Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 334-341.doi: 10.11896/jsjkx.200800066
• Intelligent Computing • Previous Articles Next Articles
ZENG Wei-liang, CHEN Yi-hao, YAO Ruo-yu, LIAO Rui-xiang, SUN Wei-jun
CLC Number:
[1] WU Y,SCHUSTER M,CHEN Z,et al.Google's neural machine translation system:bridging the gap between human and machine translation[J].arXiv:1609.08144,2016. [2] BAHDANAU D,CHO K,BENGIO Y.Neural machine translation by jointly learning to align and translate[J].arXiv:1409.0473,2014. [3] GRAVES A,JAITLY N.Towards end-to-end speech recogni-tion with recurrent neural networks[C]//International Conference on Machine Learning.2014:1764-1772. [4] CHOROWSKI J,BAHDANAU D,CHO K,et al.End-to-endcontinuous speech recognition using attention-based recurrent nn:First results[J].arXiv:1412.1602,2014. [5] XU K,BAJ,KIROS R,et al.Show,attend and tell:Neural image caption generation with visual attention[C]//International Conference on Machine Learning.2015:2048-2057. [6] LAROCA R,SEVERO E,ZANLORENSI L A,et al.A robustreal-time automatic license plate recognition based on the yolodetector[C]//International JointConference on Neural Networks.2018:1-10. [7] BERGER C.From a competition for self-driving miniature cars to a standardized experimental platform:concept,models,architecture,and evaluation[J].arXiv:1406.7768,2014. [8] HELBING D,MOLNAR P.Social force model for pedestriandynamics [J].Physical Review E Statistical Physics Plasmas Fluids & Related Interdisciplinary Topics,1998,51(5):4282. [9] TAY C,LAUGIER C.Modelling smooth paths using gaussian processes[C]//Springer Tracts in Advanced Robotics,2007,42:381-390. [10] CHAN Y T,HU A G C,PLANT J B.A kalmanfilter basedtracking scheme with input estimation[J].IEEE Transactions on Aerospace and Electronic Systems,1979,AES-15(2):237-244. [11] ALAHI A,GOEL K,RAMANATHAN V,et al.Social lstm:human trajectory prediction in crowded spaces[C]//IEEE Conference on Computer Vision and Pattern Recognition.2016. [12] ILYA S,ORIOL V,QUOC V L.Sequence tosequence learning with neural networks [C]//Advances in Neural Information Processing Systems.2014:3104-3112. [13] AGRIM G,JUSTIN J,LI F,et al.Social gan:socially acceptable trajectories with generative adversarial networks[C]//IEEE Conference on Computer Vision and Pattern Recognition.2018. [14] JAVAD A,JEAN-BERNARD H,JULIAN P.Social ways:learning multi-modal distributions of pedestrian trajectories with gans[C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops.2019. [15] AMIR S,VINEET K,ALI S,et al.SoPhie:an attentive gan for predicting paths compliant to social and physical constraints[C]//IEEE Conference on Computer Vision and Pattern Recognition.2018. [16] ZHAO T,XU Y,MONFORT M,et al.Multi-agent tensor fusion for contextual trajectory prediction[C]//IEEE Conference on Computer Vision and Pattern Recognition.2019. [17] ASHISH V,NOAM S,NIKI P,et al.Attention is all you need[C]//Proceedings of the 31st International Conference on Neural Information Processing Systems.2017,30. [18] VEMULA A,MUELLING K,OH J.Social attention:modeling attention in human crowds[C]//2018 IEEE international Conference on Robotics and Automation (ICRA).IEEE,2018. [19] XU K,HU W,LESKOVEC J,et al.How powerful are graphneural networks?[J].arXiv:1810.00826. [20] SIJIE Y,YUANJUN X,DAHUA L.Spatial temporal graphconvolutional networks for skeleton-based action recognition[C]//Thirty-Second AAAI Conference on ArtificialIntelligence.2018. [21] YAN S J,XIONG Y J,LIN D H.Spatial temporal graph convolutional networks for skeleton-based action recognition[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2018(1). [22] CHENYANG S,WENTAO C,WEI W,et al.An attention enhanced graph convolutional lstm network for skeleton-basedaction recognition[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2019:1227-1236. [23] VELIKOVI P,CUCURULL G,CASANOVA A,et al.Graph attention networks[J].arXiv:1710.10903. [24] HUANG Y,BI H,LI Z,et al.STGAT:modeling spatial-temporal interactions for human trajectory prediction[C]//IEEE International Conference on Computer Vision.2019:6272-6281. [25] CHO K,VAN M B,GULCEHRE C,et al.Learning phrase representations usingrnnencoder-decoder for statistical machine translation[J].arXiv:1406.1078. [26] HASIM S,ANDREW S,FRANCOISE B.Long short-termmemory based recurrent neural network architectures for large vocabulary speech recognition[J].arXiv:1402.1128. [27] SUZUKI K,NAKAMURA H.Traffic Analyzer-the integratedvideo image processing system for traffic flow analysis[C]//Proceedings of the 13th World Congress on Intelligent Transportation Systems.2006. [28] LI X,CHEN S,HU X,YANG J.Understanding the disharmony between dropout and batch normalization by variance shift[C]//IEEE Conference on Computer Vision and Pattern Recognition.2019:2677-2685. [29] NWANKPA C,IJOMAH W,GACHAGAN A,et al.Activation functions:comparison of trends in practice and research for deep learning[J].arXiv:1811.03378. [30] BELLO I,ZOPH B,VASUDEVAN V,et al.Neural optimizer search with reinforcement Learning[C]//International Conference on Machine Learning.2016:459-468. [31] HOJJATS,SHARN S,JOSEPH B.Recent advances in recurrent neural networks[J].arXiv:1801.01078,2017. [32] WOJCIECH Z,ILYA S,ORIOL V.Recurrent neural network regularization[J].arXiv:1409.2329. [33] SEPP H,JURGEN S.Long short-term memory[J].NeuralComputation,1997,9(8):1735-1780. |
[1] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[2] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[3] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[4] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[5] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[6] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[7] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[8] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[9] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[10] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[11] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[12] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[13] | ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383. |
[14] | WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423. |
[15] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
|