Robust principal component analysis based on maximum correntropy criterion R He, BG Hu, WS Zheng, XW Kong IEEE Transactions on Image Processing 20 (6), 1485-1494, 2011 | 390 | 2011 |
Two-stage nonnegative sparse representation for large-scale face recognition R He, WS Zheng, BG Hu, XW Kong IEEE transactions on neural networks and learning systems 24 (1), 35-46, 2012 | 151 | 2012 |
Nonnegative sparse coding for discriminative semi-supervised learning R He, WS Zheng, BG Hu, XW Kong CVPR 2011, 2849-2856, 2011 | 146 | 2011 |
A regularized correntropy framework for robust pattern recognition R He, WS Zheng, BG Hu, XW Kong Neural computation 23 (8), 2074-2100, 2011 | 136 | 2011 |
Part-based deep hashing for large-scale person re-identification F Zhu, X Kong, L Zheng, H Fu, Q Tian IEEE Transactions on Image Processing 26 (10), 4806-4817, 2017 | 110 | 2017 |
Unsupervised feature selection with ordinal locality J Guo, Y Guo, X Kong, R He 2017 IEEE international conference on multimedia and expo (ICME), 1213-1218, 2017 | 86 | 2017 |
Discriminative analysis dictionary learning J Guo, Y Guo, X Kong, M Zhang, R He Proceedings of the AAAI conference on artificial intelligence 30 (1), 2016 | 79 | 2016 |
Feature extraction via multi-view non-negative matrix factorization with local graph regularization Z Wang, X Kong, H Fu, M Li, Y Zhang 2015 IEEE International conference on image processing (ICIP), 3500-3504, 2015 | 77 | 2015 |
Detecting documents forged by printing and copying S Shang, N Memon, X Kong EURASIP Journal on Advances in Signal Processing 2014, 1-13, 2014 | 74 | 2014 |
Online latent semantic hashing for cross-media retrieval T Yao, G Wang, L Yan, X Kong, Q Su, C Zhang, Q Tian Pattern Recognition 89, 1-11, 2019 | 69 | 2019 |
Disrupting MIMO communications with optimal jamming signal design Q Liu, M Li, X Kong, N Zhao IEEE transactions on wireless communications 14 (10), 5313-5325, 2015 | 58 | 2015 |
Information security problem research based on game theory W Sun, X Kong, D He, X You 2008 International Symposium on Electronic Commerce and Security, 554-557, 2008 | 49 | 2008 |
Printer forensics based on page document's geometric distortion Y Wu, X Kong, Y Guo 2009 16th IEEE International Conference on Image Processing (ICIP), 2909-2912, 2009 | 47 | 2009 |
Object watermarks for digital images and video X Kong, Y Liu, H Liu, D Yang Image and Vision Computing 22 (8), 583-595, 2004 | 44 | 2004 |
Source camera identification forensics based on wavelet features B Wang, Y Guo, X Kong, F Meng 2009 Fifth International Conference on Intelligent Information Hiding and …, 2009 | 38 | 2009 |
Detecting image tampering using feature fusion P Zhang, X Kong 2009 International Conference on Availability, Reliability and Security, 335-340, 2009 | 37 | 2009 |
Semantic consistency hashing for cross-modal retrieval T Yao, X Kong, H Fu, Q Tian Neurocomputing 193, 250-259, 2016 | 36 | 2016 |
Discrete semantic alignment hashing for cross-media retrieval T Yao, X Kong, H Fu, Q Tian IEEE transactions on cybernetics 50 (12), 4896-4907, 2019 | 35 | 2019 |
Exploiting hierarchical activations of neural network for image retrieval Y Li, X Kong, L Zheng, Q Tian Proceedings of the 24th ACM international conference on Multimedia, 132-136, 2016 | 35 | 2016 |
Synthesis linear classifier based analysis dictionary learning for pattern classification J Wang, Y Guo, J Guo, M Li, X Kong Neurocomputing 238, 103-113, 2017 | 34 | 2017 |