CASIA OpenIR

浏览/检索结果: 共3条,第1-3条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
Mobility in China, 2020: a tale of four phases 期刊论文
NATIONAL SCIENCE REVIEW, 2021, 卷号: 8, 期号: 11, 页码: 11
作者:  Tan, Suoyi;  Lai, Shengjie;  Fang, Fan;  Cao, Ziqiang;  Sai, Bin;  Song, Bing;  Dai, Bitao;  Guo, Shuhui;  Liu, Chuchu;  Cai, Mengsi;  Wang, Tong;  Wang, Mengning;  Li, Jiaxu;  Chen, Saran;  Qin, Shuo;  Floyd, Jessica R.;  Cao, Zhidong;  Tan, Jing;  Sun, Xin;  Zhou, Tao;  Zhang, Wei;  Tatem, Andrew J.;  Holme, Petter;  Chen, Xiaohong;  Lu, Xin
收藏  |  浏览/下载:277/0  |  提交时间:2022/02/16
human mobility  travel restrictions  COVID-19  mobile phone data  behavioral response  
Guest Editorial Computational Social Systems for COVID-19 Emergency Management and Beyond 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 卷号: 8, 期号: 4, 页码: 928-929
作者:  Zhang, Jun Jason;  Wang, Fei-Yue;  Yuan, Yong;  Xu, Guandong;  Liu, Huan;  Gao, Wei;  Jameel, Shoaib;  Razzak, Imran;  Eklund, Peter;  Ahmed, Sheraz;  Qin, Rui;  Li, Juanjuan;  Wang, Xiao;  Yang, De-Nian;  Turgut, Damla;  Benslimane, Abderrahim;  Prasad, Neeli;  Chen, Kwang-Cheng
收藏  |  浏览/下载:212/0  |  提交时间:2021/11/02
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:323/33  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer