We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 344 results
  1. Subspace Discrimination for Multiway Data

    Sampled values of volumetric data are expressed as third-order tensors. Object-oriented data analysis requires us to process and analyse volumetric...

    Hayato Itoh, Atsushi Imiya in Journal of Mathematical Imaging and Vision
    Article 25 May 2024
  2. Multilinear subspace learning using handcrafted and deep features for face kinship verification in the wild

    In this paper, we propose a new multilinear and multiview subspace learning method called Tensor Cross-view Quadratic Discriminant Analysis for face...

    Mohcene Bessaoudi, Ammar Chouchane, ... Elhocine Boutellaa in Applied Intelligence
    Article 16 November 2020
  3. Hypergraph regularized low-rank tensor multi-view subspace clustering via L1 norm constraint

    In order to mine the manifold information in different views, a hypergraph regularized low-rank tensor multi-view subspace clustering via L1 norm...

    Guoqing Liu, Hongwei Ge, ... Shuangxi Wang in Applied Intelligence
    Article 01 December 2022
  4. Tensor Train Subspace Analysis for Classification of Hand Gestures with Surface EMG Signals

    Processing and classification of surface EMG signals is a challenging computational problem that has received increasing attention for at least two...
    Conference paper 2023
  5. A novel descriptor (LGBQ) based on Gabor filters

    Recently, many existing automatic facial verification methods have focused on learning the optimal distance measurements between facials. Especially...

    Rachid Aliradi, Abdelmalik Ouamane in Multimedia Tools and Applications
    Article 23 December 2023
  6. A new multidimensional discriminant representation for robust person re-identification

    Person Re-Identification (PRe-ID) or person retrieval is a challenging task of computer vision, aiming to identify a specific person across disjoint...

    Ammar Chouchane, Mohcene Bessaoudi, ... Abdelmalik Ouamane in Pattern Analysis and Applications
    Article 18 February 2023
  7. Multi-view subspace clustering with adaptive locally consistent graph regularization

    Graph regularization has shown its effectiveness in multi-view subspace clustering methods. Many multi-view subspace clustering methods based on...

    **aolan Liu, Gan Pan, Mengying **e in Neural Computing and Applications
    Article 05 June 2021
  8. Theories, algorithms and applications in tensor learning

    Due to the accelerated development and popularization of Internet, mobile Internet, and Internet of Things and the breakthrough of storage and...

    **aowu Deng, Yuanquan Shi, Dunhong Yao in Applied Intelligence
    Article 15 April 2023
  9. Learning multi-tasks with inconsistent labels by using auxiliary big task

    Multi-task learning is to improve the performance of the model by transferring and exploiting common knowledge among tasks. Existing MTL works mainly...

    Quan Feng, Songcan Chen in Frontiers of Computer Science
    Article 22 February 2023
  10. Adversarial Defense Mechanisms for Supervised Learning

    In this chapter we explore neural network architectures, implementations, cost analysis, and training processes using game theoretical adversarial...
    Aneesh Sreevallabh Chivukula, **nghao Yang, ... Wanlei Zhou in Adversarial Machine Learning
    Chapter 2023
  11. A classification method to detect faults in a rotating machinery based on kernelled support tensor machine and multilinear principal component analysis

    Rotatingmachinery is the main component of mechanical equipment. Nevertheless, due to variation of operating condition results in important detection...

    Chaofan Hu, Shuilong He, Yanxue Wang in Applied Intelligence
    Article 07 November 2020
  12. A machine learning approximation of the 2015 Portuguese high school student grades: A hybrid approach

    This article uses an anonymous 2014–15 school year dataset from the Directorate-General for Statistics of Education and Science (DGEEC) of the...

    Ricardo Costa-Mendes, Tiago Oliveira, ... Frederico Cruz-Jesus in Education and Information Technologies
    Article Open access 05 September 2020
  13. Canonical polyadic decomposition (CPD) of big tensors with low multilinear rank

    Tensor decomposition methods have been widely applied to big data analysis as they bring multiple modes and aspects of data to a unified framework,...

    Yichun Qiu, Guoxu Zhou, ... Andrzej Cichocki in Multimedia Tools and Applications
    Article 23 April 2020
  14. A Krylov-Schur-like method for computing the best rank-(r1,r2,r3) approximation of large and sparse tensors

    The paper is concerned with methods for computing the best low multilinear rank approximation of large and sparse tensors. Krylov-type methods have...

    Lars Eldén, Maryam Dehghan in Numerical Algorithms
    Article Open access 27 April 2022
  15. Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum \(i\mathcal {O}\)

    Indistinguishability Obfuscation \((i\mathcal {O})\)...
    Aayush Jain, Huijia Lin, ... Amit Sahai in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  16. Multimodal 2d + 3d multi-descriptor tensor for face verification

    In the last few years, there is a growing interest in multilinear subspace learning for dimensionality reduction of multidimensional data. In this...

    Adel Saoud, Abdelmalik Oumane, ... Abdelmalik Taleb-Ahmed in Multimedia Tools and Applications
    Article 05 June 2020
  17. Deep Learning

    Machine learning techniques have always played an important and often central role in the development of computer vision algorithms.
    Richard Szeliski in Computer Vision
    Chapter 2022
  18. Adaptive graph regularized non-negative Tucker decomposition for multiway dimensionality reduction

    Non-negative Tucker decomposition (NTD) is a powerful tool for data representation to capture rich internal structure information from non-negative...

    Dai Chen, Guoxu Zhou, ... Yuyuan Yu in Multimedia Tools and Applications
    Article 24 June 2023
  19. Towards efficient and accurate approximation: tensor decomposition based on randomized block Krylov iteration

    Tensor decomposition methods are inefficient when dealing with low-rank approximation of large-scale data. Randomized tensor decomposition has...

    Yichun Qiu, Weijun Sun, ... Qibin Zhao in Signal, Image and Video Processing
    Article 15 June 2024
  20. Continual learning classification method and its application to equipment fault diagnosis

    Classification methods play a significant role in the fault diagnosis field. However, they cannot effectively recognize new types of fault data and...

    Dong Li, Shulin Liu, ... **n Sun in Applied Intelligence
    Article 12 May 2021
Did you find what you were looking for? Share feedback.