{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:01:53Z","timestamp":1761663713189,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/spac.2017.8304264","type":"proceedings-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T18:52:04Z","timestamp":1520016724000},"page":"136-141","source":"Crossref","is-referenced-by-count":33,"title":["Broad learning system: Structural extensions on single-layer and multi-layer neural networks"],"prefix":"10.1109","author":[{"given":"Zhulin","family":"Liu","sequence":"first","affiliation":[]},{"given":"C. L. Philip","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2499200"},{"key":"ref11","article-title":"Broad learning system: An effective and efficient incremental learning system without the need for deep architecture","author":"chen","year":"2017","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.01.015"},{"key":"ref13","article-title":"Broad learning system: Its structural variations, universal approximation capability, and applications in function approximation, time series prediction, and face recognition","author":"chen","year":"2017","journal-title":"submitted"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1993.5.2.305"},{"key":"ref15","first-page":"107","author":"strumi??o","year":"2003","journal-title":"Radial Basis Function Neural Network Theory and Applications"},{"key":"ref16","first-page":"601","article-title":"Generalized inverse of a matrix and its applications","author":"rao","year":"1972","journal-title":"Proceedings of the Sixth Berkeley Symposium on Mathematical Statistics and Probability Volume 1 Theory of Statistics"},{"key":"ref17","article-title":"Matrices: Theory and Applications","author":"serre","year":"2002","journal-title":"Graduate Texts in Mathematics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2000.10485983"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2013.140"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref3","first-page":"396","article-title":"Handwritten digit recognition with a back-propagation network","author":"lecun","year":"1990","journal-title":"Advances in Neural Information Processing System"},{"key":"ref6","first-page":"1","article-title":"A fuzzy restricted boltzmann machine: Novel leaming algorithms based on crisp possibilistic mean value of fuzzy numbers","volume":"pp","author":"feng","year":"2016","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"ref5","article-title":"Very deep convolutional networks for large-scale image recognition","volume":"abs 1409 1556","author":"simonyan","year":"2014","journal-title":"CoRR"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1109\/TCYB.2014.2322195","article-title":"Hybrid adaptive classifier ensemble","volume":"45","author":"yu","year":"2015","journal-title":"IEEE Transactions on Cybernetics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2015.2406889"},{"key":"ref2","first-page":"3","article-title":"Deep boltzmann machines","volume":"1","author":"salakhutdinov","year":"2009","journal-title":"AISTATS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2443857"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2424995"}],"event":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2017,12,15]]},"location":"Shenzhen","end":{"date-parts":[[2017,12,17]]}},"container-title":["2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8300290\/8304236\/08304264.pdf?arnumber=8304264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T01:13:04Z","timestamp":1570842784000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8304264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/spac.2017.8304264","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}