CASIA OpenIR
(本次检索基于用户作品认领结果)

浏览/检索结果: 共24条,第1-10条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
作者:  Zhang, Xingwei;  Zheng, Xiaolong;  Mao, Wenji;  Zeng, Daniel Dajun;  Wang, Fei-Yue
收藏  |  浏览/下载:199/0  |  提交时间:2022/11/14
Perturbation methods  Semantics  Computational modeling  Codes  Task analysis  Privacy  Software  Adversarial perturbation  deep neural network (DNN)  privacy protection  semantic retrieval  
Towards Human-Machine Recognition Alignment: An Adversarilly Robust Multimodal Retrieval Hashing Framework 期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 13
作者:  Zhang, Xingwei;  Zheng, Xiaolong;  Liu, Bin;  Wang, Xiao;  Mao, Wenji;  Zeng, Daniel Dajun;  Wang, Fei-Yue
收藏  |  浏览/下载:168/0  |  提交时间:2022/11/14
Training  Task analysis  Semantics  Perturbation methods  Feature extraction  Computational modeling  Robustness  Adversarial perturbation  adversarially robust training  deep hashing  multimodal retrieval  
An Agent-Based Traffic Recommendation System: Revisiting and Revising Urban Traffic Management Strategies 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 13
作者:  Jin, Junchen;  Rong, Dingding;  Pang, Yuqi;  Ye, Peijun;  Ji, Qingyuan;  Wang, Xiao;  Wang, Ge;  Wang, Fei-Yue
收藏  |  浏览/下载:197/0  |  提交时间:2022/07/25
Switches  Control systems  Timing  Task analysis  Behavioral sciences  Analytical models  Research and development  Agent-based recommendation system  deep recommendation  human-in-the-loop  operation on-demand  traffic management strategies  
A GAN-Based Short-Term Link Traffic Prediction Approach for Urban Road Networks Under a Parallel Learning Framework 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 页码: 12
作者:  Jin, Junchen;  Rong, Dingding;  Zhang, Tong;  Ji, Qingyuan;  Guo, Haifeng;  Lv, Yisheng;  Ma, Xiaoliang;  Wang, Fei-Yue
收藏  |  浏览/下载:218/0  |  提交时间:2022/06/06
Roads  Predictive models  Data models  Recurrent neural networks  Generators  Computer architecture  Deep learning  Short-term link speed prediction  signalized urban networks  Wasserstein generative adversarial network  
Collective Entity Alignment for Knowledge Fusion of Power Grid Dispatching Knowledge Graphs 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 9, 期号: 11, 页码: 1-15
作者:  Yang, Linyao;  Lv, Chen;  Wang, Xiao;  Qiao, Ji;  Ding, Weiping;  Zhang, Jun;  Wang, Fei-Yue
Adobe PDF(1600Kb)  |  收藏  |  浏览/下载:155/18  |  提交时间:2022/06/15
entity alignment  integer programming  knowledge fusion  knowledge graph embedding  power dispatch  
Cascade learning from adversarial synthetic images for accurate pupil detection 期刊论文
PATTERN RECOGNITION, 2019, 卷号: 88, 期号: 2020, 页码: 584-594
作者:  Gou, Chao;  Zhang, Hui;  Wang, Kunfeng;  Wang, Fei-Yue;  Ji, Qiang
浏览  |  Adobe PDF(2057Kb)  |  收藏  |  浏览/下载:360/108  |  提交时间:2019/07/12
Cascade regression  GANs  Pupil detection  
A joint cascaded framework for simultaneous eye detection and eye state estimation 期刊论文
PATTERN RECOGNITION, 2017, 卷号: 67, 期号: 1, 页码: 23-31
作者:  Gou, Chao;  Wu, Yue;  Wang, Kang;  Wang, Kunfeng;  Wang, Fei-Yue;  Ji, Qiang
浏览  |  Adobe PDF(1337Kb)  |  收藏  |  浏览/下载:669/303  |  提交时间:2017/05/08
Eye Detection  Eye State Estimation  Learning-by-synthesis  Cascade Regression Framework  
Learning-by-synthesis for Accurate Eye Detection 会议论文
2016 23rd International Conference on Pattern Recognition, Cancún Center, Cancún, México, December 4-8, 2016
作者:  Gou C(苟超);  Wu, Yue;  Wang, Kang;  Wang FY(王飞跃);  Ji, Qiang
浏览  |  Adobe PDF(470Kb)  |  收藏  |  浏览/下载:374/122  |  提交时间:2017/05/08
Learning-by-synthesis  Eye Detection  Cascade Regression  
Shape Augmented Regression for 3D Face Alignment 会议论文
ECCV 2016 Workshops, Amsterdam, Netherlands, 2016.10
作者:  Gou, Chao;  Wu, Yue;  Wang FY(王飞跃);  Ji, Qiang
浏览  |  Adobe PDF(5239Kb)  |  收藏  |  浏览/下载:336/99  |  提交时间:2017/05/08
Shape Augmented Regression  3d Face Alignment  
An ACP-Based Approach to Intelligence and Security Informatics 专著章节/文集论文
出自: Intelligent Methods for Cyber Warfare, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland, Switzerland:Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, Springer, 2015
作者:  Fei-Yue Wang;  Xiaochen Li;  Wenji Mao
浏览  |  Adobe PDF(379Kb)  |  收藏  |  浏览/下载:233/54  |  提交时间:2018/01/08