{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:33:21Z","timestamp":1736573601484,"version":"3.32.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,20]]},"DOI":"10.1109\/icbase63199.2024.10762162","type":"proceedings-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T18:45:22Z","timestamp":1732646722000},"page":"942-947","source":"Crossref","is-referenced-by-count":0,"title":["Neural Active Sensing Vision and Manipulation for Cooperative Agents"],"prefix":"10.1109","author":[{"given":"Chenghao","family":"Wang","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology,USA"}]},{"given":"Chaoyi","family":"Tan","sequence":"additional","affiliation":[{"name":"Northeastern University,USA"}]},{"given":"Linzhen","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Michigan,Ann Arbor,USA"}]},{"given":"Rui","family":"Yang","sequence":"additional","affiliation":[{"name":"University of California,Riverside,USA"}]},{"given":"Jiaqi","family":"Hong","sequence":"additional","affiliation":[{"name":"China Academy of Art,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1117\/12.3009240"},{"key":"ref2","article-title":"Surrogate modeling for physical systems with preserved properties and adjustable tradeoffs","author":"Wang","year":"2022","journal-title":"arXiv preprint arXiv:2202.01139"},{"key":"ref3","article-title":"Application of K-means clustering algorithm in evaluation and statistical analysis of internet financial transaction data","author":"Bo","year":"2022","journal-title":"arXiv preprint arXiv:2202.03146"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/su13168873"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2023.3235662"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1117\/12.2626460"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECE58870.2023.10263390"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1115\/1.4064810"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202453601023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DOCS63458.2024.10704381"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2351\/1\/012016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3398002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2019.100958"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2024.174462"},{"key":"ref15","article-title":"Dynamic Risk Measurement by EVT based on Stochastic Volatility models via MCMC","author":"Bo","year":"2022","journal-title":"arXiv preprint arXiv:2201.09434"},{"volume-title":"Investigating the Influence of Interannual Precipitation Variability on Terrestrial Ecosystem Productivity","year":"2023","author":"Chen","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.62836\/iaet.v2i1.162"},{"key":"ref18","first-page":"154","article-title":"Large Language Model (LLM) AI Text Generation Detection based on Transformer Deep Learning Algorithm","volume":"14.2","author":"Mo","year":"2024","journal-title":"International Journal of Engineering and Management Research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.62836\/iaet.vli1.002"},{"key":"ref20","first-page":"1","article-title":"Password complexity prediction based on roberta algorithm","volume":"3.3","author":"Mo","year":"2024","journal-title":"Applied Science and Engineering Journal for Advanced Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.54097\/8c4zvn35"},{"key":"ref22","first-page":"6","article-title":"Spam detection and classification based on distilbert deep learning algorithm","volume":"3.3","author":"Liu","year":"2024","journal-title":"Applied Science and Engineering Journal for Advanced Research"},{"key":"ref23","first-page":"6","article-title":"The cloud-based design of unmanned constant temperature food delivery trolley in the context of artificial intelligence","volume":"1.1","author":"Dai","year":"2024","journal-title":"Journal of Computer Technology and Applied Mathematics"},{"key":"ref24","first-page":"38","article-title":"Make Scale Invariant Feature Transform \u201cFly\u201d with CUDA","volume":"14.3","author":"Mo","year":"2024","journal-title":"International Journal of Engineering and Management Research"},{"key":"ref25","first-page":"20","article-title":"Lidar and Monocular Sensor Fusion Depth Estimation","volume":"3.3","author":"He","year":"2024","journal-title":"Applied Science and Engineering Journal for Advanced Research"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tmech.2023.3320980"},{"key":"ref27","first-page":"97","article-title":"Unraveling large language models: From evolution to ethical implications-introduction to large language models","volume":"10.5","author":"Liu","year":"2024","journal-title":"World Scientific Research Journal"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/75\/20240498"},{"key":"ref29","first-page":"46","article-title":"Cross-Task Multi-Branch Vision Transformer for Facial Expression and Mask Wearing Classification","volume":"1.1","author":"Zhu","year":"2024","journal-title":"Journal of Computer Technology and Applied Mathematics"},{"key":"ref30","first-page":"70","article-title":"Utilizing Deep Learning to Optimize Software Development Processes","volume":"1.1","author":"Li","year":"2024","journal-title":"Journal of Computer Technology and Applied Mathematics"},{"key":"ref31","first-page":"33","article-title":"The Application of Augmented Reality (AR) in Remote Work and Education","volume":"1.1","author":"Li","year":"2024","journal-title":"Journal of Computer Technology and Applied Mathematics"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.60087\/jaigs.v5i1.148"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.60087\/jaigs.v5i1.149"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.60087\/jaigs.v5i1.150"},{"key":"ref35","article-title":"WeatherDG: LLM-assisted Procedural Weather Generation for Domain-Generalized Semantic Segmentation","author":"Qian","year":"2024","journal-title":"arXiv preprint arXiv:2410.12075"}],"event":{"name":"2024 5th International Conference on Big Data &amp; Artificial Intelligence &amp; Software Engineering (ICBASE)","start":{"date-parts":[[2024,9,20]]},"location":"Wenzhou, China","end":{"date-parts":[[2024,9,22]]}},"container-title":["2024 5th International Conference on Big Data &amp;amp; Artificial Intelligence &amp;amp; Software Engineering (ICBASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10761118\/10761986\/10762162.pdf?arnumber=10762162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T19:50:31Z","timestamp":1736538631000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10762162\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icbase63199.2024.10762162","relation":{},"subject":[],"published":{"date-parts":[[2024,9,20]]}}}