CASIA OpenIR

浏览/检索结果: 共15条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
CGNN: A Compatibility-aware Graph Neural Network for Social Media Bot Detection 期刊论文
IEEE Transactions on Computational Social System, 2024, 页码: Early Access
作者:  Huang, Haitao;  Tian, Hu;  Zheng, Xiaolong;  Zhang, Xingwei;  Zeng, Dajun;  Wang, Feiyue
Adobe PDF(2267Kb)  |  收藏  |  浏览/下载:23/9  |  提交时间:2024/07/08
graph neural network  heterogeneous compatibility  social media bot detection  
Enhancing Class-incremental Object Detection in Remote Sensing Through Instance-aware Distillation 期刊论文
Neurocomputing, 2024, 卷号: 583, 页码: 127552
作者:  Feng HT(冯航涛);  Zhang L(张璐);  Yang X(杨旭);  Liu ZY(刘智勇)
Adobe PDF(2152Kb)  |  收藏  |  浏览/下载:29/10  |  提交时间:2024/05/28
Class-incremental object detection  Remote sensing  Object detection  
GAN-Based Facial Attribute Manipulation 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 14590-14610
作者:  Liu, Yunfan;  Li, Qi;  Deng, Qiyao;  Sun, Zhenan;  Yang, Ming-Hsuan
Adobe PDF(15297Kb)  |  收藏  |  浏览/下载:100/27  |  提交时间:2024/02/22
Generative adversarial networks  image translation  facial attribute manipulation  
FedBrain: A robust multi-site brain network analysis framework based on federated learning for brain disease diagnosis 期刊论文
NEUROCOMPUTING, 2023, 卷号: 559, 页码: 13
作者:  Zhang, Chang;  Meng, Xiangzhu;  Liu, Qiang;  Wu, Shu;  Wang, Liang;  Ning, Huansheng
Adobe PDF(3483Kb)  |  收藏  |  浏览/下载:146/2  |  提交时间:2023/11/16
Functional magnetic resonance image  Brain network  Federated learning  Deep neural networks  Brain disease diagnosis  
Trustworthy Localization With EM-Based Federated Control Scheme for IIoTs 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 卷号: 19, 期号: 1, 页码: 1069-1079
作者:  Wang, Zhaoyang;  Wang, Song;  Zhao, Zhiyao;  Sun, Muyi
收藏  |  浏览/下载:177/0  |  提交时间:2023/03/20
Location awareness  Industrial Internet of Things  Collaboration  Security  Cloud computing  Encryption  Privacy  Collaborative Cloud-Edge-End  expectation maximization (EM)  federated control  industrial Internet of Things (IIoT)  trustworthy localization  
A Sharding Scheme-Based Many-Objective Optimization Algorithm for Enhancing Security in Blockchain-Enabled Industrial Internet of Things 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7650-7658
作者:  Cai, Xingjuan;  Geng, Shaojin;  Zhang, Jingbo;  Wu, Di;  Cui, Zhihua;  Zhang, Wensheng;  Chen, Jinjun
收藏  |  浏览/下载:222/0  |  提交时间:2021/12/28
Blockchain  Industrial Internet of Things  Throughput  Optimization  Scalability  Load modeling  Delays  Blockchain  industrial Internet of Things (IIoT)  many-objective optimization algorithm  privacy preservation  scalability  security  
epsilon-k anonymization and adversarial training of graph neural networks for privacy preservation in social networks 期刊论文
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2021, 卷号: 50, 页码: 17
作者:  Tian, Hu;  Zheng, Xiaolong;  Zhang, Xingwei;  Zeng, Daniel Dajun
Adobe PDF(2484Kb)  |  收藏  |  浏览/下载:312/105  |  提交时间:2021/12/28
Privacy preservation  Anonymization  Graph neural networks  Social network  
A central tendency-based privacy preserving model for sensitive XML association rules using Bayesian networks 期刊论文
INTELLIGENT DATA ANALYSIS, 2014, 卷号: 18, 期号: 2;2, 页码: 281-303
作者:  Iqbal, Khalid;  Yin, Xu-Cheng;  Hao, Hong-Wei;  Ilyas, Qazi Mudassar;  Yin, Xuwang
收藏  |  浏览/下载:97/0  |  提交时间:2020/10/27
Privacy Preservation  Xml  Bayesian Networks  Sensitive Information  Sensitive Xml Association Rules  
Disentangled Representation Learning of Makeup Portraits in the Wild 期刊论文
International Journal of Computer Vision, 2019, 卷号: -, 期号: -, 页码: -
作者:  Li, Yi;  Huang, Huaibo;  Cao, Jie;  He, Ran;  Tan, Tieniu
浏览  |  Adobe PDF(24456Kb)  |  收藏  |  浏览/下载:305/66  |  提交时间:2020/06/10
Face verification  Makeup transfer  Disentangled feature  Correspondence field  
Adversarial attacks on Faster R-CNN object detector 期刊论文
NEUROCOMPUTING, 2020, 卷号: 382, 期号: 无, 页码: 87-95
作者:  Wang, Yutong;  Wang, Kunfeng;  Zhu, Zhanxing;  Wang, Fei-Yue
Adobe PDF(5655Kb)  |  收藏  |  浏览/下载:322/69  |  提交时间:2020/03/30
Adversarial attack  Object detection  White-box attack  Black-box attack