2022
DOI: 10.1109/tgrs.2022.3161632
|View full text |Cite
|
Sign up to set email alerts
|

Effective Anomaly Space for Hyperspectral Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
44
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(45 citation statements)
references
References 66 publications
1
44
0
Order By: Relevance
“…These experiments were very crucial because they showed that when the sufficient ground truth is necessary for HCEM, ECEM, KTCIMF and DS-BA-TCIMF and LRaSMD-TCIMF and CDASC-TCIMF to perform well as documented in Tables III and IV Specifically, the great advantage of BA-TICMF over the DL-based methods is that BA-TCIMF makes use of data sphering and unsupervised MXSVD to find unwanted BKG signatures through GoDec model. This has been shown by the experiments conducted for the San Diego airport scene in Section VIII in [38] where hCEM and ECEM were shown in [20] to outperform machine learning-based methods in BKG suppression such as PTA (prior-based tensor approximation) in [39], LSDM-MoG (low-rank and sparse decomposition with mixture of Gaussians) in [40] and LRR (low rank representation) in [41] VII. CONCLUSION Target-constrained interference-minimized filter (TCIMF) is an effective subpixel target detector in many applications.…”
Section: Training Sampling -Based Tcimfmentioning
confidence: 79%
See 3 more Smart Citations
“…These experiments were very crucial because they showed that when the sufficient ground truth is necessary for HCEM, ECEM, KTCIMF and DS-BA-TCIMF and LRaSMD-TCIMF and CDASC-TCIMF to perform well as documented in Tables III and IV Specifically, the great advantage of BA-TICMF over the DL-based methods is that BA-TCIMF makes use of data sphering and unsupervised MXSVD to find unwanted BKG signatures through GoDec model. This has been shown by the experiments conducted for the San Diego airport scene in Section VIII in [38] where hCEM and ECEM were shown in [20] to outperform machine learning-based methods in BKG suppression such as PTA (prior-based tensor approximation) in [39], LSDM-MoG (low-rank and sparse decomposition with mixture of Gaussians) in [40] and LRR (low rank representation) in [41] VII. CONCLUSION Target-constrained interference-minimized filter (TCIMF) is an effective subpixel target detector in many applications.…”
Section: Training Sampling -Based Tcimfmentioning
confidence: 79%
“…onto Ω via the projection P Ω . For various comparative analyses can be found in references [14][15]17,30,38], specifically, reference [38]. Those who are interested in Scare encouraged to consult [17,38] for more details of SC interpretations and derivations In particular, Chang in [38] provided how the concept of SC was derived and also offered different versions of SC.…”
Section: End Whilementioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, this approach has been a major trend in anomaly detection. Of particular interest is the LRaSMD model that has been shown in [29], [30], [31], [32], [33], and [34] to take care of BS and noise effectively.…”
Section: Index Terms-anomaly Detector (Ad) Constrained Energy Minimiz...mentioning
confidence: 99%