Eigenfeature regularization and extraction in face recognition X Jiang, B Mandal, A Kot IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (3), 383-394, 2008 | 367 | 2008 |
Global context-aware attention lstm networks for 3d action recognition J Liu, G Wang, P Hu, LY Duan, AC Kot Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017 | 325 | 2017 |
Nonlinear dynamic system identification using Chebyshev functional link artificial neural networks JC Patra, AC Kot IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 32 …, 2002 | 317 | 2002 |
Quality measures of fingerprint images LL Shen, A Kot, WM Koo International Conference on Audio-and Video-Based Biometric Person …, 2001 | 275 | 2001 |
Two-dimensional polar harmonic transforms for invariant image representation PT Yap, X Jiang, AC Kot IEEE Transactions on Pattern Analysis and Machine Intelligence 32 (7), 1259-1270, 2009 | 256 | 2009 |
Distance-reciprocal distortion measure for binary document images H Lu, AC Kot, YQ Shi IEEE Signal Processing Letters 11 (2), 228-231, 2004 | 250 | 2004 |
Dual attention matching network for context-aware feature sequence based person re-identification J Si, H Zhang, CG Li, J Kuen, X Kong, AC Kot, G Wang Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018 | 234 | 2018 |
Skeleton-based human action recognition with global context-aware attention LSTM networks J Liu, G Wang, LY Duan, K Abdiyeva, AC Kot IEEE Transactions on Image Processing 27 (4), 1586-1599, 2017 | 220 | 2017 |
Skeleton-based action recognition using spatio-temporal LSTM network with trust gates J Liu, A Shahroudy, D Xu, AC Kot, G Wang IEEE transactions on pattern analysis and machine intelligence 40 (12), 3007 …, 2017 | 220 | 2017 |
Pattern-based data hiding for binary image authentication by connectivity-preserving H Yang, AC Kot IEEE Transactions on Multimedia 9 (3), 475-486, 2007 | 182 | 2007 |
Accurate detection of demosaicing regularity for digital image forensics H Cao, AC Kot IEEE Transactions on Information Forensics and Security 4 (4), 899-910, 2009 | 175 | 2009 |
No-reference image blur assessment based on discrete orthogonal moments L Li, W Lin, X Wang, G Yang, K Bahrami, AC Kot IEEE transactions on cybernetics 46 (1), 39-50, 2015 | 171 | 2015 |
Domain generalization with adversarial feature learning H Li, SJ Pan, S Wang, AC Kot Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018 | 170 | 2018 |
Fingerprint reference-point detection M Liu, X Jiang, AC Kot EURASIP Journal on Advances in Signal Processing 2005 (4), 1-12, 2005 | 146 | 2005 |
An intelligent pressure sensor using neural networks JC Patra, AC Kot, G Panda IEEE transactions on instrumentation and measurement 49 (4), 829-834, 2000 | 143 | 2000 |
Ntu rgb+ d 120: A large-scale benchmark for 3d human activity understanding J Liu, A Shahroudy, M Perez, G Wang, LY Duan, AC Kot IEEE transactions on pattern analysis and machine intelligence 42 (10), 2684 …, 2019 | 132 | 2019 |
Binary image authentication with tampering localization by embedding cryptographic signature and block identifier H Yang, AC Kot IEEE signal processing letters 13 (12), 741-744, 2006 | 120 | 2006 |
A fast approach for no-reference image sharpness assessment based on maximum local variation K Bahrami, AC Kot IEEE Signal Processing Letters 21 (6), 751-755, 2014 | 116 | 2014 |
Fingerprint retrieval for identification X Jiang, M Liu, AC Kot IEEE Transactions on Information Forensics and Security 1 (4), 532-542, 2006 | 113 | 2006 |
Integer DCTs and fast algorithms Y Zeng, L Cheng, G Bi, AC Kot IEEE Transactions on Signal Processing 49 (11), 2774-2782, 2001 | 113 | 2001 |