Ntu rgb+ d 120: A large-scale benchmark for 3d human activity understanding J Liu, A Shahroudy, M Perez, G Wang, LY Duan, AC Kot IEEE transactions on pattern analysis and machine intelligence 42 (10), 2684 …, 2019 | 1448 | 2019 |
Domain generalization with adversarial feature learning H Li, SJ Pan, S Wang, AC Kot Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 1366 | 2018 |
Global context-aware attention lstm networks for 3d action recognition J Liu, G Wang, P Hu, LY Duan, AC Kot Proceedings of the IEEE conference on computer vision and pattern …, 2017 | 769 | 2017 |
Skeleton-based human action recognition with global context-aware attention LSTM networks J Liu, G Wang, LY Duan, K Abdiyeva, AC Kot IEEE Transactions on Image Processing 27 (4), 1586-1599, 2017 | 615 | 2017 |
Skeleton-based action recognition using spatio-temporal LSTM network with trust gates J Liu, A Shahroudy, D Xu, AC Kot, G Wang IEEE transactions on pattern analysis and machine intelligence 40 (12), 3007 …, 2017 | 537 | 2017 |
Dual attention matching network for context-aware feature sequence based person re-identification J Si, H Zhang, CG Li, J Kuen, X Kong, AC Kot, G Wang Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 486 | 2018 |
Eigenfeature regularization and extraction in face recognition X Jiang, B Mandal, A Kot IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (3), 383-394, 2008 | 397 | 2008 |
Nonlinear dynamic system identification using Chebyshev functional link artificial neural networks JC Patra, AC Kot IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 32 …, 2002 | 388 | 2002 |
Two-dimensional polar harmonic transforms for invariant image representation PT Yap, X Jiang, AC Kot IEEE Transactions on Pattern Analysis and Machine Intelligence 32 (7), 1259-1270, 2009 | 341 | 2009 |
Low-light image enhancement with normalizing flow Y Wang, R Wan, W Yang, H Li, LP Chau, A Kot Proceedings of the AAAI conference on artificial intelligence 36 (3), 2604-2612, 2022 | 334 | 2022 |
Distance-reciprocal distortion measure for binary document images H Lu, AC Kot, YQ Shi IEEE Signal Processing Letters 11 (2), 228-231, 2004 | 302 | 2004 |
Quality measures of fingerprint images LL Shen, A Kot, WM Koo Audio-and Video-Based Biometric Person Authentication: Third International …, 2001 | 293 | 2001 |
Deep coupled resnet for low-resolution face recognition Z Lu, X Jiang, A Kot IEEE Signal Processing Letters 25 (4), 526-530, 2018 | 275 | 2018 |
No-reference image blur assessment based on discrete orthogonal moments L Li, W Lin, X Wang, G Yang, K Bahrami, AC Kot IEEE transactions on cybernetics 46 (1), 39-50, 2015 | 273 | 2015 |
Unsupervised domain adaptation for face anti-spoofing H Li, W Li, H Cao, S Wang, F Huang, AC Kot IEEE Transactions on Information Forensics and Security 13 (7), 1794-1809, 2018 | 260 | 2018 |
Multi-task mid-level feature alignment network for unsupervised cross-dataset person re-identification S Lin, H Li, CT Li, AC Kot arXiv preprint arXiv:1807.01440, 2018 | 228 | 2018 |
Accurate detection of demosaicing regularity for digital image forensics H Cao, AC Kot IEEE Transactions on Information Forensics and Security 4 (4), 899-910, 2009 | 224 | 2009 |
A fast approach for no-reference image sharpness assessment based on maximum local variation K Bahrami, AC Kot IEEE signal processing letters 21 (6), 751-755, 2014 | 198 | 2014 |
Pattern-based data hiding for binary image authentication by connectivity-preserving H Yang, AC Kot IEEE Transactions on multimedia 9 (3), 475-486, 2007 | 198 | 2007 |
Learning generalized deep feature representation for face anti-spoofing H Li, P He, S Wang, A Rocha, X Jiang, AC Kot IEEE Transactions on Information Forensics and Security 13 (10), 2639-2652, 2018 | 194 | 2018 |