UM

Browse/Search Results:  1-10 of 22 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
A constrained least squares regression model Journal article
Information Sciences, 2018,Volume: 429,Page: 247-259
Authors:  Yuan, Haoliang;  Zheng, Junjie;  Lai, Loi Lei;  Tang, Yuan Yan
Favorite  |  View/Download:17/0  |  Submit date:2018/10/30
Least Squares Regression  Soft Target Label  Multicategory Classification  
Reversible data-hiding in encrypted images by redundant space transfer Journal article
Information Sciences, 2017,Volume: 433,Page: 188-203
Authors:  Zi-Long Liu;  Chi-Man Pun
Favorite  |  View/Download:5/0  |  Submit date:2019/07/30
Reversible Data Hiding  Encrypted Image  Redundant Space Transfer  
Some novel approaches on state estimation of delayed neural networks Journal article
Information Sciences, 2016,Volume: 372,Page: 313-331
Authors:  Kaibo Shi;  Xinzhi Liu;  Yuanyan Tang;  Hong Zhu;  Shouming Zhong
Favorite  |  View/Download:11/0  |  Submit date:2018/10/30
Delay-partition Approach  Linear Matrix Inequalities (Lmis)  Neural Networks  State Estimation  Time-varying Delay  
A novel forecasting method based on multi-order fuzzy time series and technical analysis Journal article
Information Sciences, 2016,Volume: 367-368,Page: 41-57
Authors:  Ye F.;  Zhang L.;  Zhang D.;  Fujita H.;  Gong Z.
Favorite  |  View/Download:9/0  |  Submit date:2019/02/12
Financial Forecasting  Fuzzy Time Series  Genetic Algorithm  Technical Analysis  
A robust bi-sparsity model with non-local regularization for mixed noise reduction Journal article
Information Sciences, 2016,Volume: 354,Page: 101-111
Authors:  Chen L.;  Liu L.;  Philip Chen C.L.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/11
Bi-sparsity Model  Mixed Noise Reduction  Non-local Regularization  Sparse Representation  
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite  |  View/Download:10/0  |  Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
An efficient image segmentation method based on a hybrid particle swarm algorithm with learning strategy Journal article
Information Sciences, 2016,Volume: 369,Page: 500-521
Authors:  Gao H.;  Pun C.-M.;  Kwong S.
Favorite  |  View/Download:7/0  |  Submit date:2019/02/14
Exchange Method  Learning Item  Particle Swarm Optimization  Threshold Image Segmentation  
Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy-Move Forgery Detection Journal article
Information Sciences, 2016,Volume: 345,Page: 226-242
Authors:  Bi X.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/14
Color Texture Descriptor  Copy-move Forgery Detection (Cmfd)  Hierarchical Feature Matching  Invariant Moment Descriptor  Multi-level Dense Descriptor (Mldd)  
2D Sudoku associated bijections for image scrambling Journal article
Information Sciences, 2016,Volume: 327,Page: 91-109
Authors:  Wu Y.;  Zhou Y.;  Agaian S.;  Noonan J.P.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/21
Image Scrambling  Matrix Element Representation  Sudoku Matrix  Two Dimensional Bijection  
Image encryption using 2D Logistic-adjusted-Sine map Journal article
Information Sciences, 2016,Volume: 339,Page: 237
Authors:  Hua Z.;  Zhou Y.
Favorite  |  View/Download:7/0  |  Submit date:2018/10/30
Chaotic Encryption  Chaotic Map  Confusion And Diffusion  Image Encryption