


default search action
Pattern Recognition Letters, Volume 152
Volume 152, December 2021
- M. Gayathri, C. Malathy:

Novel framework for multimodal biometric image authentication using visual share neural network. 1-9 - Teng-Yue Han, Shaozhang Niu, Pengfei Wang

:
Multimodal-adaptive hierarchical network for multimedia sequential recommendation. 10-17 - Tingting Zhao, Ying Wang, Guixi Li

, Le Kong, Yarui Chen, Yuan Wang, Ning Xie, Jucheng Yang:
A model-based reinforcement learning method based on conditional generative adversarial networks. 18-25 - Gergely Kovács, Benedek Nagy, Béla Vizvári:

Weighted distances on the truncated hexagonal grid. 26-33 - Yujie Zhou, Jiefeng Long, Suping Xu

, Lin Shang:
Attribute-driven image captioning via soft-switch pointer. 34-41 - Ali Abbasian Ardakani

, Robert M. Kwee, Mohammad Mirza-Aghazadeh-Attari
, Horacio Matías Castro
, Taha Yusuf Kuzan
, Kübra Murzoglu Altintoprak, Giulia Besutti, Filippo Monelli
, Fariborz Faeghi, U. Rajendra Acharya
, Afshin Mohammadi:
A practical artificial intelligence system to diagnose COVID-19 using computed tomography: A multinational external validation study. 42-49 - Shenjian Gong, Shanshan Zhang, Jian Yang, Pong Chi Yuen:

Self-Fusion Convolutional Neural Networks. 50-55 - Tahira Ghani, B. John Oommen:

On utilizing 2D features from 3D scans to enhance the prediction of lung cancer survival rates. 56-62 - Nataliya Sokolovska, Yasser Mohseni Behbahani:

Vanishing boosted weights: A consistent algorithm to learn interpretable rules. 63-69 - Caichang Ding, Yiqin Chen, Zhiyuan Liu, Tianyin Liu:

Prediction on transmission trajectory of COVID-19 based on particle swarm algorithm. 70-78 - Yue Zhao, Lingming Zhang, Chongshi Yang, Yingyun Tan, Yang Liu

, Pengcheng Li, Tianhao Huang, Chenqiang Gao:
3D Dental model segmentation with graph attentional convolution network. 79-85 - Yongliang Zhang, Chenhao Gao, Zhiwei Li, Yufan Lv, Keyi Zhu:

A method of fingermark anti-counterfeiting for forensic document identification. 86-92 - Riaz Ahmad, Saeeda Naz, Imran Razzak

:
Efficient skew detection and correction in scanned document images through clustering of probabilistic hough transforms. 93-99 - Etuari Oram, Pandit Byomakesha Dash, Bighnaraj Naik, Janmenjoy Nayak, S. Vimal

, Sathees Kumar Nataraj
:
Light gradient boosting machine-based phishing webpage detection model using phisher website features of mimic URLs. 100-106 - Abd Errahmane Kiouche

, Hamida Seba, Karima Amrouche:
A maximum diversity-based path sparsification for geometric graph matching. 107-114 - Carmen Bisogni

, Lucia Cascone
, Aniello Castiglione, Ignazio Passero:
Deep learning for emotion driven user experiences. 115-121 - Ilyas Lahsaini, Mostafa El Habib Daho

, Mohamed Amine Chikh:
Deep transfer learning based classification model for covid-19 using chest CT-scans. 122-128 - Jie Zhao, Shikui Wei, Lixin Liao, Yao Zhao:

DQN-based gradual fisheye image rectification. 129-134 - Tanmay Jain, Shivakumara Palaiahnakote

, Umapada Pal, Cheng-Lin Liu:
Deformable scene text detection using harmonic features and modified pixel aggregation network. 135-142 - Briti Gangopadhyay

, Somnath Hazra
, Pallab Dasgupta:
Semi-lexical languages: a formal basis for using domain knowledge to resolve ambiguities in deep-learning based computer vision. 143-149 - Cameron Hodges, Mohammed Bennamoun

, Farid Boussaïd:
Quantitative performance evaluation of object detectors in hazy environments. 150-157 - Xiaofeng Li

, Yanwei Wang
, Yingjie Cai:
Automatic Annotation Algorithm of Medical Radiological Images using Convolutional Neural Network. 158-165 - Li Zhou

, Xiao Qu, Ting Zhang, Jianxin Wu, Hao Yin, Hongyan Guan, Yan Luo:
Prediction of pediatric activity intensity with wearable sensors and bi-directional LSTM models. 166-171 - Ashutosh Agrahari

, Pawan Singh
, Ankur Veer, Anshuman Singh
, Ankit Vidyarthi, Baseem Khan:
Prognosticating the effect on Unemployment rate in the post-pandemic India via Time-Series Forecasting and Least Squares Approximation. 172-179 - Yuhyun Shin

, Seung Jun Baek:
Hopfield-type neural ordinary differential equation for robust machine learning. 180-187 - Sunguk Shin

, Youngjoon Kim, Ji Won Yoon:
A new approach to training more interpretable model with additional segmentation. 188-194 - R. Sabitha, A. Aruna, S. Karthik, J. Shanthini:

Enhanced model for fake image detection (EMFID) using convolutional neural networks with histogram and wavelet based feature extractions. 195-201 - Chenrui Zhang, Ping Chen

, Tao Lei
, Hongying Meng
:
Triplet interactive attention network for cross-modality person re-identification. 202-209 - Zhineng Chen, Shuai Zhao, Kai Hu, Jing Han, Yuan Ji, Shaoping Ling, Xieping Gao:

A hierarchical and multi-view registration of serial histopathological images. 210-217 - Haider Mehraj

, D. Jayadevappa, Sulaima Lebbe Abdul Haleem
, Rehana Parveen, Abhishek Madduri, Maruthi Rohit Ayyagari, Dharmesh Dhabliya
:
Protection motivation theory using multi-factor authentication for providing security over social networking sites. 218-224 - Deepika Sharma, Arvind Selwal

:
FinPAD: State-of-the-art of fingerprint presentation attack detection mechanisms, taxonomy and future perspectives. 225-252 - Stefano Marrone

, Carlo Sansone
:
On the transferability of adversarial perturbation attacks against fingerprint based authentication systems. 253-259 - M. Ananthi

, P. Rajkumar, R. Sabitha, S. Karthik:
A secure model on Advanced Fake Image-Feature Network (AFIFN) based on deep learning for image forgery detection. 260-266 - Dingge Liang

, Marco Corneli, Charles Bouveyron, Pierre Latouche:
DeepLTRS: A deep latent recommender system based on user ratings and reviews. 267-274 - Pengfei Xia

, Hongjing Niu, Ziqiang Li
, Bin Li:
On the receptive field misalignment in CAM-based visual explanations. 275-282 - Mohammad Kamrul Hasan, Samar Kamil, Muhammad Shafiq

, Yuvaraj S.
, Eswaran Saravana Kumar
, Rajiv Vincent
, Nazmus Shaker Nafi:
An improved watermarking algorithm for robustness and imperceptibility of data protection in the perception layer of internet of things. 283-294 - T. S. Arulananth, Manickam Baskar

, V. Anbarasu, R. Thiagarajan, T. Rajendran
, Balaji A.
:
Multi party secure data access management in cloud using user centric block chain data encryption. 295-301 - Suting Chen, Zehua Cheng, Liangchen Zhang, Yujie Zheng:

SnipeDet: Attention-guided pyramidal prediction kernels for generic object detection. 302-310 - Mohamed Abdel-Basset, Hossam Hawash, Nour Moustafa, Osama M. Elkomy:

Two-Stage Deep Learning Framework for Discrimination between COVID-19 and Community-Acquired Pneumonia from Chest CT scans. 311-319 - Erwan Giry-Fouquet, Mathieu Fauvel, Clément Mallet:

Fast estimation for robust supervised classification with mixture models. 320-326 - B. Sarada

, M. Vinayaka Murthy, V. Udaya Rani:
Combined secure approach based on whale optimization to improve the data classification for data analytics. 327-332 - César González-Fernández, Alberto Fernández-Isabel, Isaac Martín de Diego

, Rubén R. Fernández, J. F. J. Viseu Pinheiro
:
Experts perception-based system to detect misinformation in health websites. 333-339 - Rajaraman P. V, Prakash Mohan

:
Intelligent deep learning based bidirectional long short term memory model for automated reply of e-mail client prototype. 340-347 - Gunasekaran Manogaran, Pethuraj Mohamed Shakeel, Burhanuddin Mohd Aboobaider, S. Baskar, Vijayalakshmi Saravanan, Rubén González Crespo

, Oscar Sanjuán Martínez:
ADC-CF: Adaptive deep concatenation coder framework for visual question answering. 348-355 - Kurunandan Jain

, Aravind Aji, Prabhakar Krishnan
:
Medical Image Encryption Scheme Using Multiple Chaotic Maps. 356-364 - Nan Luo, Yifeng Wang, Yun Gao, Yumin Tian, Quan Wang, Chuan Jing:

kNN-based feature learning network for semantic segmentation of point cloud data. 365-371 - Shunsuke Yoneda, Kouki Ueno, Go Irie, Masashi Nishiyama, Yoshio Iwai:

Joint object recognition and pose estimation using multiple-anchor triplet learning of canonical plane. 372-381 - Puneet Mangla, Vedant Singh, Shreyas Jayant Havaldar, Vineeth Balasubramanian:

On the benefits of defining vicinal distributions in latent space. 382-390 - Guillaume Renton

, Muhammet Balcilar, Pierre Héroux
, Benoit Gaüzère, Paul Honeine
, Sébastien Adam:
Symbols Detection and Classification using Graph Neural Networks. 391-397 - Wanxia Deng, Zhuo Su, Qiang Qiu, Lingjun Zhao, Gangyao Kuang, Matti Pietikäinen, Huaxin Xiao, Li Liu:

Deep ladder reconstruction-classification network for unsupervised domain adaptation. 398-405 - Salim Malek

, Silvia Rossi
:
Head pose estimation using facial-landmarks classification for children rehabilitation games. 406-412 - Angelos Nalmpantis, Nikolaos Passalis, Avraam Tsantekidis, Anastasios Tefas

:
Deep adaptive group-based input normalization for financial trading. 413-419 - Daoming Wan, Roozbeh Razavi-Far, Mehrdad Saif, Niloofar Mozafari

:
COLI: Collaborative clustering missing data imputation. 420-427 - M. Vijayakumar

, T. S. Shiny Angel:
Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models. 428-435

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














