{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T15:56:08Z","timestamp":1762444568443,"version":"3.37.3"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2012CB316300"],"award-info":[{"award-number":["2012CB316300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61420106015","61135002","61272333","61572463","61273272"],"award-info":[{"award-number":["61420106015","61135002","61272333","61572463","61273272"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"Post-Doctoral Science Foundation of China","doi-asserted-by":"publisher","award":["2012M520021","2013T60195"],"award-info":[{"award-number":["2012M520021","2013T60195"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council Projects","doi-asserted-by":"publisher","award":["FT-130101457","LP-140100569"],"award-info":[{"award-number":["FT-130101457","LP-140100569"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/tcyb.2015.2457234","type":"journal-article","created":{"date-parts":[[2015,8,14]],"date-time":"2015-08-14T10:46:35Z","timestamp":1439549195000},"page":"1877-1888","source":"Crossref","is-referenced-by-count":56,"title":["Representative Vector Machines: A Unified Framework for Classical Classifiers"],"prefix":"10.1109","volume":"46","author":[{"given":"Jie","family":"Gui","sequence":"first","affiliation":[]},{"given":"Tongliang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dacheng","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Zhenan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Tieniu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.11.016"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2208663"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995556"},{"journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction","year":"2001","author":"hastie","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2298235"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1109\/TNNLS.2013.2281839","article-title":"Sparse Bayesian extreme learning machine for multi-classification","volume":"25","author":"luo","year":"2014","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126277"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.1109\/TCSVT.2011.2138790","article-title":"A two-phase test sample sparse representation method for use with face recognition","volume":"21","author":"xu","year":"2011","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/TPAMI.2010.220","article-title":"Maximum correntropy criterion for robust face recognition","volume":"33","author":"he","year":"2011","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref34","first-page":"1113","article-title":"Exponential family sparse coding with applications to self-taught learning","author":"lee","year":"2009","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126555"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2014.12.042"},{"key":"ref61","first-page":"3370","article-title":"Beyond spatial pyramids: Receptive field learning for pooled image features","author":"jia","year":"2012","journal-title":"Proc Conf Comput Vis Pattern Recognit"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2263382"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2295717"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref65","first-page":"1023","article-title":"A fast extension for sparse representation on robust face recognition","author":"qiu","year":"2012","journal-title":"Proc Int Conf Pattern Recognit"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2277813"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2328894"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"2431","DOI":"10.1109\/TCYB.2014.2307862","article-title":"High-order distance-based multiview stochastic learning in image classification","volume":"44","author":"yu","year":"2014","journal-title":"IEEE Trans Cybern"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-5823.2001.tb00465.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/34.506411"},{"key":"ref21","volume":"1","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/34.888719"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/72.750575"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.128"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1114855"},{"key":"ref50","first-page":"937","article-title":"A fuzzy K-nearest neighbor algorithm","volume":"15","author":"james","year":"2005","journal-title":"IEEE Trans Syst Man Cybern"},{"journal-title":"Foundations of Machine Learning","year":"2012","author":"mohri","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540018"},{"key":"ref58","first-page":"1794","article-title":"Linear spatial pyramid matching using sparse coding for image classification","author":"yang","year":"2009","journal-title":"Proc Conf Comput Vis Pattern Recognit"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2005.09.012"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.268"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540120"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2012.2212721"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"article-title":"Nonparametric discrimination and density estimation","year":"1976","author":"devroye","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2308519"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1998.698702"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2279167"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2366468"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-012-0140-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-013-0187-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-012-0080-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007413511361"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2293418"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/TCYB.2014.2323992","article-title":"Person reidentification by minimum classification error-based KISS metric learning","volume":"45","author":"tao","year":"2015","journal-title":"IEEE Trans Cybern"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0703-y"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/TCYB.2014.2326596","article-title":"Image classification with densely sampled image windows and generalized adaptive multiple kernel learning","volume":"45","author":"yan","year":"2015","journal-title":"IEEE Trans Cybern"},{"journal-title":"Neural Networks and Learning Machines","year":"2008","author":"haykin","key":"ref8"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056032"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-013-0222-0"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1137\/030600862","article-title":"Analysis of half-quadratic minimization methods for signal and image recovery","volume":"27","author":"mila","year":"2005","journal-title":"SIAM J Sci Comput"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.55"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2011.6166697"},{"key":"ref47","first-page":"100","article-title":"Speech database development: Design and analysis of the acoustic-phonetic corpus","author":"lamel","year":"1989","journal-title":"Proc DARPA Speech Recognit Workshop"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.209"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2003.1211332"},{"key":"ref44","first-page":"153","article-title":"Locality preserving projections","author":"he","year":"2004","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.896065"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/7511816\/07194763.pdf?arnumber=7194763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:45:06Z","timestamp":1641987906000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7194763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":65,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2015.2457234","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"type":"print","value":"2168-2267"},{"type":"electronic","value":"2168-2275"}],"subject":[],"published":{"date-parts":[[2016,8]]}}}