[1] S. Niu, Q. Chen, D. Sisternes, et al, “Robust Noise Region-based Active Contour Model via Local Similarity Factor for Image Segmentation,” Pattern Recognition, Vol. 3, No. 61, pp. 104-119, 2016 [2] J. Y. Zhang, H. P. Zhao,S. Chen, “Face Recognition based on Weighted Local Binary Pattern with Adaptive Threshold,” Jounal of Electronics and Information Technology, Vol. 36, No. 6, pp. 1327-1333, 2014 [3] I. Naseem, R. Togneri,M. Bennamoun, “Linear Regression for Face Recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 32, No. 11, pp. 2106-2112, 2010 [4] A. Wagner, J. Wright, A. Ganesh, et al, “Toward a Practical Face Recognition System: Robust Alignment and Illumination by Sparse Representation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 34, No. 2, pp. 372-386, 2012 [5] W. Xiang, L. Zhang, Y. H. Chen, et al, “Single Image Super Resolution Combining with Structural Self-Similarity and Convolution Networks,” Journal of Computer Applications, Vol. 38, No. 3, pp. 854-858, 2018 [6] X. You, W. Xue, J. Lei, et al, “Single Image Super-Resolution with Non-Local Balanced Low-Rank Matrix Restoration,”IEEE Computer Society, pp. 1255-1260, 2016 [7] S. Liu, Z. Pan,H. Song, “Digital Image Watermarking Method based on DCT and Fractal Encoding,” IET Image Processing, Vol. 11, No. 10, pp. 815-821, 2017 [8] P. Ferrara and T. Bianchi, “Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts,” IEEE Transactions on Information Forensics and Security, Vol. 7, No. 5, pp. 1566-1577, 2012 [9] T. F. Long, W. L. Jiao, G. J. He,W. Wang, “Automatic Line Segment Registration using Gaussian Mixture Model and Expectation-Maximization Algorithm,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Vol. 7, No. 5, pp. 1688-1699, 2014 [10] S. Liu, “Introduction of Key Problems in Long-Distance Learning and Training,” Mobile Networks and Applications, Vol. 24, No. 1, pp. 1-4, 2019 [11] G. Gennarelli and F. Soldovieri, “Multipath Ghosts in Radar Imaging: Physical Insight and Mitigation Strategies,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Vol. 8, No. 3, pp. 1078-1086, 2014 [12] G. Yang and S. Liu, “Distributed Cooperative Algorithm for k-M Set with Negative Integer k by Fractal Symmetrical Property,” International Journal of Distributed Sensor Networks, Vol. 10, No. 5, 2014 [13] Y. Tu, Y. Lin, J. Wang,J. U. Kim, “Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification,” CMC-Computers Materials and Continua, Vol. 55, No. 2, pp. 243-254, 2018 [14] A. Kumar, R. Pooja,G. K. Singh, “Design and Performance of Closed form Method for Cosine Modulated Filter Bank using Different Windows Functions,” International Journal of Speech Technology, Vol. 17, No. 4, pp. 427-441, 2014 [15] Y. Lin, C. Wang, J. X. Wang,Z. Dou, “A Novel Dynamic Spectrum Access Framework based on Reinforcement Learning for Cognitive Radio Sensor Networks,” Sensors, Vol. 16, No. 10, pp. 1675, 2016 [16] M. Liu, S. Liu, W. Fu,J. T. Zhou, “Distributional Escape Time Algorithm based on Generalized Fractal Sets in Cloud Environment,” Chinese Journal of Electronics, Vol. 24, No. 1, pp. 124-127, 2015 [17] Q. Y. Tan, H. Leung, Y. Song, et al., “Multipath Ghost Suppression for Through-the-Wall-Radar,” IEEE Transactions on Aerospace and Electronic Systems, Vol. 50, No. 3, pp. 2284-2292, 2014 [18] S. W. Lyu, X. Y. Pan,X. Zhang, “Exposing Region Splicing Forgeries with Blind Local Noise Estimation,” International Journal of Computer Vision, Vol. 110, No. 2, pp. 202-221, 2014 [19] Y. Lin, X. Zhu, Z. Zheng, Z. Dou,R. L. Zhu, “The Individual Identification Method of Wireless Device based on Dimensionality Reduction and Machine Learning,” Journal of Supercomputing, Vol. 75, No. 6, pp. 3010-3027, 2019 |