: Design of intrusion detection and prevention system (IDPS) using DGSOTFC in collaborative protection networks. In: Fifth international conference on advanced computing (ICoAC), vol. 2013, pp. 172\u2013178. (2013). https:\/\/doi.org\/10.1109\/ICoAC.2013.6921946","DOI":"10.1109\/ICoAC.2013.6921946"},{"key":"902_CR3","doi-asserted-by":"publisher","unstructured":"Mhamdi, L., Hamdi, M.: Scheduling multicast traffic in internally buffered crossbar switches. In: 2004 IEEE international conference on communications (IEEE Cat. No.04CH37577), vol. 2, pp. 1103\u20131107. (2004). https:\/\/doi.org\/10.1109\/ICC.2004.1312671","DOI":"10.1109\/ICC.2004.1312671"},{"issue":"5","key":"902_CR4","doi-asserted-by":"publisher","first-page":"4057","DOI":"10.3233\/JIFS-169966","volume":"36","author":"M Poongodi","year":"2019","unstructured":"Poongodi, M., Vijayakumar, V., Rawal, B., Bhardwaj, V., Agarwal, T., Jain, A., Ramanathan, L., Sriram, V.P.: Recommendation model based on trust relations and user credibility. J. Intell. Fuzzy Syst. 36(5), 4057\u20134064 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"902_CR5","doi-asserted-by":"publisher","unstructured":"Poongodi, M., Hamdi, M., Vijayakumar, V., Rawal, B.S., Maode, M.: An effective electronic waste management solution based on blockchain smart contract in 5G communities. In: 2020 IEEE 3rd 5G World Forum (5GWF), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/5GWF49715.2020.9221346","DOI":"10.1109\/5GWF49715.2020.9221346"},{"key":"902_CR6","doi-asserted-by":"publisher","unstructured":"Pun, K., Hamdi, M.: Distro: a distributed static round-robin scheduling algorithm for bufferless Clos-Network switches. In: Global telecommunications conference, GLOBECOM \u201902, vol. 3, IEEE, pp. 2298\u20132302. (2002). https:\/\/doi.org\/10.1109\/GLOCOM.2002.1189041","DOI":"10.1109\/GLOCOM.2002.1189041"},{"issue":"4","key":"902_CR7","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1504\/IJITST.2020.108130","volume":"10","author":"M Poongodi","year":"2020","unstructured":"Poongodi, M., Vijayakumar, V., Chilamkurti, N.: Bitcoin price prediction using ARIMA model. Int. J. Internet Technol. Secur. Trans. 10(4), 396\u2013406 (2020)","journal-title":"Int. J. Internet Technol. Secur. Trans."},{"issue":"7","key":"902_CR8","doi-asserted-by":"publisher","first-page":"3713","DOI":"10.1109\/TVT.2009.2013234","volume":"58","author":"Q Xia","year":"2009","unstructured":"Xia, Q., Hamdi, M., Letaief, K.B.: Open-loop link adaptation for next-generation IEEE 802.11n wireless networks. IEEE Trans. Veh. Technol. 58(7), 3713\u20133725 (2009). https:\/\/doi.org\/10.1109\/TVT.2009.2013234","journal-title":"IEEE Trans. Veh. Technol."},{"key":"902_CR9","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.procs.2015.04.053","volume":"50","author":"M Poongodi","year":"2015","unstructured":"Poongodi, M., Bose, S.: Detection and Prevention system towards the truth of convergence on decision using Aumann agreement theorem. Proc. Comput. Sci. 50, 244\u2013251 (2015)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"902_CR10","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/TWC.2013.120413.130767","volume":"13","author":"L Wang","year":"2014","unstructured":"Wang, L., Wu, K., Xiao, J., Hamdi, M.: Harnessing frequency domain for cooperative sensing and multi-channel contention in CRAHNs. IEEE Trans. Wirel. Commun. 13(1), 440\u2013449 (2014). https:\/\/doi.org\/10.1109\/TWC.2013.120413.130767","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"902_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.2014040101","volume":"8","author":"M Poongodi","year":"2014","unstructured":"Poongodi, M., Bose, S.: A firegroup mechanism to provide intrusion detection and prevention system against DDoS attack in collaborative clustered networks. Int. J. Inf. Secur. Priv. 8(2), 1\u201318 (2014)","journal-title":"Int. J. Inf. Secur. Priv."},{"issue":"7","key":"902_CR12","doi-asserted-by":"publisher","first-page":"2732","DOI":"10.1109\/TWC.2007.06019","volume":"6","author":"Q Xia","year":"2007","unstructured":"Xia, Q., Jin, X., Hamdi, M.: Cross layer design for the IEEE 802.11 WLANs: joint rate control and packet scheduling. IEEE Trans. Wirel. Commun. 6(7), 2732\u20132740 (2007). https:\/\/doi.org\/10.1109\/TWC.2007.06019","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"902_CR13","first-page":"574","volume":"9","author":"M Poongodi","year":"2015","unstructured":"Poongodi, M., Bose, S.: The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation. Adv. Nat. Appl. Sci 9(6), 574\u2013580 (2015)","journal-title":"Adv. Nat. Appl. Sci"},{"issue":"4","key":"902_CR14","first-page":"263","volume":"6","author":"M Poongodi","year":"2015","unstructured":"Poongodi, M., Bose, S., Ganeshkumar, N.: The effective intrusion detection system using optimal feature selection algorithm. Int. J. Enterp. Netw. Manag. 6(4), 263\u2013274 (2015)","journal-title":"Int. J. Enterp. Netw. Manag."},{"key":"902_CR15","doi-asserted-by":"publisher","unstructured":"Lin, D., Liu, Y., Hamdi, M., Muppala, J.: FlatNet: towards a flatter data center network. In: 2012 IEEE global communications conference (GLOBECOM), pp. 2499\u20132504. (2012). https:\/\/doi.org\/10.1109\/GLOCOM.2012.6503492","DOI":"10.1109\/GLOCOM.2012.6503492"},{"key":"902_CR16","doi-asserted-by":"crossref","unstructured":"Poongodi, M., Sharma, A., Hamdi, M., Maode, M., Chilamkurti, N.: Smart healthcare in smart cities: wireless patient monitoring system using IoT. J. Supercomput. 1\u201326 (2021)","DOI":"10.1007\/s11227-021-03765-w"},{"key":"902_CR17","doi-asserted-by":"publisher","unstructured":"Xia, Q., Hamdi, M.: Contention window adjustment for IEEE 802.11 WLANs: a control-theoretic approach. In: 2006 IEEE international conference on communications, pp. 3923\u20133928. (2006). https:\/\/doi.org\/10.1109\/ICC.2006.255694","DOI":"10.1109\/ICC.2006.255694"},{"issue":"4","key":"902_CR18","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1007\/s10586-015-0496-y","volume":"18","author":"M Poongodi","year":"2015","unstructured":"Poongodi, M., Bose, S.: Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET. Cluster Comput. 18(4), 1549\u20131559 (2015)","journal-title":"Cluster Comput."},{"issue":"10","key":"902_CR19","doi-asserted-by":"publisher","first-page":"2072","DOI":"10.1109\/49.887926","volume":"18","author":"M Ma","year":"2000","unstructured":"Ma, M., Hamdi, M.: Providing deterministic quality-of-service guarantees on WDM optical networks. IEEE J. Sel. Areas Commun. 18(10), 2072\u20132083 (2000). https:\/\/doi.org\/10.1109\/49.887926","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"902_CR20","doi-asserted-by":"crossref","unstructured":"Poongodi, M., Hamdi, M., Malviya, M., Sharma, A., Dhiman, G., Vimal, S.: Diagnosis and combating COVID-19 using wearable Oura smart ring with deep learning methods. Pers. Ubiquitous Comput. 1\u201311 (2021)","DOI":"10.1007\/s00779-021-01541-4"},{"issue":"11","key":"902_CR21","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1016\/S0167-8191(96)00054-3","volume":"22","author":"M Hamdi","year":"1997","unstructured":"Hamdi, M., Lee, C.K.: Dynamic load-balancing of image processing applications on clusters of workstations. Parallel Comput. 22(11), 1477\u20131492 (1997). https:\/\/doi.org\/10.1016\/S0167-8191(96)00054-3. (ISSN 0167-8191)","journal-title":"Parallel Comput."},{"key":"902_CR22","doi-asserted-by":"crossref","unstructured":"Poongodi, M., Hamdi, M., Varadarajan, V., Rawal, B.S., Maode, M.: Building an authentic and ethical keyword search by applying Decentralised (Blockchain) verification. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp. 746\u2013753 (2020)","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162859"},{"key":"902_CR23","doi-asserted-by":"publisher","unstructured":"Pan, Y., Hamdi, M.: Quicksort on a linear array with a reconfigurable pipelined bus system. In: Proceedings second international symposium on parallel architectures, algorithms, and networks (I-SPAN\u201996), pp. 313\u2013319. (1996). https:\/\/doi.org\/10.1109\/ISPAN.1996.508999","DOI":"10.1109\/ISPAN.1996.508999"},{"key":"902_CR24","unstructured":"Jeyachandran, A., Poongodi, M.: Securing cloud information with the use of Bastion Algorithm to enhance confidentiality and protection. Int. J. Pure Appl. Math. 118(24) (2018)"},{"key":"902_CR25","doi-asserted-by":"publisher","first-page":"2252","DOI":"10.1109\/GLOCOM.2014.7037143","volume":"2014","author":"T Wang","year":"2014","unstructured":"Wang, T., Su, Z., Xia, Y., Qin, B., Hamdi, M.: NovaCube: a low latency Torus-based network architecture for data centers. IEEE Global Commun. Conf. 2014, 2252\u20132257 (2014). https:\/\/doi.org\/10.1109\/GLOCOM.2014.7037143","journal-title":"IEEE Global Commun. Conf."},{"issue":"22","key":"902_CR26","first-page":"233","volume":"116","author":"M Poongodi","year":"2017","unstructured":"Poongodi, M., Al-Shaikhli, I.F., Vijayakumar, V.: The probabilistic approach of energy utility and reusability model with enhanced security from the compromised nodes through wireless energy transfer in WSN. Int. J. Pure Appl. Math. 116(22), 233\u2013250 (2017)","journal-title":"Int. J. Pure Appl. Math."},{"issue":"2","key":"902_CR27","first-page":"178","volume":"15","author":"M Poongodi","year":"2019","unstructured":"Poongodi, M., Vijayakumar, V., Ramanathan, L., Gao, X.-Z., Bhardwaj, V., Agarwal, T.: Chat-bot-based natural language interface for blogs and information networks. Int. J. Web Based Communities 15(2), 178\u2013195 (2019)","journal-title":"Int. J. Web Based Communities"},{"key":"902_CR28","unstructured":"Poongodi, M., Malviya, M., Hamdi, M., Vijayakumar, V., Mohammed, M.A., Rauf, H.T., Al-Dhlan, K.A.: 5G based blockchain network for authentic and ethical keyword search engine. IET Commun. (2021)"},{"issue":"5","key":"902_CR29","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1109\/TWC.2008.061047","volume":"7","author":"Q Xia","year":"2008","unstructured":"Xia, Q., Hamdi, M.: Smart sender: a practical rate adaptation algorithm for multirate IEEE 802.11 WLANs. IEEE Trans. Wirel. Commun. 7(5), 1764\u20131775 (2008). https:\/\/doi.org\/10.1109\/TWC.2008.061047","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"902_CR30","doi-asserted-by":"publisher","first-page":"97906","DOI":"10.1109\/ACCESS.2021.3094400","volume":"9","author":"M Poongodi","year":"2021","unstructured":"Poongodi, M., Malviya, M., Hamdi, M., Rauf, H.T., Kadry, S., Thinnukool, O.: The recent technologies to curb the second-wave of COVID-19 pandemic. IEEE Access 9, 97906\u201397928 (2021)","journal-title":"IEEE Access"},{"key":"902_CR31","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1109\/ACCESS.2014.2383439","volume":"2","author":"T Wang","year":"2014","unstructured":"Wang, T., Su, Z., Xia, Y., Hamdi, M.: Rethinking the data center networking: architecture, network protocols, and resource sharing. IEEE Access 2, 1481\u20131496 (2014). https:\/\/doi.org\/10.1109\/ACCESS.2014.2383439","journal-title":"IEEE Access"},{"key":"902_CR32","doi-asserted-by":"crossref","unstructured":"Poongodi, M., Malviya, M., Kumar, C., Hamdi, M., Vijayakumar, V., Nebhen, J., Alyamani, H.: New York city taxi trip duration prediction using MLP and XGBoost. Int. J. Syst. Assur. Eng. Manag. 1\u201312 (2021)","DOI":"10.1007\/s13198-021-01130-x"},{"issue":"4","key":"902_CR33","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/JSAC.2003.810499","volume":"21","author":"M-K Chan","year":"2003","unstructured":"Chan, M.-K., Hamdi, M.: An active queue management scheme based on a capture-recapture model. IEEE J. Sel. Areas Commun. 21(4), 572\u2013583 (2003). https:\/\/doi.org\/10.1109\/JSAC.2003.810499","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"902_CR34","doi-asserted-by":"crossref","unstructured":"Rawal, B.S., Manogaran, G., Singh, R., Poongodi, M., Hamdi, M.: Network augmentation by dynamically splitting the switching function in SDN. In: 2021 IEEE international conference on communications workshops (ICC Workshops), IEEE, pp. 1-6 (2021)","DOI":"10.1109\/ICCWorkshops50388.2021.9473709"},{"issue":"4","key":"902_CR35","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/3468.769762","volume":"29","author":"Y Pan","year":"1999","unstructured":"Pan, Y., Li, K., Hamdi, M.: An improved constant-time algorithm for computing the Radon and Hough transforms on a reconfigurable mesh. IEEE Trans. Syst. Man. Cybern. Part A Syst. Hum. 29(4), 417\u2013421 (1999). https:\/\/doi.org\/10.1109\/3468.769762","journal-title":"IEEE Trans. Syst. Man. Cybern. Part A Syst. Hum."},{"key":"902_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10602-x","author":"M Poongodi","year":"2021","unstructured":"Poongodi, M., Nguyen, T.N., Hamdi, M., et al.: A measurement approach using smart-IoT based architecture for detecting the COVID-19. Neural Process. Lett. (2021). https:\/\/doi.org\/10.1007\/s11063-021-10602-x","journal-title":"Neural Process. Lett."},{"key":"902_CR37","doi-asserted-by":"publisher","first-page":"2918","DOI":"10.1109\/ICC.2012.6363759","volume":"2012","author":"D Lin","year":"2012","unstructured":"Lin, D., Liu, Y., Hamdi, M., Muppala, J.: Hyper-BCube: a scalable data center network. IEEE Int. Conf. Commun. 2012, 2918\u20132923 (2012). https:\/\/doi.org\/10.1109\/ICC.2012.6363759","journal-title":"IEEE Int. Conf. Commun."},{"issue":"6","key":"902_CR38","doi-asserted-by":"publisher","first-page":"102708","DOI":"10.1016\/j.ipm.2021.102708","volume":"58","author":"M Poongodi","year":"2021","unstructured":"Poongodi, M., Nguyen, T.N., Hamdi, M., Cengiz, K.: Global cryptocurrency trend prediction using social media. Inf. Process. Manag. 58(6), 102708 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102708","journal-title":"Inf. Process. Manag."},{"key":"902_CR39","doi-asserted-by":"publisher","first-page":"6654071","DOI":"10.1155\/2021\/6654071","volume":"2021","author":"H He","year":"2021","unstructured":"He, H., Yang, H.: Deep visual semantic embedding with text data augmentation and word embedding initialization. Math. Probl. Eng. 2021, 6654071 (2021). https:\/\/doi.org\/10.1155\/2021\/6654071","journal-title":"Math. Probl. Eng."},{"key":"902_CR40","doi-asserted-by":"publisher","first-page":"103973","DOI":"10.1016\/j.imavis.2020.103973","volume":"101","author":"X Gong","year":"2020","unstructured":"Gong, X., Liu, X., Li, Y., Li, H.: A novel co-attention computation block for deep learning based image co-segmentation. Image Vis. Comput. 101, 103973 (2020)","journal-title":"Image Vis. Comput."},{"key":"902_CR41","doi-asserted-by":"publisher","first-page":"e755","DOI":"10.7717\/peerj-cs.755","volume":"7","author":"A Alharbi","year":"2021","unstructured":"Alharbi, A., Alyami, H., Poongodi, M., Rauf, H.T., Kadry, S.: Intelligent scaling for 6G IoE services for resource provisioning. PeerJ Comput. Sci. 7, e755 (2021)","journal-title":"PeerJ Comput. Sci."},{"key":"902_CR42","unstructured":"Song, H., Liu, Y., Wang, J.: UAS detection and negation. U.S. Patent US 2021\/0197967 A1, Jul. 1 (2021)"},{"issue":"4","key":"902_CR43","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2018.1700423","volume":"56","author":"X Yue","year":"2018","unstructured":"Yue, X., Liu, Y., Wang, J., Song, H., Cao, H.: Software defined radio and wireless acoustic networking for amateur drone surveillance. IEEE Commun. Mag. 56(4), 90\u201397 (2018). https:\/\/doi.org\/10.1109\/MCOM.2018.1700423","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"902_CR44","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TII.2020.2998818","volume":"17","author":"J Yang","year":"2021","unstructured":"Yang, J., Wang, C., Jiang, B., Song, H., Meng, Q.: Visual perception enabled industry intelligence: state of the art, challenges and prospects. IEEE Trans. Ind. Inform. 17(3), 2204\u20132219 (2021). https:\/\/doi.org\/10.1109\/TII.2020.2998818","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"2","key":"902_CR45","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1109\/JIOT.2018.2842229","volume":"6","author":"B Jiang","year":"2019","unstructured":"Jiang, B., Yang, J., Lv, Z., Song, H.: Wearable vision assistance system based on binocular sensors for visually impaired users. IEEE Internet Things J. 6(2), 1375\u20131383 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2842229","journal-title":"IEEE Internet Things J."},{"key":"902_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/9781119226444","volume-title":"Smart Cities: Foundations, Principles and Applications","author":"H Song","year":"2017","unstructured":"Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles and Applications, pp. 1\u2013906. Wiley, Hoboken (2017).. (ISBN: 978-1-119-22639-0)"},{"key":"902_CR47","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/ACCESS.2016.2529723","volume":"4","author":"Y Sun","year":"2016","unstructured":"Sun, Y., Song, H., Jara, A.J., Bie, R.: Internet of Things and Big Data analytics for smart and connected communities. IEEE Access 4, 766\u2013773 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2529723","journal-title":"IEEE Access"},{"key":"902_CR48","first-page":"1","volume-title":"Cyber-Physical Systems: Foundations, Principles and Applications","author":"H Song","year":"2016","unstructured":"Song, H., Rawat, D., Jeschke, S., Brecher, C.: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 1\u2013514. Academic Press, Boston (2016).. (ISBN: 978-0-12-803801-7)"},{"key":"902_CR49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078407","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Class-incremental learning for wireless device identification in IoT. IEEE Internet Things J. (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3078407","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"902_CR50","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/JIOT.2020.3018677","volume":"8","author":"Y Liu","year":"2021","unstructured":"Liu, Y., et al.: Zero-bias deep learning for accurate identification of Internet-of-Things (IoT) devices. IEEE Internet Things J. 8(4), 2627\u20132634 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3018677","journal-title":"IEEE Internet Things J."},{"key":"902_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59016-1_28","volume-title":"Wireless Algorithms, Systems, and Applications: WASA 2020: Lecture Notes in Computer Science","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Wang, J., Niu, S., Song, H.: Deep learning enabled reliable identity verification and spoofing detection. In: Yu, D., Dressler, F., Yu, J. (eds.) Wireless Algorithms, Systems, and Applications: WASA 2020: Lecture Notes in Computer Science, vol. 12384. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59016-1_28"},{"issue":"2","key":"902_CR52","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TAI.2021.3054609","volume":"1","author":"S Niu","year":"2020","unstructured":"Niu, S., Liu, Y., Wang, J., Song, H.: A decade survey of transfer learning (2010\u20132020). IEEE Trans. Artif. Intell. 1(2), 151\u2013166 (2020). https:\/\/doi.org\/10.1109\/TAI.2021.3054609","journal-title":"IEEE Trans. Artif. Intell."},{"key":"902_CR53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3099028","author":"Y Liu","year":"2021","unstructured":"Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Machine learning for the detection and identification of Internet of Things (IoT) devices: a survey. IEEE Internet Things J. (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3099028","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"902_CR54","doi-asserted-by":"publisher","first-page":"102178","DOI":"10.1016\/j.ipm.2019.102178","volume":"57","author":"M Liu","year":"2020","unstructured":"Liu, M., Li, L., Hu, H., Guan, W., Tian, J.: Image caption generation with dual attention mechanism. Inf. Process. Manag. 57(2), 102178 (2020)","journal-title":"Inf. Process. Manag."},{"key":"902_CR55","doi-asserted-by":"crossref","unstructured":"Katiyar, S., Borgohain, S.K.: Comparative evaluation of CNN architectures for image caption generation. arXiv preprint. arXiv:2102.11506 (2021)","DOI":"10.14569\/IJACSA.2020.0111291"},{"key":"902_CR56","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/978-981-15-8335-3_46","volume-title":"Data Analytics and Management","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Verma, S.: CapGen: a neural image caption generator with speech synthesis. In: Data Analytics and Management, pp. 605\u2013616. Springer, Singapore (2021)"},{"issue":"33","key":"902_CR57","doi-asserted-by":"publisher","first-page":"24225","DOI":"10.1007\/s11042-020-09110-2","volume":"79","author":"P Xia","year":"2020","unstructured":"Xia, P., He, J., Yin, J.: Boosting image caption generation with feature fusion module. Multimedia Tools Appl. 79(33), 24225\u201324239 (2020)","journal-title":"Multimedia Tools Appl."},{"key":"902_CR58","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.neucom.2018.11.114","volume":"392","author":"X Zeng","year":"2020","unstructured":"Zeng, X., Wen, L., Liu, B., Qi, X.: Deep learning for ultrasound image caption generation based on object detection. Neurocomputing 392, 132\u2013141 (2020)","journal-title":"Neurocomputing"},{"key":"902_CR59","doi-asserted-by":"publisher","first-page":"154953","DOI":"10.1109\/ACCESS.2020.3018752","volume":"8","author":"L Cheng","year":"2020","unstructured":"Cheng, L., Wei, W., Mao, X., Liu, Y., Miao, C.: Stack-VS: stacked visual-semantic attention for image caption generation. IEEE Access 8, 154953\u2013154965 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"902_CR60","first-page":"1","volume":"16","author":"X Liu","year":"2020","unstructured":"Liu, X., Xu, Q.: Adaptive attention-based high-level semantic introduction for image caption. ACM Trans. Multimedia Comput. Commun. Appl. (TOMM) 16(4), 1\u201322 (2020)","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl. (TOMM)"},{"key":"902_CR61","doi-asserted-by":"publisher","first-page":"115462","DOI":"10.1016\/j.eswa.2021.115462","volume":"184","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Li, K., Wang, Z., Zhao, X., Wang, Z.: Visual enhanced gLSTM for image captioning. Expert Syst. Appl. 184, 115462 (2021)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"902_CR62","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1007\/s11063-021-10438-5","volume":"53","author":"C Sur","year":"2021","unstructured":"Sur, C.: aiTPR: attribute interaction-tensor product representation for image caption. Neural Process. Lett. 53(2), 1229\u20131251 (2021)","journal-title":"Neural Process. Lett."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00902-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-022-00902-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-00902-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T13:05:34Z","timestamp":1694783134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-022-00902-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,26]]},"references-count":62,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["902"],"URL":"https:\/\/doi.org\/10.1007\/s00530-022-00902-0","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,26]]},"assertion":[{"value":"11 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}