Tensor-based anomaly detection: An interdisciplinary survey

H Fanaee-T, J Gama - Knowledge-based systems, 2016 - Elsevier
Traditional spectral-based methods such as PCA are popular for anomaly detection in a
variety of problems and domains. However, if data includes tensor (multiway) structure (eg …

A contemporary and comprehensive survey on streaming tensor decomposition

K Abed-Meraim, NL Trung… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Tensor decomposition has been demonstrated to be successful in a wide range of
applications, from neuroscience and wireless communications to social networks. In an …

Tensor methods in computer vision and deep learning

Y Panagakis, J Kossaifi, GG Chrysos… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Tensors, or multidimensional arrays, are data structures that can naturally represent visual
data of multiple dimensions. Inherently able to efficiently capture structured, latent semantic …

Sequence-dropout block for reducing overfitting problem in image classification

L Qian, L Hu, L Zhao, T Wang, R Jiang - IEEE Access, 2020 - ieeexplore.ieee.org
Overfitting is a common problem for computer vision applications It is a problem that when
training convolution neural networks and is caused by lack of training data or network …

Adaptive visual servoing with an uncalibrated camera using extreme learning machine and Q-leaning

M Kang, H Chen, J Dong - Neurocomputing, 2020 - Elsevier
In this paper, a novel image-based visual servoing (IBVS) method using Extreme Learning
Machine (ELM) and Q-learning is proposed to solve the problems of complex modeling and …

Weighted constraint based dictionary learning for image classification

Y Peng, L Li, S Liu, X Wang, J Li - Pattern Recognition Letters, 2020 - Elsevier
Dictionary learning (DL) is a popular approach of image classification. Most DL methods
ignore the information hidden in training samples or atoms, and thus cannot enhance the …

[PDF][PDF] Kinect-based gesture password recognition

MAM Shukran, MSB Ariffin - Australian Journal of Basic and Applied …, 2012 - cs.ucf.edu
Hand gesture password might be the most natural and intuitive way to communicate
between people and machines, since it closely mimics how human interact with each other …

Smoke recognition network based on dynamic characteristics

D Wang, S Luo, L Zhao, X Pan… - … Journal of Advanced …, 2020 - journals.sagepub.com
Fire is a fierce disaster, and smoke is the early signal of fire. Since such features as
chrominance, texture, and shape of smoke are very special, a lot of methods based on these …

A spatial-temporal iterative tensor decomposition technique for action and gesture recognition

Y Su, H Wang, P Jing, C Xu - Multimedia Tools and Applications, 2017 - Springer
Classification of video sequences is an important task with many applications in video
search and action recognition. As opposed to some traditional approaches that transform …

A Contemporary and Comprehensive Survey on Streaming Tensor Decomposition

N Linh-Trung - Authorea Preprints, 2023 - techrxiv.org
Tensor decomposition has been demonstrated to be successful in a wide range of
applications, from neuroscience and wireless communications to social networks. In an …