[1] |
He K, Zhang X, Ren S, et al.Deep Residual Learning for Image Recognition[C]// Computer Vision and Pattern Recognition. IEEE, 2016:770-778.
|
[2] |
Panda P, Sengupta A, Roy K.Energy-Efficient and Improved Image Recognition with Conditional Deep Learning[J]. Acm Journal on Emerging Technologies in Computing Systems, 2017, 13(3):1-21.
|
[3] |
Miyazono T, Saitoh T.Fish Species Recognition Based on CNN Using Annotated Image[C]// International Conference on Information Theoretic Security. Springer, Singapore, 2017:156-163.
|
[4] |
Huang G.B., Zhu Q Y., Siew C.K.Extreme learning machine: theory and Applications[J]. Neurocomputing, 2006, 70(1): 489-501.
|
[5] |
Yang Y, Wang Y, Yuan X.Bidirectional Extreme Learning Machine for Regression Problem and Its Learning Effectiveness[J]. IEEE Transactions on Neural Networks & Learning Systems, 2012, 23(9):1498-1505.
|
[6] |
Cao J, Lin Z, Huang G B, et al.Voting based extreme learning machine[J]. Information Sciences, 2012, 185(1): 66-77.
|
[7] |
Liu X, Gao C, Li P.A comparative analysis of support vector machines and extreme learning machines[J]. Neural Networks, 2012, 33(9): 58.
|
[8] |
Yu, D., Deng, L.Efficient and effective algorithms for training single hidden-layer neural networks[J]. Pattern Recognition Letters,2012, 33(5): 554-558
|
[9] |
张弦,王宏力. 限定记忆极端学习机及其应用[J]. 控制与决策,2012,27(8):1206-1210.
|
[10] |
Tang J, Deng C, Huang G B.Extreme Learning Machine for Multilayer Perceptron[J]. IEEE Transactions on Neural Networks & Learning Systems, 2017, 27(4):809-821.
|
[11] |
Deng C Y.A generalization of the Sherman-Morrison-Woodbury formula[J]. Applied Mathematics Letters, 2011, 24(9):1561-1564.
|
[12] |
Blocki J, Blum A, Datta A, et al.The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy[C]// IEEE, Symposium on Foundations of Computer Science. IEEE Computer Society, 2012:410-419.
|
[13] |
Bartlett P.The sample complexity of pattern classification with neural networks: the size of theweights is more important than the size of the network[J]. IEEE Transactions on InformationTheory. 1998, 44(2): 525-536.
|