[1] |
常英贤,陈广勇,石鑫磊,等. 移动网络安全防范技术研究[J]. 信息网络安全,2016(4):76-81.
|
[2] |
孙文涛, 张韬. 移动互联网视听新应用监管技术分析[J]. 广播与电视技术, 2014, 41(9):35-37.
|
[3] |
黄凯奇,任伟强,谭铁牛. 图像物体分类与检测算法综述[J]. 计算机学报,2014,37(6):1225-1240.
|
[4] |
朱晨捷,朱蓉,叶炜. 面向枪支图像的特征提取与识别方法研究[J]. 福建电脑,2014,30(7):5-7.
|
[5] |
TIWARI R K, VERMA G K.A Computer Vision Based Framework for Visual Gun Detection using SURF[C]//IEEE. 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), January 24-25, 2015, Visakhapatnam, India. New Jersey: IEEE, 2015: 1-5.
|
[6] |
EVERINGHAM M, GOOL L V, WILLIAMS C K I, et al. The Pascal, Visual Object Classes (VOC) Challenge[J]. International Journal of Computer Vision, 2010, 88(2): 303-338.
|
[7] |
REN S, HE K, GIRSHICK R, et al.Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2016(99): 91-99.
|
[8] |
李桂芝,韩臻,周启惠,等. 基于Binder信息流的Android恶意行为检测系统[J]. 信息网络安全,2016(2):54-59.
|
[9] |
GIRSHICK R, DONAHUE J, DARRELL T, et al.Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation[C]//IEEE. 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 23-28, 2014, Columbus, USA. New Jersey: IEEE, 2014: 580-587.
|
[10] |
ZHANG Ning, PALURI M, RANZATO M A, et al.Panda: Pose aligned networks for deep attribute modeling[C]//IEEE. 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 23-28, 2014, Columbus, USA. New Jersey: IEEE, 2014: 1637-1644.
|
[11] |
朱筱赟,胡爱群,邢月秀,等. 基于Android平台的移动办公安全方案综述[J]. 信息网络安全,2015(1):76-83.
|