Following is the list of accepted ICASSP 2024 papers, sorted by paper title. You can use the search feature of your web browser to find your paper number. Notifications to all authors have also been sent by email. If you have not received your notification of the results by email, please...
For poster sessions, if the speaker is not present in front of the poster for most of the time during the poster session, this also implies the paper was not presented. Conference organizers are required to collect attendance records and a list of any non-presented papers and submit to IEEE...
Code for ICASSP 2024 paper"Embedded Feature Similarity Optimization with Specific Parameter Initialization for 2D/3D Medical Image Registration" - m1nhengChen/SOPI
This is the official codebase used for obtaining the results in the ICASSP 2024 paper: A SOUND APPROACH: Using Large Language Models to generate audio descriptions for egocentric text-audio retrieval - oncescuandreea/audio_egovlp
8. Overall evaluation of this paper:--- 去年用CMT的系统时,会显示8,今年用回了ICASSP自己的系统...
ICASSP 2024的paper,在EI检索不到是什么情况?ICASSP2024的paper在EI检索不到,如何解决? 已给chair发...
The MIR-MLPop dataset and the official implementation of the paper "MIR-MLPop: A Multilingual Pop Music Dataset with Time-Aligned Lyrics and Audio," ICASSP 2024. - york135/MIRMLPop
This repository is the implementation of paper:"PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models(IEEE ICASSP 2024)". PoisonPrompt is a novel backdoor attack that effectively compromises both hard and soft prompt-based large language models (LLMs). We assess the efficiency, fide...
Source code of the paper: Effective Image Tampering Localization via Enhanced Transformer and Co-attention Fusion, ICASSP 2024. - multimediaFor/EITLNet
Implementation of the paper SAM-Deblur: Let Segment Anything Boost Image Deblurring(ICASSP2024) - HPLQAQ/SAM-Deblur