- 智能與數據重構世界
- (美)薄智泉 徐亭主編
- 523字
- 2020-09-25 12:47:18
參考文獻
[1]Gardner H.Frames of Mind:The Theory of Multiple Intelligences[M].Third Edition.NY:Basic Books,2011.
[2]Poole D,Mackworth A,Goebel R.Computational Intelligence[M].NY:Oxford University Press,1998.
[3]Russel S J,Norvig P.Artificial Intelligence:A Modern Approach[M].Second Edition.New Jersey:Prentice Hall,2009.
[4]Turing A M.The Essential Turing[M].Oxford:Oxford University Press,2004.
[5]Turing A.Computing Machinery and Intelligence[J].Mind,1950, 236:433-460.
[6]Luis V A,Blum,Hopper M,et al.CAPTCHA:Using Hard AI Problems for Security[C].Advances in Cryptology - EUROCRYPT 2003,2003.
[7]埃森哲.人工智能應用之道:高管指南[EB/OL].[2019-06-21].https://www.accenture.com/cn-zh/insights/digital/artificial-intelligence-explained-executives.
[8]Chan S.為什么需要知識圖譜?什么是知識圖譜?-KG的前世今生[EB/OL].[2017-12-0].https://zhuanlan.zhihu.com/p/31726910.
[9]Oivind D T,Anil K J,Torfinn T.Feature Extraction Methods For Character Recognition——a Survey[J].Pattern recognition,1996, 29(4):641-662.
[10]丁躍潮.人工智能教學網頁[EB/OL].[2002-01-22].http://210.34.136.253:8488/AIteach/Chapt2_5.htm.
[11]Fukushima K.Neocognitron:A Hierarchical Neural Network Capable of Visual Pattern Recognition[J].Neural Networks,1988, 1:119-130.
[12]Lecun Y,Bottou L,Bengio Y,et al.Gradient-based Learning Applied to Document Recognition[J].Proceedings of IEEE,1998, 86:2278-2324.
[13]Krizhevsky A,Sutskever I,Hinton G E.ImageNet Classification with Deep Convolutional Neural Networks[C].NIPS,2012.
[14]Anumanchipalli G K,Chartier J,Chang E F.Speech synthesis from neural decoding of spoken sentences[J].Nature,2019, 568:493-498.
[15]Wodewp.機器視覺系統的一般構架與組成[EB/OL].[2019].http://www.vision263.com/2404.html.
[16]MarrD,Poggio T.From Understanding Computation to Understanding Neural Circuitry[J].AIM-357,1976.
[17]圖靈人工智能.David Marr對計算機視覺的貢獻[EB/OL].[2017].https://zhuanlan.zhihu.com/p/32307763.
[18]Lee T S,Mumford D.Hierarchical Bayesian inference in the visual cortex[J].Journal of the Optical Society of America A,2003, 20(7):1434-1448.
[19]Cong R,et al.Review of Visual Saliency Detection with Comprehensive Information[J].IEEE Transactions on Circuits and Systems for Video Technology,2018.
[20]Cheng M-M,Zhang Z,Lin W-Y,et al.BING:Binarized Normed Gradients for Objectness Estimation at 300fps[C].CVPR,2014.
[21]Dalal N,Triggss B.Histograms of Oriented Gradients for Human Detection[C].CVPR,2005.
[22]Lowe D G.Object Recognition from Local Scale-Invariant Features[C].ICCV,1999.
[23]Tomasi C,Kanade T.Detection and Tracking of Point Features[C].Carnegie Mellon University Technical Report,1991.
[24]Henriques J F,Caseiro R,Martins P,et al.High-Speed Tracking with Kernelized Correlation Filters[C].CVPR,2014.
[25]億歐.盤點2年近10起自動駕駛事故:半數以上事故非自動駕駛系統過錯[EB/OL].[2018-07-06].https://www.d1ev.com/news/qiye/71732.
[26]Cosgrove C,Yuille A L.Adversarial Examples for Edge Detection:They Exist,and They Transfer[EB/OL].[2019-06-02].https://arxiv.org/abs/1906.00335.
[27]Zeng X, Liu C,Wang Y,et al.Adversarial Attacks Beyond the Image Space[C].IEEE Conference on Computer Vision and Pattern Recognition,2019.
[28]Goodfellow I,Paperno T N,Huang S,et al.Attacking Machine Learning with Adversarial Examples[EB/OL].[2017-02-24].https://openai.com/blog/adversarial-example-research/.
- ETL數據整合與處理(Kettle)
- 劍破冰山:Oracle開發藝術
- 使用GitOps實現Kubernetes的持續部署:模式、流程及工具
- Architects of Intelligence
- 大數據:規劃、實施、運維
- 數據庫應用基礎教程(Visual FoxPro 9.0)
- Creating Dynamic UIs with Android Fragments(Second Edition)
- Ceph源碼分析
- 中國數字流域
- MySQL 8.x從入門到精通(視頻教學版)
- 數據科學工程實踐:用戶行為分析與建模、A/B實驗、SQLFlow
- Construct 2 Game Development by Example
- 區域云計算和大數據產業發展:浙江樣板
- 菜鳥學SPSS數據分析
- 企業主數據管理實務