Daniel Yeung

ORCID: 0000-0001-9397-8865
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Face and Expression Recognition
  • Neural Networks and Applications
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Radiotherapy Techniques
  • Network Security and Intrusion Detection
  • Cognitive Computing and Networks
  • Machine Learning and ELM
  • Medical Imaging Techniques and Applications
  • Cancer Diagnosis and Treatment
  • Gastric Cancer Management and Outcomes
  • AI-based Problem Solving and Planning
  • Lung Cancer Diagnosis and Treatment
  • Handwritten Text Recognition Techniques
  • Cancer Treatment and Pharmacology
  • Fault Detection and Control Systems
  • Radiomics and Machine Learning in Medical Imaging
  • Advanced Algorithms and Applications
  • Anomaly Detection Techniques and Applications
  • Colorectal Cancer Surgical Treatments
  • Advanced Malware Detection Techniques
  • Radiopharmaceutical Chemistry and Applications
  • Medical Imaging and Pathology Studies
  • Text and Document Classification Technologies
  • Brain Metastases and Treatment

Systems Engineering Society of China
2022

South China University of Technology
2010-2021

Health Awareness (United States)
2014

Computational Intelligence and Information Systems Lab
2014

University of Florida
2012

University of Florida Health
2012

Florida College
2012

Harbin Institute of Technology
2006-2009

Shenzhen Institute of Information Technology
2009

Yuan Ze University
2009

Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet thoroughly assessed. While previous work mainly focused on devising adversary-aware classification algorithms counter evasion attempts, only few authors considered the impact of using reduced feature sets classifier...

10.1109/tcyb.2015.2415032 article EN IEEE Transactions on Cybernetics 2015-04-21

Undersampling is a widely adopted method to deal with imbalance pattern classification problems. Current methods mainly depend on either random resampling the majority class or at decision boundary. Random-based undersampling fails take into consideration informative samples in data while boundary sensitive overlapping. Both techniques ignore distribution information of training dataset. In this paper, we propose diversified sensitivity-based method. Samples are clustered capture and enhance...

10.1109/tcyb.2014.2372060 article EN IEEE Transactions on Cybernetics 2014-12-02

Aim to currently content-based image retrieval method having high computational complexity and low accuracy problem, this paper proposes a based on color texture features. As its features, moments of the Hue, Saturation Value (HSV) component images in HSV space are used. Gabor descriptors adopted. Users assign weights each feature respectively calculate similarity with combined features according normalized Euclidean distance. Experiment results show that proposed has higher than...

10.1109/icmlc.2010.5580566 article EN International Conference on Machine Learning and Cybernetics 2010-07-01

The training of a multilayer perceptron neural network (MLPNN) concerns the selection its architecture and connection weights via minimization both error penalty term. Different terms have been proposed to control smoothness MLPNN for better generalization capability. However, controlling using, instance, norm or Vapnik-Chervonenkis dimension cannot distinguish individual MLPNNs with same number free parameters norm. In this paper, enhance capabilities, we propose stochastic sensitivity...

10.1109/tnnls.2015.2431251 article EN IEEE Transactions on Neural Networks and Learning Systems 2015-06-02

In a modern e-commerce recommender system, it is important to understand the relationships among products. Recognizing product relationships-such as complements or substitutes-accurately an essential task for generating better recommendation results, well improving explainability in recommendation. Products and their associated naturally form graph, yet existing efforts do not fully exploit graph's topological structure. They usually only consider information from directly connected fact,...

10.1109/tnnls.2021.3060872 article EN IEEE Transactions on Neural Networks and Learning Systems 2021-03-08

Radio Frequency Identification (RFID) is the next generation wireless communication technology applicable to a wide range of application areas. There are an increasing number retailers, banks, traffic managements, exhibitions and logistic providers practicing this new their products services. Therefore, it brings both opportunities challenges RFID researchers. In paper, we provide brief survey on applications suggest some in intelligent applications.

10.1109/icmlc.2009.5212147 article EN International Conference on Machine Learning and Cybernetics 2009-07-01

This paper presents a covariance-matrix modeling and detection approach to detecting various flooding attacks. Based on the investigation of correlativity changes monitored network features during attacks, this employs statistical covariance matrices build norm profile normal activities in information systems directly utilizes detect The classification boundary is constrained by threshold matrix, where each element evaluates degree which an observed matrix different from terms correlation...

10.1109/tsmca.2006.889480 article EN IEEE Transactions on Systems Man and Cybernetics - Part A Systems and Humans 2007-03-01

The one-class classification problem aims to distinguish a target class from outliers. spherical classifier (SOCC) solves this by finding hypersphere with minimum volume that contains the data while keeping outlier samples outside. SOCC achieves satisfactory performance only when have same distribution tendency in all orientations. Therefore, of is limited way many superfluous outliers might be mistakenly enclosed. authors propose exploit structures obtained via unsupervised methods such as...

10.1109/tsmcb.2006.876189 article EN IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics) 2006-11-22

This paper addresses a problem in the hashing technique for large scale image retrieval: learn compact hash code to reduce storage cost with performance comparable that of long code. A longer yields better precision rate retrieved images. However, it also requires larger storage, which limits number stored Current methods employ same length both queries and We propose new scheme using two codes different lengths images, i.e., asymmetric cyclical hashing. is used requirement, while query...

10.1109/tmm.2015.2437712 article EN IEEE Transactions on Multimedia 2015-05-25

10.1016/0957-4174(94)90044-2 article EN Expert Systems with Applications 1994-04-01

Convolutional Neural Network (CNN) achieved satisfying performance in click-through rate (CTR) prediction recent studies. Since features used CTR have no meaningful sequence nature, the can be arranged any order. As CNN learns local information of a sample, feature may influence its significantly. However, this problem has not been fully investigated. This paper firstly investigates whether and how affects CNN-based method. data distribution changes with time, best current suitable for...

10.24963/ijcai.2018/277 article EN 2018-07-01

A recommender system is susceptible to manipulation through the injection of carefully crafted profiles. Some recent profile identification methods only perform well in specific attack scenarios. general detection method usually complicated or requires label samples. Such are prone overtraining easily, and process annotation incurs high expenses. This study proposes an unsupervised divide-and-conquer aiming identify profiles, utilizing a specifically designed model for each kind shilling...

10.3233/ida-230575 article EN Intelligent Data Analysis 2024-04-12

A novel adaptive filter is proposed using a recurrent cerebellar-model-articulation-controller (CMAC). The locally globally feedforward CMAC (RCMAC) has favorable properties of small size, good generalization, rapid learning, and dynamic response, thus it more suitable for high-speed signal processing. To provide fast training, an efficient parameter learning algorithm based on the normalized gradient descent method presented, in which rates are on-line adapted. Then Lyapunov function...

10.1109/tnn.2010.2050700 article EN IEEE Transactions on Neural Networks 2010-07-01

Fundus images have been widely used in the diagnosis of retinopathy and cardiovascular diseases. However, because movement patients' eyes limitation medical equipments, quality fundus may be low sometimes. In this paper, we propose vessel enhancement method for a low-contrast blurred image based on multi-scale morphological top-hat transformation, combination Gabor matched filter. The underlying rationale proposed is to make use different kinds information improve blood vessels retinal with...

10.1109/icwapr.2016.7731638 article EN 2016-07-01

A very large volume of images is uploaded to the Internet daily. However, current hashing methods for image retrieval are designed static databases only. They fail consider fact that distribution can change when new added database over time. The changes in include both discovery a class and within owing concept drift. Retraining hash tables using all requires computation effort. This also biased old data huge which leads poor performance In this paper, we propose incremental (ICH) method...

10.1109/tcyb.2016.2582530 article EN IEEE Transactions on Cybernetics 2016-01-01

Radio frequency identification (RFID) technology has been widely adopted in access control system. However, the people holding RFID card passing through may not be authorized one. Therefore, an system combining and face recognition based on neural network is presented this work. The recognizes of person denies if they do match. We adopt a Radial Basis Function Neural Network (RBFNN) to learn holders save parameters RBFNN only. This could reduce storage when number getting large. Principal...

10.1109/icmlc.2010.5580558 article EN International Conference on Machine Learning and Cybernetics 2010-07-01
Coming Soon ...