Principal component neural networks: theory and applications
Principal component neural networks: theory and applications
A neural implementation of canonical correlation analysis
Neural Networks
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Neural Networks: A Comprehensive Foundation
Neural Networks: A Comprehensive Foundation
Discrete Random Signals and Statistical Signal Processing
Discrete Random Signals and Statistical Signal Processing
Statistical Digital Signal Processing and Modeling
Statistical Digital Signal Processing and Modeling
Independent Component Analysis: Principles and Practice
Independent Component Analysis: Principles and Practice
Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
Kernel independent component analysis
The Journal of Machine Learning Research
Characteristic-function-based independent component analysis
Signal Processing - Special section: Security of data hiding technologies
Topographic Independent Component Analysis
Neural Computation
Kernel Methods for Measuring Independence
The Journal of Machine Learning Research
Source separation in systems with correlated sources using NMF
Digital Signal Processing
Extracting coactivated features from multiple data sets
ICANN'11 Proceedings of the 21th international conference on Artificial neural networks - Volume Part I
Hi-index | 0.01 |
In this paper, we introduce some methods for finding mutually corresponding dependent components from two different but related data sets in an unsupervised (blind) manner. The basic idea is to generalize cross-correlation analysis by taking into account higher-order statistics. We propose independent component analysis (ICA) type extensions for the singular value decomposition of the cross-correlation matrix. They extend cross-correlation analysis in a similar manner as ICA extends standard principal component analysis for covariance matrices. We present experimental results demonstrating the usefulness of the proposed methods both for artificially generated data and for a cryptographic problem.