{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:38:04Z","timestamp":1770831484321,"version":"3.50.1"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/tencon.2019.8929663","type":"proceedings-article","created":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T21:01:41Z","timestamp":1576184501000},"page":"745-750","source":"Crossref","is-referenced-by-count":12,"title":["Dynamic Mode Decomposition based feature for Image Classification"],"prefix":"10.1109","author":[{"given":"K.","family":"Rahul-Vigneswaran","sequence":"first","affiliation":[]},{"given":"S.","family":"Sachin-Kumar","sequence":"additional","affiliation":[]},{"given":"Neethu","family":"Mohan","sequence":"additional","affiliation":[]},{"given":"K.P.","family":"Soman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1579","article-title":"Fast kernel classifiers with online and active learning","volume":"6","author":"bordes","year":"2005","journal-title":"Journal of Machine Learning Research"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2017.07.007"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015430"},{"key":"ref32","first-page":"3236","article-title":"Learning to compose domain-specific transformations for data augmentation","author":"ratner","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref31","author":"cubuk","year":"2018","journal-title":"Autoaugment Learning augmentation policies from data"},{"key":"ref30","article-title":"Zero-shot learning-a comprehensive evaluation of the good, the bad and the ugly","author":"xian","year":"2018","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref37","first-page":"1177","article-title":"Random features for large-scale kernel machines","author":"rahimi","year":"2008","journal-title":"Advances in neural information processing systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/S0022112009992059"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1017\/S0022112010001217"},{"key":"ref34","first-page":"2625","article-title":"Policy shaping: Integrating human feedback with reinforcement learning","author":"griffith","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.79"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007379606734"},{"key":"ref29","first-page":"935","article-title":"Zero-shot learning through cross-modal transfer","author":"socher","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref2","author":"cohen","year":"2006","journal-title":"Risks of semi-supervised learning how unlabeled data can degrade performance of generative classifiers"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"33","DOI":"10.7551\/mitpress\/6173.003.0006","article-title":"Semi-supervised text classification using EM","author":"nigam","year":"2006","journal-title":"Semi-Supervised Learning"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390436"},{"key":"ref22","author":"lowell","year":"2018","journal-title":"How transferable are the datasets collected by active learners?"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1613\/jair.295"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1318"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2054"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1031"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-6095-4_1"},{"key":"ref51","first-page":"1","article-title":"Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security","author":"rahul","year":"0","journal-title":"2018 9th International Conference on Computing Communication and Networking Technologies (ICCCNT)"},{"key":"ref53","author":"rahul-vigneswaran","year":"2019","journal-title":"Data-driven Computing in Elasticity via Chebyshev Approximation"},{"key":"ref52","author":"rahul-vigneswaran","year":"2019","journal-title":"A Compendium on Network and Host based Intrusion Detection Systems"},{"key":"ref10","author":"kipf","year":"2016","journal-title":"Semi-supervised classification with graph convolutional networks"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"293","DOI":"10.7551\/mitpress\/6173.003.0022","article-title":"Spectral methods for dimensionality reduction","author":"saul","year":"2006","journal-title":"SemiSupervised Learning"},{"key":"ref40","first-page":"981","article-title":"Sampling methods for the Nystrm method","volume":"13","author":"kumar","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref12","first-page":"625","article-title":"Why does unsupervised pre-training help deep learning?","volume":"11","author":"erhan","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3115\/1690219.1690287"},{"key":"ref15","first-page":"721","article-title":"Reducing wrong labels in distant supervision for relation extraction","volume":"1","author":"takamatsu","year":"0","journal-title":"Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics Long Papers"},{"key":"ref16","first-page":"1252","article-title":"Learning from weak teachers","author":"urner","year":"2012","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/3157794.3157797"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2346806"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250918"},{"key":"ref4","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.241"},{"key":"ref6","author":"seeger","year":"2000","journal-title":"Input-dependent regularization of conditional density models"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"ref8","first-page":"200","article-title":"Transductive inference for text classification using support vector machines","volume":"99","author":"joachims","year":"0","journal-title":"ICML"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/354756.354805"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2018.09.190"},{"key":"ref9","first-page":"1","author":"zhu","year":"2002","journal-title":"Learning From Labeled and Unlabeled Data With Label Propagation"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26832-3_64"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1214\/009053607000000677"},{"key":"ref48","article-title":"Aspect Sentiment Identification using random Fourier features","author":"thara","year":"2018","journal-title":"International Journal of Intelligent Systems and Applications (IJISA)"},{"key":"ref47","first-page":"19351","article-title":"Parameter analysis of random kitchen sink algorithm","volume":"10","author":"athira","year":"2015","journal-title":"IJAER"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797607"},{"key":"ref41","first-page":"243","article-title":"Efficient SVM training using low-rank kernel representations","volume":"2","author":"fine","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"ref44","author":"schlkopf","year":"2002","journal-title":"Learning With Kernels Support Vector Machines Regularization Optimization and Beyond"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2797798"}],"event":{"name":"TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)","location":"Kochi, India","start":{"date-parts":[[2019,10,17]]},"end":{"date-parts":[[2019,10,20]]}},"container-title":["TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8910516\/8929228\/08929663.pdf?arnumber=8929663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T19:10:46Z","timestamp":1695496246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8929663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/tencon.2019.8929663","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}