共 15 条
[1]
[Anonymous], 2009, P USENIX SECURITY S
[2]
HarDNet: A Low Memory Traffic Network
[J].
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019),
2019,
:3551-3560
[3]
Weighted Nuclear Norm Minimization with Application to Image Denoising
[J].
2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2014,
:2862-2869
[4]
Deep Residual Learning for Image Recognition
[J].
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2016,
:770-778
[6]
Kuhn M.G., 2003, COMPROMISING EMANATI
[7]
Lemarchand F, 2020, INT CONF ACOUST SPEE, P2882, DOI [10.1109/icassp40776.2020.9053913, 10.1109/ICASSP40776.2020.9053913]
[8]
Mao XJ, 2016, ADV NEUR IN, V29
[9]
Marinov M, 2014, Remote video eavesdropping using a software-defined radio platform
[10]
DeepDeblur: text image recovery from blur to sharp
[J].
MULTIMEDIA TOOLS AND APPLICATIONS,
2019, 78 (13)
:18869-18885