Computer Science ›› 2020, Vol. 47 ›› Issue (6): 170-175.doi: 10.11896/jsjkx.190400052
• Computer Graphics & Multimedia • Previous Articles Next Articles
LIU Shu-jun, WEI Lai
CLC Number:
[1]JAIN K A,DUIN R P W,MAO J C.Statistical pattern recognition:a review[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2000,22(1):4-37. [2]DUDA R O,HART P E,STORK D G.Pattern Classification (2nd Edition)[M].Wiley,2001. [3]LI X L,TAO D C.Subspace Learning[J].Neurocomputing,2010,73(10):1539-1540. [4]CHENG H,VU K,HUA K A.SubSpace Projection:A unified framework for a class of partition-based dimension reduction techniques[M].Elsevier Science Inc.,2009. [5]VIDAL R.Subspace Clustering[J].Signal Processing Magazine IEEE,2011,28(2):52-68. [6]SAMARIA F S,HARTER A C.Parameterisation of a stochastic model for human face identification[C]//IEEE Workshop on Applications of Computer Vision.1994. [7]LEE K C,HO J,KRIEGMAN D J.Acquiring Linear Subspaces for Face Recognition under Variable Lighting[J].IEEE Tran-sactions on Pattern Analysis & Machine Intelligence,2005,27(5):684-698. [8]VIDAL R,MA Y,SASTRY S.Generalized principal component analysis (GPCA)[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2005,27(12):1945-1959. [9]MA Y,YANG A Y,FOSSUM D R.Estimation of Subspace Arrangements with Applications in Modeling and Segmenting Mixed Data[J].SIAM Review,2008,50(3):413-458. [10]LEONARDIS A,BISCHOF H,MAVER J.Multiple eigenspaces[J].Pattern Recognition,2002,35(11):2613-2627. [11]DERKSEN H,MA Y,HONG W,et al.Segmentation of multivariate mixed data via lossy coding and compression[C]//Visual Communications & Image Processing.International Society for Optics and Photonics,2007. [12]VIDAL R,FAVARO P.Low rank subspace clustering (LRSC)[J].Pattern Recognition Letters,2014,43(1):47-61. [13]PATEL V M,NGUYEN H V,VIDAL R.Latent Space Sparse Subspace Clustering[C]//IEEE International Conference on Computer Vision.IEEE,2014. [14]LU C,TANG J,LIN M,et al.Correntropy Induced L2 Graph for Robust Subspace Clustering[C]//IEEE International Conference on Computer Vision.IEEE Computer Society,2013. [15]YIN M,GAO J,LIN Z,et al.Dual Graph Regularized Latent Low-Rank Representation for Subspace Clustering[J].IEEE Transactions on Image Processing,2015,24(12):4918-4933. [16]SHI J,MALIK J.Normalized cuts and image segmentation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2000,22(8):888-905. [17]ELHAMIFAR E,VIDAL R.Sparse subspace clustering[C]// IEEE Conference on Computer Vision and Pattern Recognition(CVPR 2009).IEEE,2009:2790-2797. [18]ELHAMIFAR E,VIDAL R.Sparse Subspace Clustering:Algorithm,Theory,and Applications[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2013,35(11):2765-2781. [19]LIU G,LIN Z,YAN S,et al.Robust Recovery of Subspace Structures by Low-Rank Representation[J].IEEE Transactions on Software Engineering,2012,35(1):171-184. [20]LU C Y,MIN H,ZHAO Z Q,et al.Robust and Efficient Subspace Segmentation via Least Squares Regression[M]// Computer Vision(ECCV 2012).Berlin Heidelberg:Springer,2014:347-360. [21]HU H,LIN Z,FENG J,et al.Smooth Representation Clustering[C]//IEEE Conference on Computer Vision and Pattern Recognition.IEEE Computer Society,2014:3834-3841. [22]TANG K,LIU R,SU Z,et al.Structure-Constrained Low-Rank Representation[J].IEEE Transactions on Neural Networks & Learning Systems,2014,25(12):2167-2179. [23]RADOVANOVIC M,NANOPOULOS N,LVANOVIC M,et al.Hubs in Space:Popular Nearest Neighbors in High-Dimensional Data[J].Journal of Machine Learning Research,2010,11(5):2487-2531. [24]YANG J,QIAN J,LUO L,et al.Nuclear Norm based Matrix Regression with Applications to Face Recognition with Occlusion and Illumination Changes[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2014,39(1):156-171. [25]ANDERS H,ZHANG L,LIEVEN V,et al.Subspace system identification via weighted nuclear norm optimization[C]//2012 IEEE 51st Annual Conference on Decision and Control (CDC).2012. [26]RECHT B,FAZEL M,PARRILO P A.Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization[J].SIAM Review,2010,52(3):471-501. [27]RECHT B,XU W Y,HASSIBI B.Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization[C]//IEEE Conference on Decision and Control,2008.IEEE,2008:3065-3070. [28]SAMARIA F S,HARTER A C.Parameterisation of a stochastic model for human face identification[C]//IEEE Workshop on Applications of Computer Vision.1994. [29]LEE K C,HO J,KRIEGMAN D J.Acquiring Linear Subspaces for Face Recognition under Variable Lighting[J].IEEETran-sactions on Pattern Analysis & Machine Intelligence,2005,27(5):684-698. [30]MARTINEZ A M,BENAVENTE R.The AR Face Database [R].Barcelona:Centre de Visio per Computador Univeresit,1998. [31]HUANG J.The FERET database and evaluation procedure for face recognition[J].Image & Vision Computing J,1998,16(5):295-306. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171. |
[3] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[4] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[5] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[8] | ZHAO Zheng-peng, LI Jun-gang, PU Yuan-yuan. Low-light Image Enhancement Based on Retinex Theory by Convolutional Neural Network [J]. Computer Science, 2022, 49(6): 199-209. |
[9] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[10] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[11] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[12] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[13] | JI Ying-rui, YUAN Liang, ZHANG Yun-quan. Parallelization and Locality Optimization for Red-Black Gauss-Seidel Stencil [J]. Computer Science, 2022, 49(5): 363-370. |
[14] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[15] | TIAN Bing-chuan, TIAN Chen, ZHOU Yu-hang, CHEN Gui-hai, DOU Wan-chun. Reducing Head-of-Line Blocking on Network in Hadoop Clusters [J]. Computer Science, 2022, 49(3): 11-22. |
|