{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T23:10:06Z","timestamp":1732749006076,"version":"3.29.0"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10649932","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Deep Kernel Calibration"],"prefix":"10.1109","author":[{"given":"Zunlei","family":"Feng","sequence":"first","affiliation":[{"name":"Zhejiang University,School of Software Technology,Hangzhou,China"}]},{"given":"Wenxiang","family":"Xu","sequence":"additional","affiliation":[{"name":"Zhejiang University,School of Software Technology,Hangzhou,China"}]},{"given":"Tian","family":"Qiu","sequence":"additional","affiliation":[{"name":"Zhejiang University,College of Computer Science and Technology,Hangzhou,China"}]},{"given":"Jie","family":"Lei","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology,College of Computer Science and Technology,Hangzhou,China"}]},{"given":"Huiqiong","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University,Ningbo Innovation Center,Ningbo,China"}]},{"given":"Zhongle","family":"Xie","sequence":"additional","affiliation":[{"name":"Zhejiang University,Institute of Computing Innovation,Hangzhou,China"}]}],"member":"263","reference":[{"article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"ICLR","author":"Simonyan","key":"ref1"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR.2015.7298594","article-title":"Going deeper with convolutions","volume-title":"CVPR","author":"Szegedy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","year":"2017","author":"Howard","key":"ref5"},{"article-title":"Squeezenet: Alexnet-level accuracy with 50x fewer parameters and <0.5mb model size","year":"2016","author":"Iandola","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8070-3_17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"article-title":"Yolov3: An incremental improvement","year":"2018","author":"Redmon","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019384"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR52733.2024.01492","article-title":"Deepcache: Accelerating diffusion models for free","volume-title":"CVPR","author":"Ma"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19830-4_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01545"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/TPAMI.2023.3325230","article-title":"On exploring multiplicity of primitives and attributes for texture recognition in the wild","volume-title":"PAMI","author":"Zhai"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02332"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00221"},{"key":"ref19","first-page":"1","article-title":"Background activation suppression for weakly supervised object localization and semantic segmentation","volume-title":"IJCV","author":"Zhai"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1502.03167"},{"article-title":"Layer normalization","year":"2016","author":"Ba","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00745"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00060"},{"key":"ref26","article-title":"Vergleichende Lokalisationslehre der Grosshirnrinde in ihren Prinzipien dargestellt auf Grund des Zellenbaues","author":"Brodmann","year":"1909","journal-title":"Barth"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20071-7_7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1061\/9780784481523.208"},{"key":"ref29","first-page":"21702","article-title":"Llm-pruner: On the structural pruning of large language models","volume-title":"NeurIPS","author":"Ma"},{"key":"ref30","first-page":"1100","article-title":"Dataset distillation via factorization","volume-title":"NeurIPS","volume":"35","author":"Liu"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3226777"},{"article-title":"Locally free weight sharing for network width search","year":"2021","author":"Su","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/mice.12958"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2024.103980"},{"article-title":"Instance normalization: The missing ingredient for fast stylization","year":"2016","author":"Ulyanov","key":"ref35"},{"key":"ref36","article-title":"Attention: selective attention and consciousness","author":"Howe","year":"2010","journal-title":"Encyclopedia of consciousness"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.195"},{"article-title":"Auto-encoding variational bayes","year":"2013","author":"Kingma","key":"ref39"},{"article-title":"Gaussian error linear units (gelus)","year":"2016","author":"Hendrycks","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19941"},{"article-title":"Network in network","year":"2013","author":"Lin","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"article-title":"Lets keep it simple, using simple architectures to outperform deeper and more complex architectures","year":"2016","author":"HasanPour","key":"ref47"},{"article-title":"Efficientnetv2: Smaller models and faster training","volume-title":"ICML","author":"Tan","key":"ref48"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.1109\/TNNLS.2022.3158966","article-title":"Regnet: self-regulated network for image classification","volume-title":"TNNLS","author":"Xu"},{"article-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms","year":"2017","author":"Xiao","key":"ref51"},{"key":"ref52","article-title":"Learning multiple layers of features from tiny images","volume-title":"Master\u2019s thesis","author":"Krizhevsky","year":"2009"},{"article-title":"An analysis of single-layer networks in unsupervised feature learning","volume-title":"AISTATS","author":"Coates","key":"ref53"},{"article-title":"Matching networks for one shot learning","volume-title":"NeurIPS","author":"Vinyals","key":"ref54"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref55"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10649932.pdf?arnumber=10649932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T22:51:36Z","timestamp":1732747896000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10649932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10649932","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}