Zeitschriftenartikel zum Thema „Spurious features“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Spurious features" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Chen, Kaitao, Shiliang Sun und Jing Zhao. „CaMIL: Causal Multiple Instance Learning for Whole Slide Image Classification“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 2 (24.03.2024): 1120–28. http://dx.doi.org/10.1609/aaai.v38i2.27873.
Der volle Inhalt der QuelleSu, Donglin, Qian Shi, Hui Xu und Wang Wang. „Nonintrusive Load Monitoring Based on Complementary Features of Spurious Emissions“. Electronics 8, Nr. 9 (07.09.2019): 1002. http://dx.doi.org/10.3390/electronics8091002.
Der volle Inhalt der QuelleKARIMI, SAEED, und HAMDİ DİBEKLİOĞLU. „Uncovering and mitigating spurious features in domain generalization“. Turkish Journal of Electrical Engineering and Computer Sciences 32, Nr. 2 (14.03.2024): 320–37. http://dx.doi.org/10.55730/1300-0632.4071.
Der volle Inhalt der QuelleDu, Mengnan, Ruixiang Tang, Weijie Fu und Xia Hu. „Towards Debiasing DNN Models from Spurious Feature Influence“. Proceedings of the AAAI Conference on Artificial Intelligence 36, Nr. 9 (28.06.2022): 9521–28. http://dx.doi.org/10.1609/aaai.v36i9.21185.
Der volle Inhalt der QuelleMing, Yifei, Hang Yin und Yixuan Li. „On the Impact of Spurious Correlation for Out-of-Distribution Detection“. Proceedings of the AAAI Conference on Artificial Intelligence 36, Nr. 9 (28.06.2022): 10051–59. http://dx.doi.org/10.1609/aaai.v36i9.21244.
Der volle Inhalt der QuellePopovic, Brankica, und Ljiljana Maskovic. „Fingerprint minutiae filtering based on multiscale directional information“. Facta universitatis - series: Electronics and Energetics 20, Nr. 2 (2007): 233–44. http://dx.doi.org/10.2298/fuee0702233p.
Der volle Inhalt der QuelleARTUSO, Francesco, Francesco FIDECARO, Francesco D'ALESSANDRO, Gino IANNACE, Gaetano LICITRA, Geremia POMPEI und Luca FREDIANELLI. „Identifying optimal feature sets for acoustic signal classification in environmental noise measurements“. INTER-NOISE and NOISE-CON Congress and Conference Proceedings 270, Nr. 4 (04.10.2024): 7540–49. http://dx.doi.org/10.3397/in_2024_3974.
Der volle Inhalt der QuelleChen, Ziliang, Yongsen Zheng, Zhao-Rong Lai, Quanlong Guan und Liang Lin. „Diagnosing and Rectifying Fake OOD Invariance: A Restructured Causal Approach“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 10 (24.03.2024): 11471–79. http://dx.doi.org/10.1609/aaai.v38i10.29028.
Der volle Inhalt der QuelleWang, Zhao, und Aron Culotta. „Robustness to Spurious Correlations in Text Classification via Automatically Generated Counterfactuals“. Proceedings of the AAAI Conference on Artificial Intelligence 35, Nr. 16 (18.05.2021): 14024–31. http://dx.doi.org/10.1609/aaai.v35i16.17651.
Der volle Inhalt der QuelleSmy, T., M. Salahuddin, S. K. Dew und M. J. Brett. „Explanation of spurious features in tungsten deposition using an atomic momentum model“. Journal of Applied Physics 78, Nr. 6 (15.09.1995): 4157–63. http://dx.doi.org/10.1063/1.359875.
Der volle Inhalt der QuelleSchulze, Georg, Andrew Jirasek, Marcia M. L. Yu, Arnel Lim, Robin F. B. Turner und Michael W. Blades. „Investigation of Selected Baseline Removal Techniques as Candidates for Automated Implementation“. Applied Spectroscopy 59, Nr. 5 (Mai 2005): 545–74. http://dx.doi.org/10.1366/0003702053945985.
Der volle Inhalt der QuelleParshutkin, Andrey, und Marina Neaskina. „Increasing the Security of Information from Leakage Through Side Electromagnetic Emissions“. Voprosy kiberbezopasnosti, Nr. 3(49) (2022): 82–89. http://dx.doi.org/10.21681/2311-3456-2022-3-82-89.
Der volle Inhalt der QuelleTSANG, K. M. „RECOGNITION OF 2D STANDALONE AND OCCLUDED OBJECTS USING WAVELET TRANSFORM“. International Journal of Pattern Recognition and Artificial Intelligence 15, Nr. 04 (Juni 2001): 691–705. http://dx.doi.org/10.1142/s021800140100109x.
Der volle Inhalt der QuellePurdie, Rhiannon. „Borrowed Feathers: The Spurious Older Scots Ending to Chaucer’s Parliament of Fowls in Bodleian Library MS Arch. Selden. B. 24“. Chaucer Review 59, Nr. 2 (April 2024): 135–81. http://dx.doi.org/10.5325/chaucerrev.59.2.0135.
Der volle Inhalt der QuelleMinghim, Rosane, Liz Huancapaza, Erasmo Artur, Guilherme P. Telles und Ivar V. Belizario. „Graphs from Features: Tree-Based Graph Layout for Feature Analysis“. Algorithms 13, Nr. 11 (18.11.2020): 302. http://dx.doi.org/10.3390/a13110302.
Der volle Inhalt der QuelleDing, Yujian, Xiaoxu Ma und Bingxue Yang. „Research on Image Feature Extraction and Environment Inference Based on Invariant Learning“. Applied Sciences 14, Nr. 23 (21.11.2024): 10770. http://dx.doi.org/10.3390/app142310770.
Der volle Inhalt der QuelleNabavizadeh, Seyed, Mohsen Eshraghi und Sergio Felicelli. „A Comparative Study of Multiphase Lattice Boltzmann Methods for Bubble-Dendrite Interaction during Solidification of Alloys“. Applied Sciences 9, Nr. 1 (24.12.2018): 57. http://dx.doi.org/10.3390/app9010057.
Der volle Inhalt der QuelleZhang, Shengyu, Xusheng Feng, Wenyan Fan, Wenjing Fang, Fuli Feng, Wei Ji, Shuo Li et al. „Video-Audio Domain Generalization via Confounder Disentanglement“. Proceedings of the AAAI Conference on Artificial Intelligence 37, Nr. 12 (26.06.2023): 15322–30. http://dx.doi.org/10.1609/aaai.v37i12.26787.
Der volle Inhalt der QuelleWenger, Emily, Xiuyu Li, Ben Y. Zhao und Vitaly Shmatikov. „Data Isotopes for Data Provenance in DNNs“. Proceedings on Privacy Enhancing Technologies 2024, Nr. 1 (Januar 2024): 413–29. http://dx.doi.org/10.56553/popets-2024-0024.
Der volle Inhalt der QuelleBOBROVSKIKH, ALEKSEY, ALEXANDER GUREEV, VLADIMIR LOS und ALEKSEY MARKOV. „CONSIDERATION OF MULTIPATH IN MODELING THE FIELD OF SECONDARY ELECTROMAGNETIC RADIATION ON INFORMATIZATION OBJECTS“. Computational Nanotechnology 9, Nr. 4 (28.12.2022): 63–69. http://dx.doi.org/10.33693/2313-223x-2022-9-4-63-69.
Der volle Inhalt der QuelleCai, Jie, Xin Wang, Haoyang Li, Ziwei Zhang und Wenwu Zhu. „Multimodal Graph Neural Architecture Search under Distribution Shifts“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 8 (24.03.2024): 8227–35. http://dx.doi.org/10.1609/aaai.v38i8.28663.
Der volle Inhalt der QuelleFessler, Daniel M. T. „Contextual features of problem-solving and social learning give rise to spurious associations, the raw materials for the evolution of rituals“. Behavioral and Brain Sciences 29, Nr. 6 (Dezember 2006): 617–18. http://dx.doi.org/10.1017/s0140525x06009381.
Der volle Inhalt der QuelleChen, Yingjie, Jiarui Zhang, Tao Wang und Yun Liang. „Trend-Aware Supervision: On Learning Invariance for Semi-supervised Facial Action Unit Intensity Estimation“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 1 (24.03.2024): 483–91. http://dx.doi.org/10.1609/aaai.v38i1.27803.
Der volle Inhalt der QuelleWei, Yutao, Wenzheng Shu, Zhangtao Cheng, Wenxin Tai, Chunjing Xiao und Ting Zhong. „Counterfactual Graph Learning for Anomaly Detection with Feature Disentanglement and Generation (Student Abstract)“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 21 (24.03.2024): 23682–83. http://dx.doi.org/10.1609/aaai.v38i21.30524.
Der volle Inhalt der QuelleRuiz, Oscar E., Camilo Cortes, Diego A. Acosta und Mauricio Aristizabal. „Sensitivity analysis in optimized parametric curve fitting“. Engineering Computations 32, Nr. 1 (02.03.2015): 37–61. http://dx.doi.org/10.1108/ec-03-2013-0086.
Der volle Inhalt der QuelleChen, Bo, Fangzhou Meng, Hongying Tang und Guanjun Tong. „Two-Level Attention Module Based on Spurious-3D Residual Networks for Human Action Recognition“. Sensors 23, Nr. 3 (03.02.2023): 1707. http://dx.doi.org/10.3390/s23031707.
Der volle Inhalt der QuelleSridhar, A., V. G. Kouznetsova und M. G. D. Geers. „Frequency domain boundary value problem analyses of acoustic metamaterials described by an emergent generalized continuum“. Computational Mechanics 65, Nr. 3 (28.11.2019): 789–805. http://dx.doi.org/10.1007/s00466-019-01795-z.
Der volle Inhalt der QuelleSantos, Augusto, Diogo Rente, Rui Seabra und José M. F. Moura. „Learning the Causal Structure of Networked Dynamical Systems under Latent Nodes and Structured Noise“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 13 (24.03.2024): 14866–74. http://dx.doi.org/10.1609/aaai.v38i13.29406.
Der volle Inhalt der QuelleYoritomo, John Y., und Richard L. Weaver. „Fluctuations in the cross-correlation for fields lacking full diffusivity: The statistics of spurious features“. Journal of the Acoustical Society of America 140, Nr. 1 (Juli 2016): 702–13. http://dx.doi.org/10.1121/1.4959002.
Der volle Inhalt der Quelleweaver, richard, und John Y. Yoritomo. „Fluctuations in the cross-correlation for fields lacking full diffusivity: The statistics of spurious features“. Journal of the Acoustical Society of America 141, Nr. 5 (Mai 2017): 3472. http://dx.doi.org/10.1121/1.4987221.
Der volle Inhalt der QuelleZhang, Daiwei, Bo Xu, Han Hu, Qing Zhu, Qiang Wang, Xuming Ge, Min Chen und Yan Zhou. „Spherical Hough Transform for Robust Line Detection Toward a 2D–3D Integrated Mobile Mapping System“. Photogrammetric Engineering & Remote Sensing 89, Nr. 5 (01.05.2023): 50–59. http://dx.doi.org/10.14358/pers.22-00112r2.
Der volle Inhalt der QuelleYadav, Amit, Abhijeet Agawal, Pramod Kumar und Tejaswi Sachwani. „DESIGN AND ANALYSIS OF AN INTELLIGENT FIRE DETECTION SYSTEM FOR AIRCRAFT“. International Journal of Engineering Technologies and Management Research 5, Nr. 2 (04.05.2020): 260–73. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.656.
Der volle Inhalt der QuelleYU, DONGGANG, und WEI LAI. „ANALYSIS AND RECOGNITION OF BROKEN HANDWRITTEN DIGITS BASED ON MORPHOLOGICAL STRUCTURE AND SKELETON“. International Journal of Pattern Recognition and Artificial Intelligence 19, Nr. 03 (Mai 2005): 271–96. http://dx.doi.org/10.1142/s0218001405004095.
Der volle Inhalt der QuelleComite, Davide, Paolo Baccarelli, Paolo Burghignoli und Alessandro Galli. „Wire-medium loaded planar structures: modal analysis, near fields, and radiation features“. International Journal of Microwave and Wireless Technologies 8, Nr. 4-5 (12.04.2016): 713–22. http://dx.doi.org/10.1017/s1759078716000490.
Der volle Inhalt der QuelleVille-Ometz, Fabienne, Jean Royauté und Alain Zasadzinski. „Enhancing in automatic recognition and extraction of term variants with linguistic features“. Terminology 13, Nr. 1 (01.06.2007): 35–59. http://dx.doi.org/10.1075/term.13.1.03vil.
Der volle Inhalt der QuelleFranz, Karly S., Grace Reszetnik und Tom Chau. „On the Need for Accurate Brushstroke Segmentation of Tablet-Acquired Kinematic and Pressure Data: The Case of Unconstrained Tracing“. Algorithms 17, Nr. 3 (20.03.2024): 128. http://dx.doi.org/10.3390/a17030128.
Der volle Inhalt der QuelleHayashi, Katsuhiko, Shuhei Kondo und Yuji Matsumoto. „Efficient Stacked Dependency Parsing by Forest Reranking“. Transactions of the Association for Computational Linguistics 1 (Dezember 2013): 139–50. http://dx.doi.org/10.1162/tacl_a_00216.
Der volle Inhalt der QuelleWest, Paul, und Natalia Starostina. „How to Recognize and Avoid AFM Image Artifacts“. Microscopy Today 11, Nr. 3 (Juni 2003): 20–27. http://dx.doi.org/10.1017/s1551929500052639.
Der volle Inhalt der QuelleYu, M. L., F. X. Giraldo, M. Peng und Z. J. Wang. „Localized Artificial Viscosity Stabilization of Discontinuous Galerkin Methods for Nonhydrostatic Mesoscale Atmospheric Modeling“. Monthly Weather Review 143, Nr. 12 (24.11.2015): 4823–45. http://dx.doi.org/10.1175/mwr-d-15-0134.1.
Der volle Inhalt der QuelleZeng, Zengri, Wei Peng und Baokang Zhao. „Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning“. Security and Communication Networks 2021 (03.11.2021): 1–18. http://dx.doi.org/10.1155/2021/8986243.
Der volle Inhalt der QuelleBishop, Craig H., und Daniel Hodyss. „Adaptive Ensemble Covariance Localization in Ensemble 4D-VAR State Estimation“. Monthly Weather Review 139, Nr. 4 (01.04.2011): 1241–55. http://dx.doi.org/10.1175/2010mwr3403.1.
Der volle Inhalt der QuelleXin, Shiji, Yifei Wang, Jingtong Su und Yisen Wang. „On the Connection between Invariant Learning and Adversarial Training for Out-of-Distribution Generalization“. Proceedings of the AAAI Conference on Artificial Intelligence 37, Nr. 9 (26.06.2023): 10519–27. http://dx.doi.org/10.1609/aaai.v37i9.26250.
Der volle Inhalt der QuelleWu, Hongqiu, Ruixue Ding, Hai Zhao, Pengjun Xie, Fei Huang und Min Zhang. „Adversarial Self-Attention for Language Understanding“. Proceedings of the AAAI Conference on Artificial Intelligence 37, Nr. 11 (26.06.2023): 13727–35. http://dx.doi.org/10.1609/aaai.v37i11.26608.
Der volle Inhalt der QuellePike, J. „Notes on the structure of viscous and numerically-captured shocks“. Aeronautical Journal 89, Nr. 889 (November 1985): 335–38. http://dx.doi.org/10.1017/s0001924000050843.
Der volle Inhalt der QuelleZemel, Richard S., und Michael C. Mozer. „Localist Attractor Networks“. Neural Computation 13, Nr. 5 (01.05.2001): 1045–64. http://dx.doi.org/10.1162/08997660151134325.
Der volle Inhalt der QuelleChang, Mingshan, Min Yang, Qingshan Jiang und Ruifeng Xu. „Counterfactual-Enhanced Information Bottleneck for Aspect-Based Sentiment Analysis“. Proceedings of the AAAI Conference on Artificial Intelligence 38, Nr. 16 (24.03.2024): 17736–44. http://dx.doi.org/10.1609/aaai.v38i16.29726.
Der volle Inhalt der QuelleChang, Jing, Xiaohui He, Panle Li, Ting Tian, Xijie Cheng, Mengjia Qiao, Tao Zhou, Beibei Zhang, Ziqian Chang und Tingwei Fan. „Multi-Scale Attention Network for Building Extraction from High-Resolution Remote Sensing Images“. Sensors 24, Nr. 3 (04.02.2024): 1010. http://dx.doi.org/10.3390/s24031010.
Der volle Inhalt der QuelleZhang, Zhizhong, Xiaoran Shi, Xinyi Guo und Feng Zhou. „TR-RAGCN-AFF-RESS: A Method for Radar Emitter Signal Sorting“. Remote Sensing 16, Nr. 7 (22.03.2024): 1121. http://dx.doi.org/10.3390/rs16071121.
Der volle Inhalt der QuelleHonda, Ukyo, Tatsushi Oka, Peinan Zhang und Masato Mita. „Not Eliminate but Aggregate: Post-Hoc Control over Mixture-of-Experts to Address Shortcut Shifts in Natural Language Understanding“. Transactions of the Association for Computational Linguistics 12 (2024): 1268–89. http://dx.doi.org/10.1162/tacl_a_00701.
Der volle Inhalt der QuellePortilla, Jesús, Francisco J. Ocampo-Torres und Jaak Monbaliu. „Spectral Partitioning and Identification of Wind Sea and Swell“. Journal of Atmospheric and Oceanic Technology 26, Nr. 1 (01.01.2009): 107–22. http://dx.doi.org/10.1175/2008jtecho609.1.
Der volle Inhalt der Quelle