搜索结果: 1-15 共查到“graph”相关记录278条 . 查询时间(0.078 秒)
学术报告-Revisiting Graph Convolutional Networks: From Paradigm to Application(图)
学术报告 图神经网络 王石平
2024/4/15
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Graph Refinement via Simultaneously Low-rank and Sparse Approximation
低秩 稀疏近似 图细化
2023/4/18
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Generalization of Graph Neural Networks and Graph Structural Learning for Robust Representation
图神经网络 泛化 图结构学习 鲁棒表示
2023/4/18
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A diffusion scheme based on the foliation graph stripe for optimizing discrete harmonic foliation energy
叶子图条带 优化 离散谐波 叶能量 扩散方案
2023/4/28
中国地质大学科学技术发展院 李正来,唐厂 等,计算机学院. IEEE T-MM (2021), Consensus Graph Learning for Multi-view Clustering(图)
噪声;冗余信息;捕获;数据;相似性;干扰
2021/10/14
2021年5月21日,《IEEE Transactions on Multimedia》正式刊发了国地质大学计算机学院与国防科技大学、深圳大学以及国家超算济南中心等单位合作完成的研究成果—Consensus Graph Learning for Multi-view Clustering(基于一致图学习的多视图聚类算法),论文的第一作者为中国地质大学计算机学院硕士研究生李正来,通讯作者为唐厂教授。
Graph Similarity and Its Applications to Hardware Security
Graph Similarity Hardware Reverse Engineering Hardware Trojan
2019/8/30
Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection of intellectual property infringements ...
鲁东大学运筹学课件 Lecture-Graph Theory。
华南理工大学数据结构与算法课件Chapter7 Graph。
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Homomorphic encryption intermediate representation deep learning
2019/4/3
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an attractive remedy to increasing concerns about data privacy in deep learning (DL). However, building DL model...
An Efficient Private Evaluation of a Decision Graph
decision graph homomorphic encryption oblivious transfer and GLOUDS
2019/4/1
A decision graph is a well-studied classifier and has been used to solve many real-world problems. We assumed a typical scenario between two parties in this study, in which one holds a decision graph ...
Must the Communication Graph of MPC Protocols be an Expander?
secure multiparty computation expander graph communication locality
2018/6/5
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur depen...
Fault-tolerant distributed consensus is a fundamental problem in secure distributed computing. In this work, we consider the problem of distributed consensus in directed graphs tolerating crash failur...
COUPLE GRAPH BASED LABEL PROPAGATION METHOD FOR HYPERSPECTRAL REMOTE SENSING DATA CLASSIFICATION
Graph Label Propagation Semi-Supervised method Classification Hyperspectral Remote Sensing
2018/5/15
Graph based semi-supervised classification method are widely used for hyperspectral image classification. We present a couple graph based label propagation method, which contains both the adjacency gr...
MAN-MADE OBJECT EXTRACTION FROM REMOTE SENSING IMAGERY BY GRAPH-BASED MANIFOLD RANKING
Man-made Object Extraction Remote Sensing Image Priori Area Extraction Graph Model Manifold Ranking
2018/5/14
The automatic extraction of man-made objects from remote sensing imagery is useful in many applications. This paper proposes an algorithm for extracting man-made objects automatically by integrating a...