UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-10 of 12 Help

Filters                                
Selected(0)Clear Items/Page:    Sort:
Feature mapping of multiple beamformed sources for robust overlapping speech recognition using a microphone array Journal article
IEEE/ACM Transactions on Audio Speech and Language Processing, 2014,Volume: 22,Issue: 12,Page: 2244-2255
Authors:  Li W.;  Wang L.;  Zhou Y.;  Dines J.;  Magimai-Doss M.;  Bourlard H.;  Liao Q.
Favorite |  | TC[WOS]:7 TC[Scopus]:8 | Submit date:2018/12/21
Beamforming  Microphone Array  Neural Network  Speech Recognition  Speech Separation  
2D Sine Logistic modulation map for image encryption Journal article
Information Sciences, 2014,Volume: 297,Page: 80
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:310 TC[Scopus]:331 | Submit date:2018/10/30
2d Sine Logistic Modulation Map  Chaotic Magic Transform  Image Encryption  
Cascade Chaotic System with Applications Journal article
IEEE Transactions on Cybernetics, 2014,Volume: 45,Issue: 9,Page: 2001
Authors:  Zhou Y.;  Hua Z.;  Pun C.-M.;  Philip Chen C.L.
Favorite |  | TC[WOS]:110 TC[Scopus]:134 | Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
A symmetric image cipher using wave perturbations Journal article
Signal Processing, 2014,Volume: 102,Page: 122-131
Authors:  Wu Y.;  Zhou Y.;  Agaian S.;  Noonan J.P.
Favorite |  | TC[WOS]:24 TC[Scopus]:24 | Submit date:2018/12/21
Data Protection  Image Shuffling  Symmetric Image Cipher  Wave Perturbation  
Generalized Weber-face for illumination-robust face recognition Journal article
Neurocomputing, 2014,Volume: 136,Page: 262
Authors:  Wu Y.;  Jiang Y.;  Zhou Y.;  Li W.;  Lu Z.;  Liao Q.
Favorite |  | TC[WOS]:45 TC[Scopus]:47 | Submit date:2018/10/30
Face Recognition  Illumination Insensitive Representation  Multi-scale Information  Weber-face  
Extreme learning machine for ranking: Generalization analysis and applications Journal article
Neural Networks, 2014,Volume: 53,Page: 119
Authors:  Chen H.;  Peng J.;  Zhou Y.;  Li L.;  Pan Z.
Favorite |  | TC[WOS]:43 TC[Scopus]:47 | Submit date:2018/10/30
Coefficient Regularization  Extreme Learning Machine  Generalization Bound  Learning Theory  Ranking  
Automatic image segmentation using salient key point extraction and star shape prior Journal article
Signal Processing, 2014,Volume: 105,Page: 122-136
Authors:  Liao X.;  Xu H.;  Zhou Y.;  Li K.;  Tao W.;  Guo Q.;  Liu L.
Favorite |  | TC[WOS]:9 TC[Scopus]:12 | Submit date:2018/12/21
Affinity Propagation Cluster  Graph Cut  Salient Point  Star Shape Prior  Unsupervised Image Segmentation  
Integration of the saliency-based seed extraction and random walks for image segmentation Journal article
Neurocomputing, 2014,Volume: 129,Page: 378
Authors:  Qin C.;  Zhang G.;  Zhou Y.;  Tao W.;  Cao Z.
Favorite |  | TC[WOS]:46 TC[Scopus]:52 | Submit date:2018/10/30
Automatic Image Segmentation  Random Walks  Saliency Estimation  Superpixels  
Discrete wheel-switching chaotic system and applications Journal article
IEEE Transactions on Circuits and Systems I: Regular Papers, 2014,Volume: 61,Issue: 12,Page: 3469
Authors:  Wu Y.;  Zhou Y.;  Bao L.
Favorite |  | TC[WOS]:29 TC[Scopus]:34 | Submit date:2018/10/30
Chaotic System  Fpga  Pseudo-random Number Generator  
Design of image cipher using latin squares Journal article
Information Sciences, 2014,Volume: 264,Page: 317
Authors:  Wu Y.;  Zhou Y.;  Noonan J.P.;  Agaian S.
Favorite |  | TC[WOS]:90 TC[Scopus]:97 | Submit date:2018/10/30
Confusion-diffusion  Error Tolerance  Image Encryption  Latin Square  Substitution-permutation Network