CASIA OpenIR

Browse/Search Results:  1-10 of 1063 Help

Selected(0)Clear Items/Page:    Sort:
Toward Data-Driven Digital Therapeutics Analytics: Literature Review and Research Directions 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 42-66
Authors:  Uichin Lee;  Gyuwon Jung;  Eun-Yeol Ma;  Jin San Kim;  Heepyung Kim;  Jumabek Alikhanov;  Youngtae Noh;  Heeyoung Kim
Adobe PDF(2887Kb)  |  Favorite  |  View/Download:8/0  |  Submit date:2023/01/03
Causal inference  data-driven analytics framework  digital therapeutics (DTx)  mobile and wearable data  technical and behavioral engagement  
Detecting Vulnerability on IoT Device Firmware: A Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
Authors:  Xiaotao Feng;  Xiaogang Zhu;  Qing-Long Han;  Wei Zhou;  Sheng Wen;  Yang Xiang
Adobe PDF(3134Kb)  |  Favorite  |  View/Download:11/1  |  Submit date:2023/01/03
Firmware emulation  internet of things (IoT) firmware  network fuzzing  security  static analysis  
Loop Closure Detection via Locality Preserving Matching With Global Consensus 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 2, 页码: 411-426
Authors:  Jiayi Ma;  Kaining Zhang;  Junjun Jiang
Adobe PDF(15763Kb)  |  Favorite  |  View/Download:7/0  |  Submit date:2023/01/16
Feature matching  locality preserving matching  loop closure detection  SLAM  
A Quantum Tanimoto Coefficient Fidelity for Entanglement Measurement 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 2, 页码: 439-450
Authors:  Yangyang Zhao;  Fuyuan Xiao;  Masayoshi Aritsugi;  Weiping Ding
Adobe PDF(6661Kb)  |  Favorite  |  View/Download:6/0  |  Submit date:2023/01/16
Distance measure  entanglement measurement  fidelity measure  quantum Tanimoto coefficient (QTC)  similarity measure  uncertainty  
Three-Way Behavioral Decision Making With Hesitant Fuzzy Information Systems: Survey and Challenges 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 2, 页码: 330-350
Authors:  Jianming Zhan;  Jiajia Wang;  Weiping Ding;  Yiyu Yao
Adobe PDF(1830Kb)  |  Favorite  |  View/Download:5/1  |  Submit date:2023/01/16
Hesitant fuzzy information system (HFIS)  prospect theory  regret theory  three-way decision (T-WD)  
Brain-inspired Intelligent Robotics: Theoretical Analysis and Systematic Application 期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 1-18
Authors:  Hong Qiao
Adobe PDF(2207Kb)  |  Favorite  |  View/Download:11/2  |  Submit date:2023/01/18
Brain-inspired intelligent robot  software and hardware  decision making  muscle control  cognitive intelligence  
Pruning-aware Sparse Regularization for Network Pruning 期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 109-120
Authors:  Nan-Fei Jiang
Adobe PDF(1665Kb)  |  Favorite  |  View/Download:13/2  |  Submit date:2023/01/18
Deep learning  convolutional neural network (CNN)  model compression and acceleration  network pruning  regularization  
Train from scratch: Single-stage joint training of speech separation and recognition 期刊论文
COMPUTER SPEECH AND LANGUAGE, 2022, 卷号: 76, 页码: 15
Authors:  Shi, Jing;  Chang, Xuankai;  Watanabe, Shinji;  Xu, Bo
Favorite  |  View/Download:53/0  |  Submit date:2022/07/25
Cocktail party problem  Speech separation  Multi-speaker speech recognition  End-to-end  Joint-training  
RSDet plus plus : Point-Based Modulated Loss for More Accurate Rotated Object Detection 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 卷号: 32, 期号: 11, 页码: 7869-7879
Authors:  Qian, Wen;  Yang, Xue;  Peng, Silong;  Zhang, Xiujuan;  Yan, Junchi
Favorite  |  View/Download:11/0  |  Submit date:2022/12/27
Object detection  Detectors  Sensitivity  Feature extraction  Benchmark testing  Training  Measurement units  Rotated object detection  modulated loss  point-based  tiny objects  
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
Authors:  Zhang, Xingwei;  Zheng, Xiaolong;  Mao, Wenji;  Zeng, Daniel Dajun;  Wang, Fei-Yue
Favorite  |  View/Download:23/0  |  Submit date:2022/11/14
Perturbation methods  Semantics  Computational modeling  Codes  Task analysis  Privacy  Software  Adversarial perturbation  deep neural network (DNN)  privacy protection  semantic retrieval