Author:
Cao Hongbo,Zhu Yongsheng,Ren Yuange,Wang Bin,Hu Mingqing,Wang Wanqi,Wang Wei
Publisher
Springer Nature Switzerland
Reference46 articles.
1. Yan, K., Wang, X., Du, Y., Jin, N., Huang, H., Zhou, H.: Multi-step short-term power consumption forecasting with a hybrid deep learning strategy. Energies 11(11), 3089 (2018)
2. Wang, W., et al.: Hgate: Heterogeneous graph attention auto-encoders. IEEE Transactions on Knowledge and Data Engineering, pp. 1–1 (2021). https://doi.org/10.1109/TKDE.2021.3138788
3. Sharma, U., Maheshkar, S., Mishra, A.N., Kaushik, R.: Visual speech recognition using optical flow and hidden markov model. Wireless Pers. Commun. 106(4), 2129–2147 (2019)
4. Liu, P., Yuan, W., Fu, J., Jiang, Z., Hayashi, H., Neubig, G.: Pre-train, prompt, and predict: A systematic survey of prompting methods in natural language processing. arXiv preprint arXiv:2107.13586 (2021)
5. Ranjan, R., Bansal, A., Zheng, J., Xu, H., Gleason, J., Lu, B., Nanduri, A., Chen, J.C., Castillo, C.D., Chellappa, R.: A fast and accurate system for face detection, identification, and verification. IEEE Trans. Biomet., Behav. Identity Sci. 1(2), 82–96 (2019)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CSA_FedVeh: Cluster-Based Semi-asynchronous Federated Learning Framework for Internet of Vehicles;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024
2. Structural Adversarial Attack for Code Representation Models;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024