Name
Affiliation
Papers
DANIEL S. YEUNG
South China University of Technology(South China University of Technology,South China Univ. of Technol.),Guangzhou,China
160
Collaborators
Citations 
PageRank 
172
1126
92.97
Referers 
Referees 
References 
2445
2666
1663
Search Limit
1001000
Title
Citations
PageRank
Year
Progressive editing with stacked Generative Adversarial Network for multiple facial attribute editing00.342022
Item Relationship Graph Neural Networks for E-Commerce00.342022
Weakly Supervised Semantic Segmentation with Patch-Based Metric Learning Enhancement00.342021
Class-Specific Affinity based Weakly Supervised Semantic Segmentation with Neutral Region Exploration00.342021
Distribution-based Adversarial Filter Feature Selection against Evasion Attack00.342021
Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact Map00.342020
Incremental Hash-Bit Learning for Semantic Image Retrieval in Nonstationary Environments.20.372019
Unsupervised Shilling Attack Detection Model Based on Rated Item Correlation Analysis00.342018
Shilling Attack Detection Using Rated Item Correlation For Collaborative Filtering00.342018
Bagging-boosting-based semi-supervised multi-hashing with query-adaptive re-ranking.60.412018
Sequential conditional entropy maximization semi-supervised hashing for semantic image retrieval40.382017
Adversarial Feature Selection Against Evasion Attacks.451.402016
Spam filtering for short messages in adversarial environment130.562015
Benefiting Feature Selection By The Discovery Of False Irrelevant Attributes00.342015
Two-phase mapping hashing.50.402015
Diversified Sensitivity-Based Undersampling for Imbalance Classification Problems.310.912015
Quantification of side-channel information leaks based on data complexity measures for web browsing.30.452015
An Improved Differential Evolution And Its Application To Determining Feature Weights In Similarity Based Clustering00.342013
Dynamic fusion method using Localized Generalization Error Model150.682012
Sparse LS-SVM two-steps model selection method10.372012
Empirical study on the architecture selection of RBFNN using L-GEM for multi-class problems.00.342011
Stock investment decision support for Hong Kong market using RBFNN based candlestick models.50.652011
3D Goods allocation in warehouse with L-GEM based 3-D RFID positioning.10.392011
Blind steganalysis with high generalization capability for different image databases using L-GEM.20.382011
Dynamic hierarchical semantic network based image retrieval using relevance feedback.00.342011
A novel method to reduce redundancy in adaptive threshold clustering key frame extraction systems.40.442011
Comparision of different classifiers in fault detection in microgrid.00.342011
Social relationship discovery and face annotation in personal photo collection.20.362011
A survey of the initialization of centers and widths in radial basis function network for classification.10.352011
A novel defend against good word attacks.10.362011
Multi-object tracking in video using Localized Generalization Error model based RBFNN.10.372011
A novel approach on control simulation using neural network ensemble00.342010
RFID indoor positioning using RBFNN with L-GEM30.462010
Shape-based image retrieval of Chinese paper-cutting using RBFNN with invariant moment00.342010
Construction of radial basis function neural networks via a minimization of its localized generalization error10.372010
Apply randomization in KNN to make the adversary harder to attack the classifier10.362010
Content-based image retrieval using color moment and Gabor texture feature311.382010
Moving average crossovers for short-term equity investment with L-GEM based RBFNN10.362010
Feature selection for blind steganalysis using localized generalization error model10.382010
Trademark classification by shape using ensemble of RBFNNs10.472010
Feature weighting based on L-GEM.10.362010
Empirical comparison of forward and backward search strategies in L-GEM based feature selection with RBFNN20.422010
Multiple classifier systems combined with localized generalization error for fault diagnosis of power transformers00.342010
RFID reader deployment using RBFNN with L-GEM10.392010
L-GEM based RBFNN for news anchorperson detection with Dominant Color Descriptor30.392010
2-Stage instance selection algorithm for KNN based on Nearest Unlike Neighbors00.342010
Chaos synchronization of two uncertain chaotic nonlinear gyros using rotary sliding mode control00.342010
Anti-spoofing system for RFID access control combining with face recogntion20.372010
Access control by RFID and face recognition based on neural network30.442010
Radial Basis Function network learning using localized generalization error bound230.762009
  • 1
  • 2