default search action
Anni Cai
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j12]Jie Shao, Leiquan Wang, Zhicheng Zhao, Fei Su, Anni Cai:
Deep canonical correlation analysis with progressive and hypergraph learning for cross-modal retrieval. Neurocomputing 214: 618-628 (2016) - [j11]Yan Hua, Shuhui Wang, Siyuan Liu, Anni Cai, Qingming Huang:
Cross-Modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation. IEEE Trans. Multim. 18(6): 1201-1216 (2016) - [j10]Yan Hua, Shuhui Wang, Siyuan Liu, Anni Cai, Qingming Huang:
Corrections to "Cross-Modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation". IEEE Trans. Multim. 18(10): 2127 (2016) - [c65]Wenhui Jiang, Zhicheng Zhao, Fei Su, Anni Cai:
ALADDIN: A locality aligned deep model for instance search. ICASSP 2016: 2727-2731 - 2015
- [j9]Yan Hua, Meng Yang, Zhi-Cheng Zhao, Renlai Zhou, Anni Cai:
On semantic-instructed attention: From video eye-tracking dataset to memory-guided probabilistic saliency model. Neurocomputing 168: 917-929 (2015) - [j8]Kai Liu, Zhi-Cheng Zhao, Anni Cai:
Datum-Adaptive Local Metric Learning for Person Re-identification. IEEE Signal Process. Lett. 22(9): 1457-1461 (2015) - [c64]Yan Hua, Hu Tian, Anni Cai, Ping Shi:
Cross-modal correlation learning with deep convolutional architecture. VCIP 2015: 1-4 - 2014
- [j7]Zan Gao, Longfei Zhang, Ming-yu Chen, Alexander G. Hauptmann, Hua Zhang, An-Ni Cai:
Enhanced and hierarchical structure algorithm for data imbalance problem in semantic extraction under massive video dataset. Multim. Tools Appl. 68(3): 641-657 (2014) - [c63]Tao Liu, Anni Cai:
Image semantic segmentation with a novel stochastic model. CCIS 2014: 405-409 - [c62]Yan Hua, Shuhui Wang, Siyuan Liu, Qingming Huang, Anni Cai:
TINA: Cross-Modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation. ICDM 2014: 190-199 - [c61]Hu Tian, Bojin Zhuang, Yan Hua, Anni Cai:
Depth extraction from a single image by sampling based on distance metric learning. ICIP 2014: 2017-2021 - [c60]Yan Hua, Shuhui Wang, Zhi-Cheng Zhao, Qingming Huang, Anni Cai:
Cross modal metric learning with multi-level semantic relevance. ICIP 2014: 3092-3096 - [c59]Yan Hua, Jie Shao, Hu Tian, Zhi-Cheng Zhao, Fei Su, Anni Cai:
An output aggregation system for large scale cross-modal retrieval. ICME Workshops 2014: 1-6 - [c58]Bohuai Yao, Zhi-Cheng Zhao, Kai Liu, Anni Cai:
Bagging based metric learning for person re-identification. ICME 2014: 1-6 - [c57]Kai Liu, Zhi-Cheng Zhao, Anni Cai:
Parametric Local Multi-modal Metric Learning for Person Re-identification. ICPR 2014: 2578-2583 - [c56]Yuanbo Chen, Yanyun Zhao, Bojin Zhuang, Anni Cai:
Discriminative multi-modality non-negative sparse graph model for action recognition. VCIP 2014: 53-56 - [c55]Hu Tian, Bojin Zhuang, Yan Hua, Anni Cai:
Depth inference with convolutional neural network. VCIP 2014: 169-172 - 2013
- [j6]Jingjing Si, Kai Liu, Bojin Zhuang, Anni Cai:
Variable-Rate Linear Broadcasts Realized with a Single-Rate Strict Linear Broadcast. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 1999-2006 (2013) - [c54]Xin Guo, Dong Liu, Brendan Jou, Mojun Zhu, Anni Cai, Shih-Fu Chang:
Robust Object Co-detection. CVPR 2013: 3206-3213 - [c53]Kai Liu, Xin Guo, Zhi-Cheng Zhao, Anni Cai:
Person re-identification using matrix completion. ICIP 2013: 3098-3102 - [c52]Yuanbo Chen, Zhixuan Li, Xin Guo, Yanyun Zhao, Anni Cai:
A spatio-temporal interest point detector based on vorticity for action recognition. ICME Workshops 2013: 1-6 - [c51]Yan Hua, Zhi-Cheng Zhao, Hu Tian, Xin Guo, Anni Cai:
A probabilistic saliency model with memory-guided top-down cues for free-viewing. ICME 2013: 1-6 - [c50]Yuanbo Chen, Yanyun Zhao, Anni Cai:
Recognizing human actions based on Sparse Coding with Non-negative and Locality constraints. VCIP 2013: 1-6 - [c49]Mei Jiang, Yuyang Chen, Yanyun Zhao, Anni Cai:
A real-time fall detection system based on HMM and RVM. VCIP 2013: 1-6 - [c48]Kai Liu, Zhi-Cheng Zhao, Xin Guo, Anni Cai:
Anchor-supported multi-modality hashing embedding for person re-identification. VCIP 2013: 1-6 - [c47]Hu Tian, Bojin Zhuang, Yan Hua, Yanyun Zhao, Anni Cai:
Recovering depth of background and foreground from a monocular video with camera motion. VCIP 2013: 1-6 - [c46]Chengde Wan, Zhi-Cheng Zhao, Xin Guo, Anni Cai:
Tree-based Shape Descriptor for scalable logo detection. VCIP 2013: 1-6 - 2012
- [c45]Baoxi Yuan, Fei Su, Anni Cai:
Fingerprint retrieval approach based on novel minutiae triplet features. BTAS 2012: 170-175 - [c44]Xin Guo, Zhi-Cheng Zhao, Anni Cai:
Supervised sparse representation with coefficients' group constraint. BTAS 2012: 183-188 - [c43]Xin Guo, Zhicheng Zhao, Yuanbo Chen, Anni Cai:
An improved system for concept-based video retrieval. IC-NIDC 2012: 391-395 - [c42]Yuyang Chen, Yanyun Zhao, Anni Cai:
A robust moving object segmentation algorithm using integrated mask-based background maintenance. IC-NIDC 2012: 416-419 - [c41]Pengxiang Zhao, Yanyun Zhao, Anni Cai:
Hierarchical codebook background model using haar-like features. IC-NIDC 2012: 438-442 - [c40]Xin Guo, Zhi-Cheng Zhao, Anni Cai:
Find dominant bins of a histogram by sparse representation. ICPR 2012: 3038-3041 - [c39]Zhicheng Zhao, Yanyun Zhao, Yan Hua, Wen Wang, Decheng Wan, Guoli Jia, Zhixuan Li, Fei Su, Anni Cai:
BUPT-MCPRL at TRECVID 2012. TRECVID 2012 - 2011
- [c38]Shizheng Wang, Jianwei Yang, Yanyun Zhao, Anni Cai, Stan Z. Li:
A surveillance video analysis and storage scheme for scalable synopsis browsing. ICCV Workshops 2011: 1947-1954 - [c37]Zhicheng Zhao, Yanyun Zhao, Xin Guo, Yuanbo Chen, Yan Hua, Wen Wang, Cheng Liu, Siyuan Wu, Han Zhang, Lingxi Wang, Yuanhui Mao, Anni Cai, Menghua Zhai:
BUPT-MCPRL at TRECVID 2011. TRECVID 2011 - 2010
- [j5]Zan Gao, Marcin Detyniecki, Ming-yu Chen, Alexander G. Hauptmann, Howard D. Wactlar, Anni Cai:
The Application of Spatio-temporal Feature and Multi-Sensor in Home Medical Devices. J. Digit. Content Technol. its Appl. 4(7): 69-78 (2010) - [c36]Fei Su, Liwen Xia, Anni Cai, Junshui Ma:
A dual-biometric-modality identification system based on fingerprint and EEG. BTAS 2010: 1-6 - [c35]Zan Gao, Ming-yu Chen, Alexander G. Hauptmann, Anni Cai:
Comparing Evaluation Protocols on the KTH Dataset. HBU 2010: 88-100 - [c34]Fei Su, Liwen Xia, Anni Cai, Yibing Wu, Junshui Ma:
EEG-based Personal Identification: from Proof-of-Concept to A Practical System. ICPR 2010: 3728-3731 - [c33]Muhammad Shoaib, Anni Cai:
Efficient residual prediction with error concealment in extended spatial scalability. ISCC 2010: 985-991 - [c32]Muhammad Waheed, Anni Cai:
Low complexity algorithms for transmit antenna selection in cognitive MIMO system. LCN 2010: 847-850 - [c31]Jianguo Lu, Anni Cai, Lili Li:
A Detection-Aided Multi-target Tracking Algorithm. MVHI 2010: 580-583 - [c30]Zan Gao, Ming-yu Chen, Marcin Detyniecki, Wen Wu, Alexander G. Hauptmann, Howard D. Wactlar, Anni Cai:
Multi-camera Monitoring of Infusion Pump Use. ICSC 2010: 105-111 - [c29]Fei Su, Liwen Xia, Anni Cai, Junshui Ma:
Evaluation of recording factors in EEG-based personal identification: A vital step in real implementations. SMC 2010: 3861-3866 - [c28]Jun Yi, Fei Su, Anni Cai:
A hybrid RABWC-STF method for eye-blink removal from EEG. SMC 2010: 4288-4294 - [c27]Xin Guo, Yuanbo Chen, Wei Liu, Yuanhui Mao, Han Zhang, Kang Zhou, Lingxi Wang, Hua Yan, Zhi-Cheng Zhao, Yanyun Zhao, Anni Cai:
BUPT-MCPRL at TRECVID 2010. TRECVID 2010 - [c26]Muhammad Shoaib, Anni Cai:
Efficient residual prediction with error concealment in extended spatial scalability. WTS 2010: 1-6
2000 – 2009
- 2009
- [c25]Quan Feng, Fei Su, Anni Cai:
Encrypted Fuzzy Vault Based on Fingerprint. IAS 2009: 137-140 - [c24]Muhammad Waheed, Anni Cai:
Evolutionary algorithms for radio resource management in cognitive radio network. IPCCC 2009: 431-436 - [c23]Jingjing Si, Bojin Zhuang, Anni Cai, Yinbo Cheng:
Layered Network Coding and Hierarchical Network Coding for Peer-to-Peer Streaming. PACCS 2009: 139-142 - [c22]Zhicheng Zhao, Yanyun Zhao, Zan Gao, Xiaoming Nan, Mei Mei, Hui Zhang, Heng Chen, Xu Peng, Yuanbo Chen, Junfang Guo, Anni Cai:
BUPT-MCPRL at TRECVID 2009. TRECVID 2009 - 2008
- [j4]Yubin Cui, Anni Cai:
Efficient Macroblock Mode Derivation in ESS Based on Local Characteristics of Video Objects. IEEE Signal Process. Lett. 15: 333-336 (2008) - [c21]Quan Feng, Fei Su, Anni Cai, Feifei Zhao:
Cracking Cancelable Fingerprint Template of Ratha. ISCSCT (2) 2008: 572-575 - [c20]Zan Gao, Zhi-Cheng Zhao, Tao Liu, Xiaoming Nan, Mei Mei, Bin Zhang, Xiaodan Liu, Xu Peng, Hui Zheng, Yanyun Zhao, Anni Cai:
BUPT at TRECVID 2008. TRECVID 2008 - 2007
- [j3]Jianrong Cao, Anni Cai:
A robust shot transition detection method based on support vector machine in compressed domain. Pattern Recognit. Lett. 28(12): 1534-1540 (2007) - [c19]Zhi-Cheng Zhao, An-Ni Cai:
Extraction of Semantic Keyframes Based on Visual Attention and Affective Models. CIS 2007: 371-375 - [c18]Zhi-Cheng Zhao, An-Ni Cai:
Selective Extraction of Visual Saliency Objects in Images and Videos. IIH-MSP 2007: 198-201 - [c17]Yubin Cui, Bojin Zhuang, Anni Cai:
MB-Activity Measure Based Slice Grouping and Unequal Error Protection for H.264/AVC Video Transmission over Wireless Networks. IIH-MSP 2007: 383-386 - [c16]Zhi-Cheng Zhao, Xing Zeng, Tao Liu, An-Ni Cai:
BUPT at TRECVID 2007: Shot Boundary Detection. TRECVID 2007 - 2006
- [j2]Jianjiang Feng, Zhengyu Ouyang, Anni Cai:
Fingerprint matching using ridges. Pattern Recognit. 39(11): 2131-2140 (2006) - [c15]Xiaohui Xie, Fei Su, Anni Cai:
Ridge-Based Fingerprint Recognition. ICB 2006: 273-279 - [c14]Zhi-Cheng Zhao, An-Ni Cai:
Shot Boundary Detection Algorithm in Compressed Domain Based on Adaboost and Fuzzy Theory. ICNC (2) 2006: 617-626 - [c13]Dequn Zhao, Fei Su, Anni Cai:
Fingerprint Registration Using Minutia Clusters and Centroid Structure 1. ICPR (4) 2006: 413-416 - [c12]Zhengyu Ouyang, Jianjiang Feng, Fei Su, Anni Cai:
Fingerprint Matching With Rotation-Descriptor Texture Features. ICPR (4) 2006: 417-420 - [c11]Jianjiang Feng, Anni Cai:
Fingerprint Indexing Using Ridge Invariants. ICPR (4) 2006: 433-436 - [c10]Jianjiang Feng, Anni Cai:
Fingerprint Representation and Matching in Ridge Coordinate System. ICPR (4) 2006: 485-488 - 2005
- [c9]YuFeng Ma, Anni Cai:
A sequential error concealment technique based on spiral recovery order. ICIP (2) 2005: 1030-1033 - [c8]Jianjiang Feng, Zhengyu Ouyang, Fei Su, Anni Cai:
An Exact Ridge Matching Algorithm for Fingerprint Verification. IWBRS 2005: 103-110 - 2004
- [c7]Xiaohui Xie, Fei Su, Anni Cai, Jingao Sun:
A Robust Fingerprint Minutiae Matching Algorithm Based on the Support Model. ICBA 2004: 316-323 - [c6]Weishi Qi, Anni Cai, Jingao Sun:
On-line measurement based admission control on VBR video servers. ISMSE 2004: 60-64 - [c5]YuFeng Ma, Anni Cai:
A new spatial interpolation method for error concealment. ISMSE 2004: 65-69 - [c4]Fei Su, Anni Cai:
An Adaptive Fingerprint Post-processing Algorithm Based on Mathematical Morphology. SINOBIOMETRICS 2004: 405-413 - [c3]Jianjiang Feng, Fei Su, Anni Cai:
Robust Ridge Following in Fingerprints. SINOBIOMETRICS 2004: 424-431 - [c2]Dequn Zhao, Fei Su, Anni Cai:
A Hierarchical Fingerprint Matching Method Based on Rotation Invariant Features. SINOBIOMETRICS 2004: 498-505 - 2000
- [c1]Kewei Shi, Anni Cai, Jingao Sun:
Content-based rate control for low-bit-rate video applications. VCIP 2000: 527-532
1990 – 1999
- 1993
- [j1]Yongjun He, Anni Cai, Jingao Sun:
Incremental backprojection algorithm: modification of the searching flow scheme and utilization of the relationship among projection views. IEEE Trans. Medical Imaging 12(3): 555-559 (1993)
Coauthor Index
aka: Zhi-Cheng Zhao
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint