Follow
Xiangwei Kong
Title
Cited by
Cited by
Year
Robust principal component analysis based on maximum correntropy criterion
R He, BG Hu, WS Zheng, XW Kong
IEEE Transactions on Image Processing 20 (6), 1485-1494, 2011
3732011
Two-stage nonnegative sparse representation for large-scale face recognition
R He, WS Zheng, BG Hu, XW Kong
IEEE transactions on neural networks and learning systems 24 (1), 35-46, 2012
1492012
Nonnegative sparse coding for discriminative semi-supervised learning
R He, WS Zheng, BG Hu, XW Kong
CVPR 2011, 2849-2856, 2011
1442011
A regularized correntropy framework for robust pattern recognition
R He, WS Zheng, BG Hu, XW Kong
Neural computation 23 (8), 2074-2100, 2011
1322011
Part-based deep hashing for large-scale person re-identification
F Zhu, X Kong, L Zheng, H Fu, Q Tian
IEEE Transactions on Image Processing 26 (10), 4806-4817, 2017
1072017
Unsupervised feature selection with ordinal locality
J Guo, Y Guo, X Kong, R He
2017 IEEE international conference on multimedia and expo (ICME), 1213-1218, 2017
832017
Discriminative analysis dictionary learning
J Guo, Y Guo, X Kong, M Zhang, R He
Proceedings of the AAAI conference on artificial intelligence 30 (1), 2016
772016
Feature extraction via multi-view non-negative matrix factorization with local graph regularization
Z Wang, X Kong, H Fu, M Li, Y Zhang
2015 IEEE International conference on image processing (ICIP), 3500-3504, 2015
682015
Detecting documents forged by printing and copying
S Shang, N Memon, X Kong
EURASIP Journal on Advances in Signal Processing 2014, 1-13, 2014
662014
Online latent semantic hashing for cross-media retrieval
T Yao, G Wang, L Yan, X Kong, Q Su, C Zhang, Q Tian
Pattern Recognition 89, 1-11, 2019
592019
Disrupting MIMO communications with optimal jamming signal design
Q Liu, M Li, X Kong, N Zhao
IEEE Transactions on Wireless Communications 14 (10), 5313-5325, 2015
532015
Information security problem research based on game theory
W Sun, X Kong, D He, X You
2008 International Symposium on Electronic Commerce and Security, 554-557, 2008
482008
Printer forensics based on page document's geometric distortion
Y Wu, X Kong, Y Guo
2009 16th IEEE International Conference on Image Processing (ICIP), 2909-2912, 2009
462009
Object watermarks for digital images and video
X Kong, Y Liu, H Liu, D Yang
Image and Vision Computing 22 (8), 583-595, 2004
442004
Source camera identification forensics based on wavelet features
B Wang, Y Guo, X Kong, F Meng
2009 Fifth International Conference on Intelligent Information Hiding and …, 2009
392009
Detecting image tampering using feature fusion
P Zhang, X Kong
2009 International Conference on Availability, Reliability and Security, 335-340, 2009
372009
Semantic consistency hashing for cross-modal retrieval
T Yao, X Kong, H Fu, Q Tian
Neurocomputing 193, 250-259, 2016
352016
Synthesis linear classifier based analysis dictionary learning for pattern classification
J Wang, Y Guo, J Guo, M Li, X Kong
Neurocomputing 238, 103-113, 2017
342017
Discrete semantic alignment hashing for cross-media retrieval
T Yao, X Kong, H Fu, Q Tian
IEEE transactions on cybernetics 50 (12), 4896-4907, 2019
322019
Efficient discrete supervised hashing for large-scale cross-modal retrieval
T Yao, Y Han, R Wang, X Kong, L Yan, H Fu, Q Tian
Neurocomputing 385, 358-367, 2020
292020
The system can't perform the operation now. Try again later.
Articles 1–20