机器学习与深度学习
上QQ阅读APP看本书,新人免费读10天
设备和账号都新为新人

参考文献

[1] 朱福喜.人工智能[M].3版.北京:清华大学出版社,2016.

[2] 周志华.机器学习[M].北京:清华大学出版社,2016.

[3] 刘鹏,赵海峰.深度学习[M].北京:电子工业出版社,2018.

[4] FISHER R A. The use of multiple measurements in taxonomic problems[J]. Annals of Eugenics, 1936, 7(2): 178-188.

[5] CHRISTOPHER M B. Pattern Recognition and Machine Learning[M]. NY: Springer, 2016.

[6] ROKACH L. Ensemble-based classifiers[J]. Artificial Intelligence Review, 2010, 33(1): 1-39.

[7] SCHAPIRE R. The strength of weak learnability[J]. Machine Learning, 1990, 5(2): 197-227.

[8] FREUND Y, SCHAPIRE R. A short introduction to boosting[J]. Journal of Japaness Society for Artificial Intelligence, 1999, 14(5): 771-780.

[9] FREUND Y, SCHAOIRE R. A decision-theoretic generalization of on-line learning and an application to boosting[J]. Computational Learning Theory. Lecture Notes in Computer Science, 1995, 904: 23-37.

[10] BREIMAN L. Bagging predictors[J]. Machine Learning, 1996, 24(2): 123-140.

[11] BARTO A G, SUTTON R S. Reinforcement Learning: An Introduction[M]. Cambridge: MIT Press, 1998.

[12] PEARSON K. On lines and Planes of Closest Fit to Systems of Points in Space[J]. Philosophical Magazine, 1901, 2(6): 559-572.

[13] HE X F, YAN S C, HU Y X, et al. Face recognition using laplacianfaces[J]. Journal of IEEE Transactions on Pattern Analysis and Machine Intelligence, 2005, 27(3):328-340.

[14] HOTELLING H. Relations between two sets of variables[J]. Biometrika, 1936, 28: 312-377.

[15] PHILIP C C L, ZHANG C Y. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data[J]. Information Science, 2014, 275(11): 314-347.

[16] HINTON G, SALAKHUTDINOV R R. Reducing the dimensionality of data with neural networks[J]. Science, 2006, 313(5786): 504-507.

[17] 张军阳,王慧丽,郭阳,等.深度学习相关研究综述[J].计算机应用研究,2018,35(321)(7):7-14,22.

[18] 沈先耿.深度学习综述[J].数字化用户,2017(11):63.

[19] 韩小虎,徐鹏,韩森森.深度学习理论综述[J].计算机时代,2016,6:107-110.

[20] 刘建伟,刘媛,罗雄麟.深度学习研究进展[J].计算机应用研究,2014,31(7):7-16,28.

[21] HONG C, YU J, WAN J, et al. Multimodal Deep Auto-encoder for Human Pose Recovery[J]. IEEE Transactions on Image Processing, 2015, 24(12):5659-5670.

[22] YU J,ZHANG B,KUANG Z, et al. iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(5): 1005-1016.

[23] GUPTA A, VEDALDI A, ZISSERMAN A. Synthetic Data for Text Localisation in Natural Images[C]. IEEE Conference on Computer Vision and Pattern Recognition(CVPR), 2016.

[24] SHI B, BAI X, YAO C. An End-to-End Trainable Neural Network for Image-based Sequence Recognition and Its Application to Scene Text Recognition[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2015, 39(11): 2298-2304.

[25] GRAVES A. Supervised Sequence Labeling with Recurrence Neural Networks[M]. Berlin: Springer, 2012.