1 |
D. Tao, X. Tang, X. Li and X. Wu, "Asymmetric bagging and random subspace for support vector machines-based relevance feedback in image retrieval," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 7, pp. 1088-1099, July, 2006.
DOI
ScienceOn
|
2 |
X. Tian, D. Tao and Y. Rui, "Sparse transfer learning for interactive video search reranking," ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 8, no. 3(26), July, 2012.
|
3 |
W. Meng, L. Hao, T. Dacheng, L. Ke and W. Xindong, " Multimodal graph-based reranking for web image search," IEEE Transcations on Image Processing, vol. 21, no. 11, pp. 4649-4661, November, 2012.
DOI
ScienceOn
|
4 |
L. Weifeng and T. Dacheng, "Multiview hessian regularization for image annotation," IEEE Transactions on Image Processing, vol. 22, no. 7, pp. 2676-2687, July, 2013.
DOI
ScienceOn
|
5 |
R. Gossweiler, M. Kamvar and S. Baluja, "What's up CAPTCHA?: a CAPTCHA based on image orientation," in Proc. of 18th Int. Conf. on World Wide Web, pp. 841-850, 2009.
|
6 |
K. Chellapilla, K. Larson, P. Simard and M. Czerwinski, "Designing human friendly human interaction proofs (HIPs)," in Proc. of SIGCHI Conf. on Human Factors in Computing Systems, pp. 711-720, 2005.
|
7 |
J. Elson, J.R. Douceur, J. Howell and J. Saul, "Asirra: a CAPTCHA that exploits interest-aligned manual image categorization," in Proc. of 14th ACM Conf. on Computer and Communication Security, pp. 366-374, 2007.
|
8 |
L. von Ahn, M. Blum, N.J. Hopper and J. Langford, "CAPTCHA: Using hard AI problems for security," Adcances in Cryptology - EUROCRYPT 2003 in Lecture Notes in Computer Science, vol. 2656, pp. 294-311, 2003.
|
9 |
S. Kalsoom, S. Ziauddin and A.R. Abbasi, "An image-based CAPTCHA scheme exploiting human appearance characteristics," KSII Transactions on Internet and Information Systems, vol. 6, no. 2, pp. 734-750, February, 2012.
|
10 |
R. Chow, P. Golle, M. Jakobsson, L. Wang and X.F. Wang, "Making captchas clickable," in Proc. of 9th Workshop on Mobile Computing Systems and Applications, pp. 91-94, 2008.
|
11 |
D. Misra and K. Gaj, "Face recognition CAPTCHAs," in Proc. of Int. Conf. on Internet and Web Applications and Services, pp. 122-122, February 19-25, 2006.
|
12 |
L. von Ahn, M. Blum and J. Langford, "Telling humans and computers apart automatically," Communications of the ACM, vol. 47, no. 2, pp. 56-60, February, 2004.
|
13 |
L. von Ahn and L. Dabbish, "Labeling images with a computer game," in Proc. of SIGCHI Conf. on Human Factors in Computing Systems, pp. 319-326, 2004.
|
14 |
P. Golle, "Machine learning attacks against the Asirra CAPTCHA," in Proc of 15th ACM Conf. on Computer and Communications Security, pp. 535-542, 2008.
|
15 |
J.W. Kim, W.K. Chung and H.G. Cho, "A new image-based CAPTCHA using the orientation of the polygonally cropped sub-images," The Visual Computer, vol. 26, no.6-8, pp. 1135-1143, June, 2010.
DOI
ScienceOn
|
16 |
Z. Xiangxin and D. Ramanan, "Face detection, pose estimation, and landmark localization in the wild," in Proc. of IEEE Conf. on Biometric Compendium, pp. 2879-2886, June 16-21, 2012.
|
17 |
N. Kumar, A. Berg, P.N. Belhumeur and S. Nayar, "Describable visual attributes for face verification and image search," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 10, pp. 1962-1977, March 10, 2011.
DOI
ScienceOn
|
18 |
D. Morrison, S. Marchand-Maillet and E. Bruno, "TagCAPTCHA: annotating images with CAPTCHAs," in Proc. of ACM SIGKDD Workshop on Human Computation, pp. 44-45, 2009.
|
19 |
R.A. Khot and K. Srinathan, "iCAPTCHA: Image tagging for free," in Proc. of 3rd Int. Conf. on Usable Software and Interface Design, pp. 1-6, 2009.
|
20 |
L. von Ahn, B. Maurer, C. McMillen, D. Abraham and M. Blum, "reCAPTCHA: human-based character recognition via web security measures," Science, vol. 321, no. 5895, pp. 1465-1468, September 12, 2008.
DOI
ScienceOn
|
21 |
M. Chew and J. Tygar, "Image recognition CAPTCHAs," in Proc. of 7th Int. Information Security Conf., pp. 268-279, 2004.
|
22 |
K. Chellapilla, K. Larson, P.Y. Simard and M. Czerwinski, "Computers beat humans at single character recognition in reading based human interaction proofs," in Proc. of 2nd Conf. on Email and and Anti-Spam, 2005.
|
23 |
Y. Rui and Z. Liu, "ARTiFACIAL: Automated reverse Turing test using FACIAL features," Multimedia Systems, vol. 9, no. 6, pp. 493-502, June, 2004.
DOI
ScienceOn
|
24 |
M. Toews and T. Arbel, "Detection, localization, and sex classification of faces from arbitrary viewpoints and under occlusion," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 9, pp. 1567-1581, September, 2009.
DOI
ScienceOn
|
25 |
N. Naaman, S. Harada, Q.Y. Wang, H. Garcia-Molina and A. Paepck, "Context data in geo-referenced digital photo collections," in Proc. of 12th ACM Int. Conf. on Multimedia, pp. 196-203, 2004.
|
26 |
X. Geng, Z.H. Zhou and K. Smith-Miles, "Automatic age estimation based on facial aging patterns," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 12, pp. 2234-2240, December, 2007.
DOI
ScienceOn
|
27 |
F. Alnajar, C. Shan, T. Gevers and J.M. Geusebroek, "Learning-based encoding with soft assignment for age estimation under unconstrained imaging conditions," Image and Vision Computing, vol. 30, no. 12, pp. 946-953, December, 2012.
DOI
ScienceOn
|
28 |
J. Ylioinas, A. Hadid and M. Pietikainen, "Age classification in unconstrained conditions using LBP variants," in Proc. of Int. Conf. on Pattern Recognition, pp. 1257-1260, November 11-15, 2012.
|
29 |
T. Xinmei and T. Dacheng, "Visual reranking: From objectives to strategies," IEEE Multimedia, vol. 18, no. 3, pp. 12-21, March, 2011.
|
30 |
B. Sigurbjornsson and R.v. Zwol, "Flickr tag recommendation based on collective knowledge," in Proc. of 17th Int. Conf. on Wrold Wide Web, pp. 327-336, 2008.
|
31 |
M. Ames and M. Naaman, "Why we tag: motivations for annotation in mobile and online media," in Proc. of SIGCHI Conf. on Human Factors in Computing Systems, pp. 971-980, 2007.
|