Alex Kot
Alex Kot
Verified email at ntu.edu.sg
Title
Cited by
Cited by
Year
Eigenfeature regularization and extraction in face recognition
X Jiang, B Mandal, A Kot
IEEE Transactions on Pattern Analysis and Machine Intelligence 30 (3), 383-394, 2008
3702008
Global context-aware attention lstm networks for 3d action recognition
J Liu, G Wang, P Hu, LY Duan, AC Kot
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017
3432017
Nonlinear dynamic system identification using Chebyshev functional link artificial neural networks
JC Patra, AC Kot
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 32 …, 2002
3192002
Quality measures of fingerprint images
LL Shen, A Kot, WM Koo
International Conference on Audio-and Video-Based Biometric Person …, 2001
2762001
Two-dimensional polar harmonic transforms for invariant image representation
PT Yap, X Jiang, AC Kot
IEEE Transactions on Pattern Analysis and Machine Intelligence 32 (7), 1259-1270, 2009
2622009
Distance-reciprocal distortion measure for binary document images
H Lu, AC Kot, YQ Shi
IEEE Signal Processing Letters 11 (2), 228-231, 2004
2532004
Dual attention matching network for context-aware feature sequence based person re-identification
J Si, H Zhang, CG Li, J Kuen, X Kong, AC Kot, G Wang
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
2472018
Skeleton-based human action recognition with global context-aware attention LSTM networks
J Liu, G Wang, LY Duan, K Abdiyeva, AC Kot
IEEE Transactions on Image Processing 27 (4), 1586-1599, 2017
2372017
Skeleton-based action recognition using spatio-temporal LSTM network with trust gates
J Liu, A Shahroudy, D Xu, AC Kot, G Wang
IEEE transactions on pattern analysis and machine intelligence 40 (12), 3007 …, 2017
2362017
Domain generalization with adversarial feature learning
H Li, SJ Pan, S Wang, AC Kot
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
1962018
Pattern-based data hiding for binary image authentication by connectivity-preserving
H Yang, AC Kot
IEEE Transactions on Multimedia 9 (3), 475-486, 2007
1832007
Accurate detection of demosaicing regularity for digital image forensics
H Cao, AC Kot
IEEE Transactions on Information Forensics and Security 4 (4), 899-910, 2009
1772009
No-reference image blur assessment based on discrete orthogonal moments
L Li, W Lin, X Wang, G Yang, K Bahrami, AC Kot
IEEE transactions on cybernetics 46 (1), 39-50, 2015
1742015
Ntu rgb+ d 120: A large-scale benchmark for 3d human activity understanding
J Liu, A Shahroudy, M Perez, G Wang, LY Duan, AC Kot
IEEE transactions on pattern analysis and machine intelligence 42 (10), 2684 …, 2019
1582019
Fingerprint reference-point detection
M Liu, X Jiang, AC Kot
EURASIP Journal on Advances in Signal Processing 2005 (4), 1-12, 2005
1472005
An intelligent pressure sensor using neural networks
JC Patra, AC Kot, G Panda
IEEE transactions on instrumentation and measurement 49 (4), 829-834, 2000
1442000
Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
H Yang, AC Kot
IEEE signal processing letters 13 (12), 741-744, 2006
1202006
A fast approach for no-reference image sharpness assessment based on maximum local variation
K Bahrami, AC Kot
IEEE Signal Processing Letters 21 (6), 751-755, 2014
1192014
Fingerprint retrieval for identification
X Jiang, M Liu, AC Kot
IEEE Transactions on Information Forensics and Security 1 (4), 532-542, 2006
1132006
Integer DCTs and fast algorithms
Y Zeng, L Cheng, G Bi, AC Kot
IEEE Transactions on Signal Processing 49 (11), 2774-2782, 2001
1132001
The system can't perform the operation now. Try again later.
Articles 1–20