CASIA OpenIR

浏览/检索结果: 共15条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Sensing Micro-Motion Human Patterns using Multimodal mmRadar and Video Signal for Affective and Psychological Intelligence 会议论文
, Canada, 2023-10
作者:  Ru, Yiwei;  Li, Peipei;  Sun, Muyi;  Wang, Yunlong;  Zhang, Kunbo;  Li, Qi;  He, Zhaofeng;  Sun, Zhenan
Adobe PDF(8050Kb)  |  收藏  |  浏览/下载:123/35  |  提交时间:2024/02/23
Trustworthy Localization With EM-Based Federated Control Scheme for IIoTs 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 卷号: 19, 期号: 1, 页码: 1069-1079
作者:  Wang, Zhaoyang;  Wang, Song;  Zhao, Zhiyao;  Sun, Muyi
收藏  |  浏览/下载:134/0  |  提交时间:2023/03/20
Location awareness  Industrial Internet of Things  Collaboration  Security  Cloud computing  Encryption  Privacy  Collaborative Cloud-Edge-End  expectation maximization (EM)  federated control  industrial Internet of Things (IIoT)  trustworthy localization  
Second-Order Global Attention Networks for Graph Classification and Regression 会议论文
, Beijing, China, August 27-28, 2022
作者:  Hu Fenyu;  Cui Zeyu;  Wu Shu;  Liu Qiang;  Wu Jinlin;  Wang Liang;  Tan Tieniu
Adobe PDF(69424Kb)  |  收藏  |  浏览/下载:174/67  |  提交时间:2023/07/06
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:307/32  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
基于深度学习的城市生活垃圾检测系统研究 学位论文
工程硕士学位, 中科院大学自动化研究所自动化大厦十三层第一会议室: 中国科学院大学自动化研究所, 2021
作者:  李名扬
Adobe PDF(44946Kb)  |  收藏  |  浏览/下载:214/3  |  提交时间:2021/06/21
垃圾分类,深度学习,目标检测,自注意力机制,目标跟踪  
Disentangled Item Representation for Recommender Systems 期刊论文
Transactions on Intelligent Systems and Technology (TIST), 2021, 卷号: 0, 期号: 0, 页码: 0
作者:  Cui Zeyu;  Yu Feng;  Wu Shu;  Liu Qiang;  Wang Liang
Adobe PDF(4552Kb)  |  收藏  |  浏览/下载:178/49  |  提交时间:2021/06/17
Representation learning  Recommender systems  Attribute disentangling  
Adversarial Semi-supervised Learning for Corporate Credit Ratings 期刊论文
Journal of Software, 2021, 卷号: 16, 期号: 6, 页码: 259-266
作者:  冯博 靖
Adobe PDF(1425Kb)  |  收藏  |  浏览/下载:141/43  |  提交时间:2022/06/13
Adversarial learning  corporate credit ratings  financial risk  semi-supervised learning  
Fiber-Optic Auditory Nerve of Ground in the Suburb: For Traffic Flow Monitoring 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 166704-166710
作者:  Liang, Sheng;  Zhao, Xiaoting;  Liu, Ruijun;  Zhang, Xiaodong;  Wang, Liang;  Zhang, Xinghua;  Lv, Yisheng;  Meng, Fanchao
收藏  |  浏览/下载:250/0  |  提交时间:2020/03/30
Fiber-optic distributed vibration sensor (DVS)  fiber-optic nerve of ground  phi-OTDR  smart ground  Internet of Things (IoT)  smart traffic  traffic flow  
Reversible data hiding in encrypted image with separable capability and high embedding capacity 期刊论文
INFORMATION SCIENCES, 2018, 卷号: 465, 页码: 285-304
作者:  Qin, Chuan;  He, Zhihong;  Luo, Xiangyang;  Dong, Jing
收藏  |  浏览/下载:305/0  |  提交时间:2019/07/12
Reversible data hiding  Encrypted image  Embedding rate  Image quality  
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 138, 页码: 280-293
作者:  Qin, Chuan;  Ji, Ping;  Zhang, Xinpeng;  Dong, Jing;  Wang, Jinwei
收藏  |  浏览/下载:200/0  |  提交时间:2017/07/18
Fragile Watermarking  Overlapping Embedding  Pixel-wise Recovery  Tampering Localization