“…The experiments on three benchmark data sets show its advantages. In the future, we plan to apply the proposed method other applications, such as biometrics [20,27], network analysis [24], human pose estimation [11,10,9], mobile computing [16,8], mathematics [17,2,1,18], etc. The similar approach can also be adopted in other related fields such as systems [6,7,14], and system security [4,5,22].…”