{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T05:13:04Z","timestamp":1757567584653,"version":"3.41.0"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"8","license":[{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61991401, 62103092, 61673097"],"award-info":[{"award-number":["61991401, 62103092, 61673097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shenzhen Science and Technology Program","award":["RCYX20221008092852077"],"award-info":[{"award-number":["RCYX20221008092852077"]}]},{"name":"National Key Research and Development Project","award":["2020YFB1710003"],"award-info":[{"award-number":["2020YFB1710003"]}]},{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"crossref","award":["2023A1515010057, 2022A1515011146"],"award-info":[{"award-number":["2023A1515010057, 2022A1515011146"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"crossref","award":["20192ACBL20010"],"award-info":[{"award-number":["20192ACBL20010"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Special Projects for Key Fields in Higher Education of Guangdong Province","award":["2021ZDZX1042"],"award-info":[{"award-number":["2021ZDZX1042"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>\n            Dictionary learning is an efficient knowledge representation method that can learn the essential features of data. Traditional dictionary learning methods are difficult to obtain nonlinear information when processing large-scale and high-dimensional datasets. While most dictionary learning algorithms are based on the assumption that the training data and test data have the same feature distribution, which is not always true in practical applications. To address the above problems, we propose the Kernel Fisher Dictionary Transfer Learning (KFDTL) algorithm. First, we map each sample to high-dimensional space through kernel mapping and use any dictionary learning algorithm to learn the essential features. Then, the feature-based transfer learning method is performed to predict the labels of the target samples. This method includes three main contributions: (1) KFDTL constructs a discriminative Fisher embedding model to make the same class samples have similar coding coefficients; (2) Based on the relationship between profiles and atoms, KFDTL constructs an adaptive model that adapts source domain samples to target domain samples; (3) The kernel method is used to efficiently solve nonlinear problems. Experiments on a large number of public image datasets have proved the effectiveness of the proposed method. The source code of the proposed method is available at\n            <jats:ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"https:\/\/github.com\/zzfan3\/KFDTL\">https:\/\/github.com\/zzfan3\/KFDTL<\/jats:ext-link>\n            .\n          <\/jats:p>","DOI":"10.1145\/3588575","type":"journal-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T12:24:12Z","timestamp":1679487852000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Kernel Fisher Dictionary Transfer Learning"],"prefix":"10.1145","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6494-3604","authenticated-orcid":false,"given":"Linrui","family":"Shi","sequence":"first","affiliation":[{"name":"East China Jiaotong University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1470-6998","authenticated-orcid":false,"given":"Zheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5354-4827","authenticated-orcid":false,"given":"Zizhu","family":"Fan","sequence":"additional","affiliation":[{"name":"East China Jiaotong University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5824-5540","authenticated-orcid":false,"given":"Chao","family":"Xi","sequence":"additional","affiliation":[{"name":"East China Jiaotong University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7330-8864","authenticated-orcid":false,"given":"Zhengming","family":"Li","sequence":"additional","affiliation":[{"name":"Guangdong Polytechnic Normal University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5149-2995","authenticated-orcid":false,"given":"Gaochang","family":"Wu","sequence":"additional","affiliation":[{"name":"Northeastern University, Shenyang, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3050407"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3046114"},{"issue":"4","key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3494559","article-title":"Adaptive model scheduling for resource-efficient data labeling","volume":"16","author":"Yuan M.","year":"2022","unstructured":"M. Yuan, L. Zhang, X. Y. Li, L. Z. Yang, and H. Xiong. 2022. Adaptive model scheduling for resource-efficient data labeling. ACM Transactions on Knowledge Discovery from Data 16, 4 (2022), 1\u201322.","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3265689.3265705"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2900467"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3029181"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947072"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3453146"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3024728"},{"issue":"5","key":"e_1_3_1_11_2","first-page":"1","article-title":"Salient region detection via discriminative dictionary learning and joint bayesian inference","volume":"28","author":"Wang S.","year":"2017","unstructured":"S. Wang, M. Wang, S. Yang, and K. Zhang. 2017. Salient region detection via discriminative dictionary learning and joint bayesian inference. IEEE Transactions on Circuits and Systems for Video Technology 28, 5 (2017), 1\u20131.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2665359"},{"issue":"3","key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3442203","article-title":"Knowledge transfer with weighted adversarial network for cold-start store site recommendation","volume":"15","author":"Liu Y.","year":"2021","unstructured":"Y. Liu, B. Guo, D. Zhang, D. Zeghlache, J. Chen, K. Hu, S. Zhang D. Zhou, and Z. Yu. 2021. Knowledge transfer with weighted adversarial network for cold-start store site recommendation. ACM Transactions on Knowledge Discovery from Data 15, 3 (2021), 1\u201327.","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3054671"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2015.2508146"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2431440"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015436"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1212\/WNL.56.suppl_5.S1"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1136"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.830991"},{"key":"e_1_3_1_21_2","first-page":"155","article-title":"Support vector regression machines","volume":"9","author":"Drucker Harris","year":"1997","unstructured":"Harris Drucker, C. J. C. Burges, L. Kaufman, A. Smola, and V. Vapnik. 1997. Support vector regression machines. Advances in Neural Information Processing Systems 9 (1997), 155\u2013161.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_22_2","first-page":"1425","article-title":"Scaling up kernel SVM on limited resources: A low-rank linearization approach","author":"Zhang K.","year":"2012","unstructured":"K. Zhang, L. Lan, Z. Wang, and F. Moerchen, 2012. Scaling up kernel SVM on limited resources: A low-rank linearization approach. In Proceedings of Artificial Intelligence and Statistics. 1425--1434.","journal-title":"Proceedings of Artificial Intelligence and Statistics"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/IDAP.2018.8620924"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2785313"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2319652"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2923007"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979748"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2612686"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.02.018"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0722-8"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539989"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.88"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/NNSP.1999.788121"},{"key":"e_1_3_1_34_2","first-page":"1","volume-title":"Proceedings of the 2020 25th International Computer Conference, Computer Society of Iran","author":"Fatemeh A.","year":"2020","unstructured":"A. Fatemeh and H. Sattar. 2020. Fkndt: A flexible kernel by negotiating between data-dependent kernel learning and task-dependent kernel learning. In Proceedings of the 2020 25th International Computer Conference, Computer Society of Iran. 1\u20137."},{"key":"e_1_3_1_35_2","first-page":"370","article-title":"Deep kernel learning","author":"Wilson A. G.","year":"2016","unstructured":"A. G. Wilson, Z. Hu, R. Salakhutdinov, and E. P. Xing. 2016. Deep kernel learning. Computer Science 51 (2016), 370\u2013378.","journal-title":"Computer Science"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.11.008"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2015.7326280"},{"key":"e_1_3_1_38_2","first-page":"2031","volume-title":"Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics","author":"Yan P.","year":"2018","unstructured":"P. Yan. 2018. Kernel pls regression ii: Kernel partial least squares regression by projecting both independent and dependent variables into reproducing kernel hilbert space. In Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics. 2031\u20132036."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.250598"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10242"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2322938"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10584-0_27"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2295062"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2847335"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3093468"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207365"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.3004398"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3089566"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2508025"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2868685"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.08.002"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"e_1_3_1_54_2","first-page":"18","volume-title":"Proceedings of the European Conference on Computer Vision","author":"Tommasi T.","year":"2014","unstructured":"T. Tommasi and T. Tuytelaars. 2014. A testbed for cross-dataset analysis. In Proceedings of the European Conference on Computer Vision. 18\u201331."},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2516952"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247911"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.150"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2373376"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2019.00211"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2729885"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3588575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:13Z","timestamp":1750178833000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3588575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,12]]},"references-count":59,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3588575"],"URL":"https:\/\/doi.org\/10.1145\/3588575","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2023,5,12]]},"assertion":[{"value":"2022-06-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}