CASIA OpenIR

浏览/检索结果: 共37条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
A Framework and Operational Procedures for Metaverses-Based Industrial Foundation Models 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 10
作者:  Wang, Jiangong;  Tian, Yonglin;  Wang, Yutong;  Yang, Jing;  Wang, Xingxia;  Wang, Sanjin;  Kwan, Oliver
Adobe PDF(3322Kb)  |  收藏  |  浏览/下载:126/34  |  提交时间:2023/02/22
Cyber-physical-social intelligence (CPSI)  cyber-physical-social systems (CPSSs)  industrial foundation models (IFMs)  intelligent enterprises  metaverses  operational processes  parallel intelligence  
Cross-Architecture Knowledge Distillation 会议论文
INTERNATIONAL JOURNAL OF COMPUTER VISION, Macau SAR, China, 2022.12.4-2022.12.8
作者:  Yufan Liu;  Jiajiong Cao;  Bing Li;  Weiming Hu;  Jingting Ding;  Liang Li
Adobe PDF(1020Kb)  |  收藏  |  浏览/下载:130/42  |  提交时间:2023/04/23
Knowledge distillation  Cross architecture  Model compression  Deep learning  
Improving performance of robots using human-inspired approaches: a survey 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2022, 卷号: 65, 期号: 12, 页码: 31
作者:  Qiao, Hong;  Zhong, Shanlin;  Chen, Ziyu;  Wang, Hongze
收藏  |  浏览/下载:123/0  |  提交时间:2023/03/20
human-inspired intelligent robots  brain-inspired intelligence  decision making  visual cognition  musculoskeletal robots  
A Survey on Attack Detection and Resilience for Connected and Automated Vehicles: From Vehicle Dynamics and Control Perspective 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2022, 卷号: 7, 期号: 4, 页码: 815-837
作者:  Ju, Zhiyang;  Zhang, Hui;  Li, Xiang;  Chen, Xiaoguang;  Han, Jinpeng;  Yang, Manzhi
收藏  |  浏览/下载:75/0  |  提交时间:2023/03/20
Connected vehicles  Anomaly detection  Connected and automated vehicles  attack  anomaly detection  resilience strategy  safety and security  
Driving EEG based multilayer dynamic brain network analysis for steering process 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 卷号: 207, 页码: 17
作者:  Chang, Wenwen;  Meng, Weiliang;  Yan, Guanghui;  Zhang, Bingtao;  Luo, Hao;  Gao, Rui;  Yang, Zhifei
Adobe PDF(13070Kb)  |  收藏  |  浏览/下载:332/80  |  提交时间:2022/09/19
Multi -layer Networks  Functional Connectivity  Electroencephalogram (EEG)  Driving Intention  Feature Extraction  Driving Behavior  
Process Monitoring, Diagnosis and Control of Additive Manufacturing 期刊论文
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 页码: 27
作者:  Fang, Qihang;  Xiong, Gang;  Zhou, MengChu;  Tamir, Tariku Sinshaw;  Yan, Chao-Bo;  Wu, Huaiyu;  Shen, Zhen;  Wang, Fei-Yue
收藏  |  浏览/下载:154/0  |  提交时间:2023/03/20
Additive manufacturing (AM)  in-situ monitoring  defect detection  fault diagnosis  closed-loop control  
A survey on federated learning: challenges and applications 期刊论文
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2022, 页码: 23
作者:  Wen, Jie;  Zhang, Zhixia;  Lan, Yang;  Cui, Zhihua;  Cai, Jianghui;  Zhang, Wensheng
收藏  |  浏览/下载:168/0  |  提交时间:2022/12/27
Federated learning  Machine learning  Privacy protection  Personalized federated learning  
Towards Corruption-Agnostic Robust Domain Adaptation 期刊论文
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2022, 卷号: 18, 期号: 4, 页码: 16
作者:  Xu, Yifan;  Sheng, Kekai;  Dong, Weiming;  Wu, Baoyuan;  Xu, Changsheng;  Hu, Bao-Gang
Adobe PDF(2116Kb)  |  收藏  |  浏览/下载:398/83  |  提交时间:2022/06/10
Domain adaptation  corruption robustness  transfer learning  
ASCL: Adversarial supervised contrastive learning for defense against word substitution attacks 期刊论文
NEUROCOMPUTING, 2022, 卷号: 510, 页码: 59-68
作者:  Shi, Jiahui;  Li, Linjing;  Zeng, Daniel
Adobe PDF(1054Kb)  |  收藏  |  浏览/下载:217/25  |  提交时间:2022/11/14
Adversarial example  Adversarial training  Model robustness  Contrastive learning  Natural language processing  
Relentless False Data Injection Attacks Against Kalman-Filter-Based Detection in Smart Grid 期刊论文
IEEE Transactions on Control of Network Systems, 2022, 卷号: 9, 期号: 3, 页码: 1238-1250
作者:  Liu, Yifa;  Cheng, Long
Adobe PDF(792Kb)  |  收藏  |  浏览/下载:175/28  |  提交时间:2022/11/14
Attack sequence  false data injection  Kalman filter  smart grid security  state estimation