The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wing W. Y. Ng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wing W. Y. Ng, Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang
    Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure. [Citation Graph (0, 0)][DBLP]
    ICMLC, 2005, pp:851-860 [Conf]
  2. Aki P. F. Chan, Daniel S. Yeung, Eric C. C. Tsang, Wing W. Y. Ng
    Empirical Study on Fusion Methods Using Ensemble of RBFNN for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICMLC, 2005, pp:682-690 [Conf]
  3. Aki P. F. Chan, Wing W. Y. Ng, Daniel S. Yeung, Eric C. C. Tsang
    Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:141-148 [Conf]
  4. Wing W. Y. Ng, Daniel S. Yeung, Ian Cloete
    Quantitative study on effect of center selection to RBFNN classification performance. [Citation Graph (0, 0)][DBLP]
    SMC (4), 2004, pp:3692-3697 [Conf]
  5. Wing W. Y. Ng, Andrés Dorado, Daniel S. Yeung, Witold Pedrycz, Ebroul Izquierdo
    Image classification with the use of radial basis function neural networks and the minimization of the localized generalization error. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2007, v:40, n:1, pp:19-32 [Journal]
  6. Ming Lu, Daniel S. Yeung, Wing W. Y. Ng
    Applying undistorted neural network sensitivity analysis in iris plant classification and construction productivity prediction. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2006, v:10, n:1, pp:68-77 [Journal]
  7. Wing W. Y. Ng, Daniel S. Yeung, Defeng Wang, Eric C. C. Tsang, Xizhao Wang
    Localized Generalization Error of Gaussian-based Classifiers and Visualization of Decision Boundaries. [Citation Graph (0, 0)][DBLP]
    Soft Comput., 2007, v:11, n:4, pp:375-381 [Journal]
  8. Daniel S. Yeung, Defeng Wang, Wing W. Y. Ng, Eric C. C. Tsang, Xizhao Wang
    Structured large margin machines: sensitive to data distributions. [Citation Graph (0, 0)][DBLP]
    Machine Learning, 2007, v:68, n:2, pp:171-200 [Journal]

  9. Content-based image retrieval using color moment and Gabor texture feature. [Citation Graph (, )][DBLP]


  10. Feature weighting based on L-GEM. [Citation Graph (, )][DBLP]


  11. A novel approach on control simulation using neural network ensemble. [Citation Graph (, )][DBLP]


  12. Anti-spoofing system for RFID access control combining with face recogntion. [Citation Graph (, )][DBLP]


  13. A growing architecture selection for Multilayer Perceptron Neural Network by the L-GEM. [Citation Graph (, )][DBLP]


  14. Construction of radial basis function neural networks via a minimization of its localized generalization error. [Citation Graph (, )][DBLP]


  15. Empirical comparison of forward and backward search strategies in L-GEM based feature selection with RBFNN. [Citation Graph (, )][DBLP]


  16. Shape-based image retrieval of Chinese paper-cutting using RBFNN with invariant moment. [Citation Graph (, )][DBLP]


  17. RFID indoor positioning using RBFNN with L-GEM. [Citation Graph (, )][DBLP]


  18. Multiple classifier systems combined with localized generalization error for fault diagnosis of power transformers. [Citation Graph (, )][DBLP]


  19. Trademark classification by shape using ensemble of RBFNNs. [Citation Graph (, )][DBLP]


  20. 2-Stage instance selection algorithm for KNN based on Nearest Unlike Neighbors. [Citation Graph (, )][DBLP]


  21. L-GEM based RBFNN for news anchorperson detection with Dominant Color Descriptor. [Citation Graph (, )][DBLP]


  22. Feature selection for blind steganalysis using localized generalization error model. [Citation Graph (, )][DBLP]


  23. Moving average crossovers for short-term equity investment with L-GEM based RBFNN. [Citation Graph (, )][DBLP]


  24. Apply randomization in KNN to make the adversary harder to attack the classifier. [Citation Graph (, )][DBLP]


  25. RFID reader deployment using RBFNN with L-GEM. [Citation Graph (, )][DBLP]


  26. Access control by RFID and face recognition based on neural network. [Citation Graph (, )][DBLP]


  27. A novel gradient synthesis-based illumination formalization method for face recognition under varying lighting conditions. [Citation Graph (, )][DBLP]


  28. Heuristic improvement for active learning using localized generalization error as selection criterion. [Citation Graph (, )][DBLP]


  29. IPCM Separability Ratio for Supervised Feature Selection. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002