1 |
杨璇. 我国大宗商品价格波动溢出效应研究——基于DAG和网络拓扑方法[D]. 广州:暨南大学, 2020:1.
|
|
YANG X. Volatility spillover effects of commodity sectors in China — on DAG and network topologic analysis methods[D]. Guangzhou: Jinan University, 2020:1.
|
2 |
中国物流与采购联合会. 大宗商品电子交易规范: [S]. 北京: 中国标准出版社, 2003:1-16. (China Federation of Logistics & Purchasing. Bulk stock electronic transaction specification: [S]. Beijing: Standards Press of China, 2003:1-16)
|
3 |
张武斌. ZC物流公司大宗商品物流服务质量提升策略研究[D]. 郑州:河南财经政法大学, 2020:2.
|
|
ZHANG W B. Research on the strategy of ZC logistics company’s bulk commodity logistics service quality improvement[D]. Zhengzhou: Henan University of Economics and Law, 2020:2.
|
4 |
LI X, HUANG G L, LI Q, et al. Detection and analysis of diamond fingerprinting feature and its application[J]. Journal of Physics: Conference Series, 2011, 277: No.012018. 10.1088/1742-6596/277/1/012018
|
5 |
MOREIRA D, BHARATI A, BROGAN J, et al. Image provenance analysis at scale[J]. IEEE Transactions on Image Processing, 2018, 27(12): 6109-6123. 10.1109/tip.2018.2865674
|
6 |
ARJOVSKY M, CHINTALA S, BOTTOU L. Wasserstein generative adversarial networks[C]// Proceedings of the 34th International Conference on Machine Learning. New York: JMLR.org, 2017: 214-223.
|
7 |
ALZAHRANI N, BULUSU N. Block-supply chain: a new anti-counterfeiting supply chain using NFC and block-chain[C]// Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. New York: ACM, 2018: 30-35. 10.1145/3211933.3211939
|
8 |
CAO Y, JIA F, MANOGARAN G. Efficient traceability systems of steel products using blockchain-based industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2020, 16(9): 6004-6012. 10.1109/tii.2019.2942211
|
9 |
TSAI Y S, CHEN R S, CHEN Y C, et al. An RFID-based manufacture process control and supply chain management in the semiconductor industry[J]. International Journal of Information Technology and Management, 2013, 12(1/2): 85-105. 10.1504/ijitm.2013.051633
|
10 |
VUKATANA K, SEVRANI K, HOXHA E. Wine traceability: a data model and prototype in Albanian context[J]. Foods, 2016, 5(1): No.11. 10.3390/foods5010011
|
11 |
叶云,胡月明,赵小娟,等. 基于改进动态扩展和位置服务的农产品追溯系统优化[J]. 农业工程学报, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039
|
|
YE Y, HU Y M, ZHAO X J, et al. Optimization for agricultural product traceability system based on dynamic expansion improvement and location based service[J]. Transaction of the Chinese Society of Agricultural Engineering, 2016, 32(13): 279-285. 10.11975/j.issn.1002-6819.2016.13.039
|
12 |
DENG J K, GUO J, XUE N N, et al. ArcFace: additive angular margin loss for deep face recognition[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 4685-4694. 10.1109/cvpr.2019.00482
|
13 |
NG P C, HENIKOFF S. SIFT: predicting amino acid changes that affect protein function[J]. Nucleic Acids Research, 2003, 31(13): 3812-3814. 10.1093/nar/gkg509
|
14 |
FENET S, RICHARD G, GRENIER Y. A scalable audio fingerprint method with robustness to pitch-shifting[C]// Proceedings of the 12th International Society for Music Information Retrieval Conference. [S.l.]: ISMIR, 2011:121-126. 10.1162/comj_r_00058
|
15 |
LEE S, YOO C D. Robust video fingerprinting for content-based video identification[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(7): 983-988. 10.1109/tcsvt.2008.920739
|
16 |
HARRIS C, STEPHENS M. A combined corner and edge detector[C]// Proceedings of the 1988 Alvey Vision Conference. [S.l.]: Alvety Vision Club, 1988: No.23. 10.5244/c.2.23
|
17 |
BAY H, TUYTELAARS T, van GOOL L. SURF: speeded up robust features[C]// Proceedings of the 2006 European Conference on Computer Vision, LNCS 3951. Berlin: Springer, 2006: 404-417.
|
18 |
GAO S H, CHENG M M, ZHAO K, et al. Res2Net: a new multi-scale backbone architecture[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2021, 43(2): 652-662. 10.1109/tpami.2019.2938758
|
19 |
DOSOVITSKIY A, BEYER L, KOLESNIKOV A, et al. An image is worth 16x16 words: Transformers for image recognition at scale[EB/OL]. (2021-06-03) [2022-03-22]..
|
20 |
BOCHKOVSKIY A, WANG C Y, LIAO H Y M. YOLOv4: optimal speed and accuracy of object detection[EB/OL]. (2020-04-23) [2022-03-20]..
|
21 |
LI Y J, CHEN Y C, JI X Y, et al. ScreenID: enhancing QRCode security by fingerprinting screens[C]// Proceedings of the 2021 IEEE Conference on Computer Communications. Piscataway: IEEE, 2021: 1-10. 10.1109/infocom42981.2021.9488859
|
22 |
JING H, PINCHIN J, HILL C, et al. Wi-Fi fingerprinting based on collaborative confidence level training[J]. Pervasive and Mobile Computing, 2016, 30: 32-44. 10.1016/j.pmcj.2015.10.005
|
23 |
PEI L, LIU J B, CHEN Y W, et al. Evaluation of fingerprinting-based WiFi indoor localization coexisted with Bluetooth[J]. The Journal of Global Positioning Systems, 2017, 15: No.3. 10.1186/s41445-017-0008-x
|
24 |
WU Y, AbdALMAGEED W, NATARAJAN P. ManTra-Net: manipulation tracing network for detection and localization of image forgeries with anomalous features[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway: IEEE, 2019: 9535-9544. 10.1109/cvpr.2019.00977
|
25 |
GKITSAS V, ZIOULIS N, ÁLVAREZ F, et al. Deep lighting environment map estimation from spherical panoramas[C]// Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops. Piscataway: IEEE, 2020: 2719-2728. 10.1109/cvprw50498.2020.00328
|