Search Results - "Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence"
-
1
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Circuits and Systems I: Regular Papers. 70:5011-5024
Subject Terms: Deep Neural Networks, 9. Industry and infrastructure, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], 02 engineering and technology, Data Augmentation, Clean-Label Backdoor Attack, Computer science and engineering::Computing methodologies::Image processing and computer vision [Engineering], 0202 electrical engineering, electronic engineering, information engineering, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Engineering::Computer science and engineering::Computing methodologies::Image processing and computer vision, Data Poisoning, Edge AI
File Description: application/pdf
Access URL: https://hdl.handle.net/10356/173118
-
2
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 42:781-794
Subject Terms: FOS: Computer and information sciences, Computer Science - Artificial Intelligence, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], Spin-Transfer Torque Magnetic Random-Access Memory, Convolutional Neural Network, 02 engineering and technology, Engineering::Computer science and engineering::Hardware::Arithmetic and logic structures, 7. Clean energy, Computer science and engineering::Hardware::Arithmetic and logic structures [Engineering], Artificial Intelligence (cs.AI), Hardware Architecture (cs.AR), Engineering::Computer science and engineering::Computer systems organization::Special-purpose and application-based systems, 0202 electrical engineering, electronic engineering, information engineering, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Computer Science - Hardware Architecture, Computer science and engineering::Computer systems organization::Special-purpose and application-based systems [Engineering], Ternary Wight Neural Network, In-Memory Computing
File Description: application/pdf
-
3
Authors: et al.
Contributors: et al.
Source: IEEE Access, Vol 11, Pp 109341-109352 (2023)
Subject Terms: Uncertainty Modeling, uncertainty modeling, Bayesian Optimization, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], Engineering::Aeronautical engineering::Aviation, probabilistic conflict detection, TK1-9971, Air traffic management, ADS-B data, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Electrical engineering. Electronics. Nuclear engineering, Aeronautical engineering::Aviation [Engineering], Probabilistic Conflict Detection, Bayesian optimization
File Description: application/pdf
-
4
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Reliability. 71:1527-1539
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], Engineering::Computer science and engineering::Hardware::Performance and reliability, Fault Attacks, Computer science and engineering::Hardware::Performance and reliability [Engineering], 02 engineering and technology, Cryptography [Library and information science], Machine Learning (cs.LG), Deep Learning, 0202 electrical engineering, electronic engineering, information engineering, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Library and information science::Cryptography, Cryptography and Security (cs.CR)
File Description: application/pdf
Access URL: http://arxiv.org/pdf/2002.11021
http://arxiv.org/abs/2002.11021
https://ieeexplore.ieee.org/abstract/document/9530205/
https://silicon-austria-labs.elsevierpure.com/en/publications/sniff-reverse-engineering-of-neural-networks-with-fault-attacks
https://dblp.uni-trier.de/db/journals/corr/corr2002.html#abs-2002-11021
https://hdl.handle.net/10356/155678 -
5
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Circuits and Systems for Video Technology. 32:8078-8093
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], Deep Neural Network, 02 engineering and technology, Watermarking, Engineering::Computer science and engineering, Cache Side Channel, 0202 electrical engineering, electronic engineering, information engineering, Computer science and engineering [Engineering], Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Cryptography and Security (cs.CR)
File Description: application/pdf
-
6
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Knowledge and Data Engineering. 34:4161-4171
Subject Terms: Transfer Covariance Function, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], 0202 electrical engineering, electronic engineering, information engineering, Transfer Regression, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, 02 engineering and technology, Gaussian Process
File Description: application/pdf
Access URL: https://dr.ntu.edu.sg/bitstream/10356/147569/2/Easy-but-effective%20Domain%20Sub-similarity%20Learning%20for%20Transfer%20Regression-TKDE2020.pdf
https://ieeexplore.ieee.org/document/9266749
https://dr.ntu.edu.sg/bitstream/10356/147569/2/Easy-but-effective%20Domain%20Sub-similarity%20Learning%20for%20Transfer%20Regression-TKDE2020.pdf
https://dr.ntu.edu.sg/handle/10356/147569
https://hdl.handle.net/10356/147569 -
7
Authors: et al.
Contributors: et al.
Source: Proceedings of the AAAI Conference on Artificial Intelligence. 26:143-149
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence [DRNTU], 02 engineering and technology
-
8
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Intelligent Transportation Systems. 23:2509-2522
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Simulation and modeling, Engineering::Aeronautical engineering::Flight simulation, Computer science and engineering::Computing methodologies::Artificial intelligence [Engineering], Aeronautical engineering::Flight simulation [Engineering], 0202 electrical engineering, electronic engineering, information engineering, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Generative Adversarial Imitation Learning, 02 engineering and technology, Computer science and engineering::Computing methodologies::Simulation and modeling [Engineering], Aircraft Ground Movement
File Description: application/pdf
-
9
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Visual Relocalization, Sensors
File Description: application/pdf
Relation: A19D6a0053; Wang, S., Kang, Q., She, R., Wang, W., Zhao, K., Song, Y. & Tay, W. P. (2023). HypLiLoc: towards effective LiDAR pose regression with hyperbolic fusion. IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2023). https://dx.doi.org/10.1109/CVPR52729.2023.00501; https://hdl.handle.net/10356/165273; https://cvpr2023.thecvf.com/Conferences/2023
-
10
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Recommender Systems, Incremental Recommendation, Context-Aware Recommendation, Graph Neural Networks, Pseudo-Multi-Task Learning
File Description: application/pdf
Relation: MOE-T2EP20220-0006; IAF-PP; https://hdl.handle.net/10356/170988; October 2023; 120; 130
-
11
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Multiple Instance Learning, Weakly Supervised Video Anomaly Detection
File Description: application/pdf
Relation: A20E6c0101; AISG2-RP-2021-022; Lv, H., Yue, Z., Sun, Q., Luo, B., Cui, Z. & Zhang, H. (2023). Unbiased multiple instance learning for weakly supervised video anomaly detection. IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2023). https://dx.doi.org/10.1109/CVPR52729.2023.00775; https://hdl.handle.net/10356/169509; https://cvpr2023.thecvf.com/Conferences/2023
-
12
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Privacy-Preservation, Knowledge Transfer
File Description: application/pdf
Relation: https://hdl.handle.net/10356/172524
-
13
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Grade Prediction, Machine Learning, Attention Mechanism, Long Short-Term Memory Network, Graph Convolutional Network
File Description: application/pdf
Relation: https://hdl.handle.net/10356/165580; https://educationaldatamining.org/edm2022/proceedings/; 195; 205
-
14
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Randomized Link Transformer, Open-Domain Dialogue Generation
File Description: application/pdf
Relation: https://hdl.handle.net/10356/159793; 11
-
15
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Engineering::Computer science and engineering::Computing methodologies::Image processing and computer vision, Network Compression, Semantic Segmentation
File Description: application/pdf
Relation: https://hdl.handle.net/10356/147439; 960; 969
Availability: https://hdl.handle.net/10356/147439
-
16
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Multi-Task Meta-Learning, Personalized Dialogue Generation
File Description: application/pdf
Relation: https://hdl.handle.net/10356/153442; 88; 97
-
17
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Social sciences::Psychology, Deep Learning, fNIRS, Machine Learning, Signal Quality Control
File Description: application/pdf
Relation: IEEE Transactions on Neural Systems and Rehabilitation Engineering; https://hdl.handle.net/10356/163047; 30; 2292; 2300
-
18
Authors: et al.
Contributors: et al.
Subject Terms: Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Aircraft Trajectory Prediction, Encoder-Decode, Recurrent Neural Network
File Description: application/pdf
Relation: IEEE Access; https://hdl.handle.net/10356/155806; 10; 17881; 17896
-
19
Authors: et al.
Contributors: et al.
Subject Terms: Engineering, Engineering::Electrical and electronic engineering, Engineering::Electrical and electronic engineering::Wireless communication systems, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Internet of Things, Software-Defined Networking, Deep Learning, Low-Rate DoS Attacks, CIC DoS 2017, Anomaly Detection, Network Security
File Description: application/pdf
Relation: A19D6a0053; Engineering Applications of Artificial Intelligence; https://hdl.handle.net/10356/167102; 114; 105059
-
20
Authors: et al.
Contributors: et al.
Subject Terms: Science::Mathematics::Discrete mathematics::Cryptography, Engineering::Computer science and engineering::Computing methodologies::Artificial intelligence, Profiled Side-channel Attacks, Digital Devices
File Description: application/pdf
Relation: NRF2018–NCR–NCR009–0001; https://hdl.handle.net/10356/148354; 15
Full Text Finder
Nájsť tento článok vo Web of Science