14
IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing the L2-Graph for Robust Subspace Learning and Subspace Clustering Xi Peng, Zhiding Yu, Zhang Yi, Fellow, IEEE, and Huajin Tang, Member, IEEE Abstract—Under the framework of graph-based learning, the key to robust subspace clustering and subspace learning is to obtain a good similarity graph that eliminates the effects of errors and retains only connections between the data points from the same subspace (i.e., intrasubspace data points). Recent works achieve good performance by modeling errors into their objec- tive functions to remove the errors from the inputs. However, these approaches face the limitations that the structure of errors should be known prior and a complex convex problem must be solved. In this paper, we present a novel method to eliminate the effects of the errors from the projection space (represen- tation) rather than from the input space. We first prove that 1 -, 2 -, -, and nuclear-norm-based linear projection spaces share the property of intrasubspace projection dominance, i.e., the coefficients over intrasubspace data points are larger than those over intersubspace data points. Based on this property, we introduce a method to construct a sparse similarity graph, called L2-graph. The subspace clustering and subspace learning algo- rithms are developed upon L2-graph. We conduct comprehensive experiment on subspace learning, image clustering, and motion segmentation and consider several quantitative benchmarks clas- sification/clustering accuracy, normalized mutual information, and running time. Results show that L2-graph outperforms many state-of-the-art methods in our experiments, including L1-graph, low rank representation (LRR), and latent LRR, least square regression, sparse subspace clustering, and locally linear representation. Index Terms—Error removal, feature extraction, robustness, spectral clustering, spectral embedding. I. I NTRODUCTION T HE KEY to graph-based learning algorithms is the sparse eigenvalue problem, i.e., constructing a block-diagonal affinity matrix whose nonzero entries correspond to the data points belonging to the same subspace (i.e., intrasubspace data points). Based on the affinity matrix, a series of subspace Manuscript received December 8, 2015; revised February 21, 2016; accepted February 26, 2016. Date of publication March 15, 2016; date of current version March 15, 2017. This work was supported by the National Natural Science Foundation of China under Grant 61432012. This paper was recommended by Associate Editor L. Shao. (Corresponding author: Huajin Tang.) X. Peng is with the Institute for Infocomm, Research Agency for Science, Technology and Research, Singapore 138632 (e-mail: [email protected]). Z. Yu is with the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213 USA (e-mail: [email protected]). Z. Yi and H. Tang are with the College of Computer Science, Sichuan University, Chengdu 610065, China (e-mail: [email protected]; [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCYB.2016.2536752 learning and subspace clustering algorithms [1]–[4] were pro- posed, where subspace learning aims at learning a projection matrix to reduce the dimensionality of inputs and subspace clustering seeks to categorize inputs into multiple clusters in a low-dimensional space. Broadly speaking, there are two popular ways to build a simi- larity graph, one is based on pairwise distances (e.g., Euclidean distance) [5]–[8] and the other is based on reconstruction coeffi- cients (e.g., sparse representation) [9]–[12]. The second family of methods has recently attracted a lot of interest from the community, where one assumes that each data point can be represented as a linear combination of other points. When the data are clean and the subspaces are mutually independent or disjoint, the approaches such as [13] and [14] can achieve good results. In real applications, however, the data sets are likely to contain various types of noise and data could often lie near the intersection of multiple dependent subspaces. As a result, intersubspace data points (i.e., the data points with different labels) may connect to each other with very high edge weights, which degrades the performance of graph-based methods. To achieve more robust results, some algorithms have been pro- posed [15]–[21]. Vidal [22] conducted a comprehensive survey regarding subspace clustering. Recently, [9]–[12] provided new ways to construct the graph using the sparse or lowest-rank representation. Moreover, Elhamifar and Vidal [9] and Liu et al. [12] remove errors from the inputs by modeling the errors in their objective functions. Through enforcing different constraints (e.g., 2 - or 1 -norm) over errors, the methods can accordingly handle different types of errors (e.g., Gaussian or Laplacian noise), and have achieved good performance in feature extraction and cluster- ing. Inspired by their successes, such error-removing method is widely adopted in a number of approaches [23]–[32]. One major limitation of these approaches is that the struc- ture of errors should be known as the prior knowledge so that the errors can be appropriately formulated into the objective function. In practice, such prior knowledge is often difficult to obtain, while the algorithms may work well only if the assumption on error structure is correct. In addition, these methods must solve a convex problem whose computational complexity is at least proportional to the cubic of the data size. Different from these approaches, we propose a novel error-removing method, where we seek to encode first and then remove errors. The corresponding method can handle errors from various types of projection spaces, including the p -norm- (where p = {1, 2, ∞}) and nuclear-norm-based projection space. The method is based on a mathematically 2168-2267 c 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053

Constructing the L2-Graph for Robust SubspaceLearning and Subspace Clustering

Xi Peng, Zhiding Yu, Zhang Yi, Fellow, IEEE, and Huajin Tang, Member, IEEE

Abstract—Under the framework of graph-based learning, thekey to robust subspace clustering and subspace learning is toobtain a good similarity graph that eliminates the effects of errorsand retains only connections between the data points from thesame subspace (i.e., intrasubspace data points). Recent worksachieve good performance by modeling errors into their objec-tive functions to remove the errors from the inputs. However,these approaches face the limitations that the structure of errorsshould be known prior and a complex convex problem must besolved. In this paper, we present a novel method to eliminatethe effects of the errors from the projection space (represen-tation) rather than from the input space. We first prove that�1-, �2-, �∞-, and nuclear-norm-based linear projection spacesshare the property of intrasubspace projection dominance, i.e.,the coefficients over intrasubspace data points are larger thanthose over intersubspace data points. Based on this property, weintroduce a method to construct a sparse similarity graph, calledL2-graph. The subspace clustering and subspace learning algo-rithms are developed upon L2-graph. We conduct comprehensiveexperiment on subspace learning, image clustering, and motionsegmentation and consider several quantitative benchmarks clas-sification/clustering accuracy, normalized mutual information,and running time. Results show that L2-graph outperformsmany state-of-the-art methods in our experiments, includingL1-graph, low rank representation (LRR), and latent LRR, leastsquare regression, sparse subspace clustering, and locally linearrepresentation.

Index Terms—Error removal, feature extraction, robustness,spectral clustering, spectral embedding.

I. INTRODUCTION

THE KEY to graph-based learning algorithms is the sparseeigenvalue problem, i.e., constructing a block-diagonal

affinity matrix whose nonzero entries correspond to the datapoints belonging to the same subspace (i.e., intrasubspace datapoints). Based on the affinity matrix, a series of subspace

Manuscript received December 8, 2015; revised February 21, 2016;accepted February 26, 2016. Date of publication March 15, 2016; date ofcurrent version March 15, 2017. This work was supported by the NationalNatural Science Foundation of China under Grant 61432012. This paperwas recommended by Associate Editor L. Shao. (Corresponding author:Huajin Tang.)

X. Peng is with the Institute for Infocomm, Research Agency for Science,Technology and Research, Singapore 138632 (e-mail: [email protected]).

Z. Yu is with the Department of Electrical and Computer Engineering,Carnegie Mellon University, Pittsburgh, PA 15213 USA (e-mail:[email protected]).

Z. Yi and H. Tang are with the College of Computer Science,Sichuan University, Chengdu 610065, China (e-mail: [email protected];[email protected]).

Color versions of one or more of the figures in this paper are availableonline at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TCYB.2016.2536752

learning and subspace clustering algorithms [1]–[4] were pro-posed, where subspace learning aims at learning a projectionmatrix to reduce the dimensionality of inputs and subspaceclustering seeks to categorize inputs into multiple clusters ina low-dimensional space.

Broadly speaking, there are two popular ways to build a simi-larity graph, one is based on pairwise distances (e.g., Euclideandistance) [5]–[8] and the other is based on reconstruction coeffi-cients (e.g., sparse representation) [9]–[12]. The second familyof methods has recently attracted a lot of interest from thecommunity, where one assumes that each data point can berepresented as a linear combination of other points. When thedata are clean and the subspaces are mutually independent ordisjoint, the approaches such as [13] and [14] can achieve goodresults. In real applications, however, the data sets are likelyto contain various types of noise and data could often lie nearthe intersection of multiple dependent subspaces. As a result,intersubspace data points (i.e., the data points with differentlabels) may connect to each other with very high edge weights,which degrades the performance of graph-based methods. Toachieve more robust results, some algorithms have been pro-posed [15]–[21]. Vidal [22] conducted a comprehensive surveyregarding subspace clustering.

Recently, [9]–[12] provided new ways to construct the graphusing the sparse or lowest-rank representation. Moreover,Elhamifar and Vidal [9] and Liu et al. [12] remove errors fromthe inputs by modeling the errors in their objective functions.Through enforcing different constraints (e.g., �2- or �1-norm)over errors, the methods can accordingly handle differenttypes of errors (e.g., Gaussian or Laplacian noise), and haveachieved good performance in feature extraction and cluster-ing. Inspired by their successes, such error-removing methodis widely adopted in a number of approaches [23]–[32].

One major limitation of these approaches is that the struc-ture of errors should be known as the prior knowledge so thatthe errors can be appropriately formulated into the objectivefunction. In practice, such prior knowledge is often difficultto obtain, while the algorithms may work well only if theassumption on error structure is correct. In addition, thesemethods must solve a convex problem whose computationalcomplexity is at least proportional to the cubic of the data size.

Different from these approaches, we propose a novelerror-removing method, where we seek to encode first andthen remove errors. The corresponding method can handleerrors from various types of projection spaces, including the�p-norm- (where p = {1, 2,∞}) and nuclear-norm-basedprojection space. The method is based on a mathematically

2168-2267 c© 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

1054 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017

trackable property of the projection space: intrasubspace pro-jection dominance (IPD), which says that small coefficients(trivial coefficients) always correspond to the projections overerrors. With the IPD property, we further propose the L2-graphfor subspace clustering and subspace learning considering thecase of �2-norm. Despite the fact that the error structure isunknown and the data are grossly corrupted, the proposedmethod is able to achieve good performance.

The contributions of this paper is summarized as follows.1) We prove the IPD property shared by �1-, �2-, �∞-, and

nuclear-norm-based projection spaces, which makes theelimination of errors from projection space possible.

2) With the IPD property, we propose a graph-constructionmethod under �2-norm considering its computationalefficiency. The proposed method (L2-graph) measuresthe similarity among data points through the recon-struction coefficients. There is a closed-form solutionto obtain the coefficients and the proposed method ismore efficient than [9]–[12] and [24].

3) Under the framework of graph embedding [33], [34], wedevelop two new algorithms, respectively, for robust sub-space clustering and subspace learning, by embeddingthe L2-graph into a low-dimensional space.

This paper is an extension of the work in [35]. Comparedwith [35], we further improve this paper from the followingseveral aspects.

1) Besides �1-, �2-, and �∞-norm-based projection space,we prove that nuclear-norm-based projection space alsopossesses the property of IPD.

2) Motivated by the success of sparse representation insubspace learning [10], [11], [32], [36], we proposea new subspace learning method derived upon theL2-graph. Extensive experimental results show that ourmethod outperform state-of-the-art feature extractionmethods such as sparse subspace clustering (SSC) [9]and low rank representation (LRR) [12] in accuracy androbustness.

3) We explore the potential of L2-graph in estimating thelatent structures of data.

4) Besides image clustering, we extend L2-graph in theapplications of motion segmentation and unsupervisedfeature extraction.

5) We investigate the performance of our method morethoroughly (eight new data sets).

6) We conduct comprehensive analysis for our method,including the influence of different parameters, differ-ent types of errors (e.g., additive/nonadditive noisesand partial disguises), and different experimentalsettings.

The rest of this paper is organized as follows. Section IIpresents some related works on graph construction methods.Section III proves that it is feasible to eliminate the effectsof errors from the representation. Section IV proposes theL2-graph algorithm and two methods for subspace learningand subspace clustering derived upon L2-graph. Section Vreports the performance of the proposed methods in thecontext of feature extraction, image clustering, and motionsegmentation. Finally, Section VI summarizes this paper.

TABLE INOTATIONS AND ABBREVIATIONS

A. Notations

Unless specified otherwise, lower-case bold letters denotecolumn vectors and upper-case bold ones denote matrices.AT and A−1 denote the transpose and pseudo-inverse of thematrix A, respectively. I denotes the identity matrix. Table Isummarizes some notations and abbreviations used throughoutthis paper.

II. RELATED WORK

Over the past two decades, a number of graph-based algo-rithms have been proposed with various applications such asfeature extraction [34], subspace clustering [37], and objecttracking [38]. The key to these algorithms is the constructionof the similarity graph and the performance of the algorithmslargely hinges on whether the graph can accurately determinethe neighborhood of each data point, particularly when thedata set contains errors.

There are two ways to build a similarity graph, i.e., thepairwise distance and the reconstruction coefficients. In thepairwise distance setting, one of the most popular metric isEuclidean distance with heat kernel, that is

similarity(xi, xj

) = exp−‖xi−xj‖22

τ (1)

where xi and xj denote two data points and τ denotes thewidth of the heat kernel.

This metric has been used to build the similarity graph forsubspace clustering [33] and subspace learning [14]. However,pairwise distance is sensitive to noise and outliers since itsvalue only depends on the corresponding two data points.Consequently, pairwise distance-based algorithms may fail tohandle noise corrupted data.

Alternatively, reconstruction coefficients-based similarity isdata-adaptive. Such property benefits the robustness, and asa result these algorithms have become increasingly popular,especially in high-dimensional data analysis. Three reconstruc-tion coefficients are widely used to represent the neighborrelations among data points, i.e., locally linear representa-tion (LLR) [1], sparse representation (SR), and LRR.

Page 3: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

PENG et al.: CONSTRUCTING THE L2-GRAPH FOR ROBUST SUBSPACE LEARNING AND SUBSPACE CLUSTERING 1055

For each data point xi, LLR seeks to solve the followingoptimization problem:

min ‖xi − Dici‖22 s.t. 1Tci = 1 (2)

where ci ∈ Rk is the coefficient of xi over Di ∈ Rm×k andDi consists of k nearest neighbors of xi in terms of Euclideandistance. Another well known relevant work is neighborhoodpreserving embedding (NPE) [34] which uses LLR to con-struct the similarity graph for subspace learning. A significantproblem associated with such methods is that they cannotachieve a good result unless the data are uniformly sampledfrom a smooth manifold. Moreover, if the data are grosslycorrupted, the performance of these methods will degradeconsiderably.

Different from LLR, SR uses a few bases to represent eachdata point. Such strategy is widely used to construct the sim-ilarity graph for subspace clustering [9], [11] and subspacelearning [10], [11]. A robust version of SR is

minC,E,Z

‖C‖1 + λE‖E‖1 + λZ‖Z‖F

s.t. X = XC + E + Z, 1TC = 1, diag(C) = 0 (3)

where ‖C‖1 denotes the �1-norm of the vectorized form of thematrix C, X ∈ Rm×n is the given data set, C ∈ Rn×n denotesthe sparse representation of the data set X, E corresponds tothe sparse outlying entries, and Z denotes the reconstructionerrors caused by the constrained representation flexibility. 1 isa column vector with n entries of 1, and the parameters λE

and λZ balance the cost terms of the objective function.Different from SR, LRR uses the low rank representation to

build the graph, which is proved to be very effective in sub-space clustering [12] and subspace learning [24]. The methodsolves the following optimization problem:

min ‖C‖∗ + λ‖E‖p s.t. X = XC + E (4)

where ‖·‖∗ denotes the nuclear norm that summarizes thesingular value of a given data matrix. ‖·‖p could be cho-sen as �2,1-, �1-, or Frobenius-norm. The choice of the normonly depends on which kind of error is assumed in thedata set. Specifically, �2,1-norm is usually adopted to depictsample-specific corruption and outliers, �1-norm is used tocharacterize random corruption, and Frobenius norm is usedto describe the Gaussian noise.

From (3) and (4), it is easy to see that SR and LRR-basedmethods remove errors from the input space by modeling themin their objective functions. A number of works [23]–[25], [27]have also adopted such error-removing strategy, showing itseffectiveness in various applications. In this paper, we pro-pose a novel error-removing method that seeks to eliminatethe effect of errors from the projection space instead of theinput space. The method is mathematically trackable and doesnot suffer from the limitation of error structure estimation asmost existing methods do.

III. INTRASUBSPACE PROJECTION DOMINANCE

In this section, we show the conditions under which theproperty of IPD holds. We theoretically prove that IPD holds

for �1-, �2-, and �∞-norm under certain conditions, and furtherextend such property to the case of nuclear-norm.

A. IPD in �p-Norm-Based Projection Space

Let x �= 0 be a data point drawn from the union of subspaces(denoted by SD) that is spanned by D = [Dx D−x], whereDx and D−x consist of the intracluster and intercluster datapoints of x, respectively. Note that in our setting, noise andoutliers are regarded as the intercluster data points of x, sincethe corrupted data and outliers are often distributed relativelyfar from subspaces. Without loss of generality, let SDx andSD−x be the subspace spanned by Dx and D−x, respectively.Obviously, x lies either in the intersection between SDx andSD−x , or in SDx except the intersection. Mathematically, wedenote these two cases as

Case 1: x ∈ {S|S = SDx ∩ SD−x}.Case 2: x ∈ {S|S = SDx\SD−x}.Let c∗ be the optimal solution of

min ‖c‖p s.t. x = Dc (5)

where ‖·‖p denotes the �p-norm, p = {1, 2,∞}. Let

c∗ =[

c∗Dx

c∗D−x

](6)

be a partition of c∗ according to the data set D = [Dx D−x].We aim to investigate the conditions under which, for anynonzero data point x ∈ SDx (in either case 1 or case 2), thecoefficients over intrasubspace data points are larger than thoseover intersubspace data points (i.e., the IPD property). In otherwords, the following inequality is satisfied:

[c∗

Dx

]rx,1

>[c∗

D−x

]

1,1(7)

where [c∗Dx

]rx,1 denotes the rxth largest absolute value of theentries of c∗

Dx, and rx is the dimensionality of SD.

To prove that the inequality (7) holds, we first haveLemma 1 which gives the necessary and sufficient conditionin case 1.

Lemma 1: Let y ∈ SDx and y ∈ SD−x be any two datapoints belonging to different subspaces. Consider a nonzerodata point x on the intersection of subspaces, i.e., x ∈ {S|S =SDx ∩ SD−x}. Let zDx and zD−x , respectively, be the solutionsof min ‖z‖p, s.t. y = Dxz and min ‖z‖p, s.t. y = D−xz. Thenc∗

D−x= 0 and [c∗

Dx]rx,1 > [c∗

D−x]1,1, if and only if ‖zDx‖p <

‖zD−x‖p.Proof: (⇐=) We prove the result using contradiction.

Assume c∗D−x

�= 0, then

x − Dxc∗Dx

= D−xc∗D−x

. (8)

First, denote the left side of (8) by y, that is

y = x − Dxc∗Dx

(9)

then, y must belong to SDx as x ∈ SDx . Let y = DxzDx andsubstitute it into (9), we have

x = Dxc∗Dx

+ DxzDx (10)

where zDx is an optimal solution of y in terms of (5).

Page 4: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

1056 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017

Moreover, the right side of (8) corresponds to the data pointy that lies in SD−x . Similarly, denoting y = D−xzD−x andsubstituting y into (8), we have

x = Dxc∗Dx

+ D−xzD−x (11)

where zD−x is an optimal solution of y in terms of (5).

Equations (10) and (11) show that,

[c∗

Dx+ zDx

0

]and

[c∗

Dx

zD−x

]

are two feasible solutions of (5) over D. According to thetriangle inequality and the condition ‖zDx‖p < ‖zD−x‖p,we have∥∥∥∥

[c∗

Dx+ zDx

0

]∥∥∥∥

p≤ ∥∥c∗

Dx

∥∥p+ ‖zDx‖p <

∥∥c∗Dx

∥∥p+ ‖zD−x‖p.

(12)

As zD−x is the optimal solution of (5) over D−x with respectto y, then ‖zD−x‖p ≤ ‖c∗

D−x‖p. Substituting this into (12), we

have

∥∥∥∥

[c∗

Dx+ zDx

0

]∥∥∥∥p

<

∥∥∥∥

[c∗

Dx

c∗D−x

]∥∥∥∥p

. It contradicts the fact that∥∥∥∥

[c∗

Dx

c∗D−x

]∥∥∥∥

p

is the optimal solution of (5) over D.

(=⇒) We prove the result using contradiction. For anynonzero data point x ∈ {S|S = SDx ∩ SD−x}, assume‖zDx‖p ≥ ‖zD−x‖p. Thus, for the data point x, (5) will onlychoose the points from SD−x to represent x. This contradictsto the conditions c∗

Dx�= 0 and c∗

D−x= 0.

Similar to the above proof, the following theorem guaranteesthe IPD property in case 2.

Theorem 1: The inequality (7) holds in case 2 if the con-dition ‖zDx‖p < ‖zD−x‖p is satisfied, where zDx and zD−x areoptimal solutions of y ∈ SDx and y ∈ SD−x in terms of (5).

Proof: For any nonzero data point x ∈ {S|S = SDx\SD−x},‖zDx‖p < ‖zD−x‖p is the sufficient condition to guarantee theIPD property in case 1. The proof is same with the sufficientcondition in Lemma 1.

Lemma 1 does not bridge the relationship between IPD andthe data distribution. To establish such relationship, we mea-sure the distance among the subspaces SDx and SD−x usingthe first principle angle θmin and show that the IPD propertyholds in case 1 under such a setting. For ease of presentingTheorem 2, we first provide Definition 1 below.

Definition 1 (The First Principal Angle): Let ξ be aEuclidean vector-space, and consider the two subspacesW and V with dim(W) := rW ≤ dim(V) := rV . There existsa set of angles {θi}rW

i=1 called the principal angles, the firstone being defined as

θmin := minμ,ν

{arccos

(μTν

‖μ‖2‖ν‖2

)}(13)

where μ ∈ W and ν ∈ V .Theorem 2: In case 1, the inequality (7) will hold if the

following condition is satisfied:

σmin(Dx) ≥ cos θmin‖D−x‖max,2 (14)

where σmin(Dx) is the smallest nonzero singular value of Dx,θmin is the first principal angle between Dx and D−x, and‖D−x‖max,2 is the maximum �2-norm of the columns of D−x.

Proof: Since x ∈ {S|S = SDx ∩ SD−x}, we could writex = Urxrx VT

rxzDx , where rx is the rank of Dx, Dx =

Urxrx VTrx

is the skinny singular value decomposition (SVD)of Dx, rx = diag(σ1(Dx), σ2(Dx), . . . , σrx(Dx)), and zDx isthe optimal solution of (5) over Dx. Thus, zDx = Vrx

−1rx

UTrx

x.From the propositions of p-norm, i.e., ‖z‖∞ ≤ ‖z‖1 ≤

n‖z‖∞, ‖z‖∞ ≤ ‖z‖2 ≤ √n‖z‖∞, and ‖z‖2 ≤ ‖z‖1 ≤√

n‖z‖2, we have

‖zDx‖p ≤ ‖zDx‖1 ≤ √n‖zDx‖2 = √

n∥∥∥Vrx

−1rx

UTrx

x∥∥∥

2. (15)

Since n/rx ≥ 1 and the Frobenius norm is subordinate tothe Euclidean vector norm, we must have

‖zDx‖p ≤ √n∥∥∥Vrx

−1rx

UTrx‖F‖x

∥∥∥2

=√

n√

σ 21 (Dx) + · · · + σ 2

rx(Dx)

‖x‖2

≤ σ−1min(Dx)‖x‖2 (16)

where σmin(Dx) = σrx(Dx) is the smallest nonzero singularvalue of Dx.

Moreover, x could be represented as a linear combina-tion of D−x since it lies in the intersection between SDx

and SD−x , i.e., x = D−xzD−x , where zD−x is the optimalsolution of (5) over D−x. Multiplying two sides of the equa-tion with xT , it gives ‖x‖2 = xTD−xzD−x . According to theHölder’s inequality, we have

‖x‖22 ≤ ∥∥DT−xx

∥∥∞‖zD−x‖1. (17)

According to the definition of the first principal angles(Definition 1), we have

∥∥DT−xx∥∥∞ = max

(∣∣∣[D−x

]T1 x

∣∣∣,

∣∣∣[D−x

]T2 x

∣∣∣, . . .

)

≤ cos θmin‖D−x‖max,2‖x‖2 (18)

where [D−x]i denotes the ith column of D−x, θmin is thefirst principal angle between SDx and SD−x , and ‖D−x‖max,2denotes the maximum �2-norm of the columns of D−x. Notethat the smallest principal angle between any two subspacesalways greater than zero, hence, cos θmin ∈ [0, 1).

Combining (17) and (18), it gives that

‖x‖22 ≤ cos θmin‖D−x‖max,2‖x‖2‖zD−x‖1 (19)

hence

‖zD−x‖1 ≥ ‖x‖2

cos θmin‖D−x‖max,2. (20)

From the propositions of p-norm, we have

‖zD−x‖p ≥ ‖x‖2

cos θmin‖D−x‖max,2. (21)

Let ‖zDx‖p < ‖zD−x‖p, then

σ−1min(Dx)‖x‖2 <

‖x‖2

cos θmin‖D−x‖max,2(22)

then

σmin(Dx) > cos θmin‖D−x‖max,2. (23)

It is the sufficient condition for [c∗Dx

]rx,1 > [c∗D−x

]1,1 sinceit implies c∗

Dx�= 0 and c∗

D−x= 0 according to Lemma 1.

Page 5: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

PENG et al.: CONSTRUCTING THE L2-GRAPH FOR ROBUST SUBSPACE LEARNING AND SUBSPACE CLUSTERING 1057

Fig. 1. Toy example of the IPD in �2-norm-based projection space. (a) Given data sets come from two clusters, indicated by different shapes. Note that eachcluster corresponds to a subspace, and the two subspaces are dependent. (b) and (c) Similarity graph in �2-norm-based projection space and the coefficients ofa data point x. The first and the last 25 values in (c) correspond to the coefficients (similarity) over the intracluster and intercluster data points, respectively.(d) and (e) Similarity graph achieved by our method and the coefficients of x. For each data point, only the two largest coefficients are nonzero, correspondingto the projection over the base of R2. From (b) and (d), the intercluster data point connections are removed and the data are successfully separated intorespective clusters.

B. IPD in Nuclear-Norm-Based Projection Space

Nuclear-norm has been widely used as a convex relaxationof the rank, when solving many rank-minimization problems.Based on the theoretical results in [12] and [25], we show thatthe IPD property is also satisfied by the nuclear-norm case.

Lemma 2 [12]: Let D = UrrVTr be the skinny SVD of

the data matrix D. The unique solution to

min ‖C‖∗ s.t. D = DC (24)

is given by C∗ = VrVTr , where r is the rank of D.

Note that, Lemma 2 implies the assumption that the datamatrix D is free to errors.

Lemma 3 [25]: Let D = UVT be the SVD of the datamatrix D. The optimal solution to

minC,D0

‖C‖∗ + α

2‖D − D0‖2

F s.t. D0 = D0C (25)

is given by D∗0 = U11VT

1 and C∗ = V1VT1 , where 1, U1,

and V1 contain top k∗ = argmink

(k + (α/2)∑

i>k σ 2i ) singular

values and singular vectors of D, respectively.Theorem 3: Let C∗ = UCCVT

C be the skinny SVD of theoptimal solution to

min ‖C‖∗ s.t. D = DC (26)

where D consists of the clean data set D0 and the errors De,i.e., D = D0 + De.

The optimal solution to

minC0,D0

‖C0‖∗ + α

2‖De‖2

F s.t. D0 = D0C0, D = D0 + De

(27)

is given by C∗0 = UCHk∗(C)VT

C, where Hk(x) is a truncationoperator that retains the first k elements and sets the otherelements to zero, k∗ = argmin

k(k + (α/2)

∑i>k σ 2

i ), and σi is

the ith largest singular value of D.Proof: Suppose the rank of data matrix D is r, let D =

UVT and D = UrrVTr be the SVD and skinny SVD of D,

respectively. Hence, we have U = [Ur U−r], =[r 00 0

]and

V =[

VTr

VT−r

], where I = UT

r Ur+UT−rU−r, I = VTr Vr+VT−rV−r,

UTr U−r = 0, and VT

r V−r = 0.

On the one hand, from Lemma 2, the optimal solutionof (26) is given by C∗ = VrVT

r which is a skinny SVD for C∗.Therefore, we can choose UC = Vr, C = I and VC = Vr.On the other hand, from Lemma 3, the optimal solution of (27)is given by C∗

0 = V1VT1 , where V1 is the top k∗ right singular

vectors of D. Therefore, we can conclude that V1 correspondsto the top k∗ singular vector of Vr owing to k∗ ≤ r, i.e.,C∗

0 = UCHk∗(C)VTC, where Hk(x) keeps the first k elements

and sets the other elements to zero.This completes the proof.Theorem 3 proves the IPD of nuclear-norm-based projec-

tion space. It is noted that it is slightly different from thecase of �p-norm. The IPD of nuclear-norm-based space showsthat the eigenvectors corresponding the bottom eigenvaluesare coefficients over errors, whereas the trivial coefficientsin �p-norm-based space directly correspond to the codes overerrors.

The IPD property forms the fundamental theoretical basisfor the subsequent L2-graph algorithm. According to the IPD,the coefficients over intrasubspace is always larger than thoseover the errors in terms of �p- and nuclear-norm-based projec-tion space. Hence, the effect of the errors can be eliminated bykeeping k largest entries and zeroing the other entries, wherek equals to the dimensionality of the corresponding subspace.We summarize such errors-handling method as “encoding andthen removing errors from projection space.” Compared withthe popular method “removing errors from input space andthen encoding,” the proposed method does not require the priorknowledge on the structure of errors.

Fig. 1 shows a toy example illustrating the IPD in the�2-norm-based projection space, where the data points aresampled from two dependent subspaces corresponding to twoclusters in R2. In this example, the errors (the intersectionbetween two dependent subspaces) lead to the connectionsbetween the intercluster data points and the weights ofthese connections are smaller than the edge weights betweenthe intracluster data points [Fig. 1(b)]. By thresholding theconnections with trivial weight, we obtain a new similar-ity graph as shown in Fig. 1(d). Clearly, this toy exampleagain shows the IPD property of �2-norm-based projectionspace and the effectiveness of the proposed errors-removingmethod.

Page 6: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

1058 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017

IV. CONSTRUCTING THE L2-GRAPH FOR ROBUST

SUBSPACE LEARNING AND SUBSPACE CLUSTERING

In this section, we present the L2-graph method basedon the IPD property of �2-norm-based projection space. Wechose �2-norm rather than the others such as �1-norm since�2-norm-based objective function can be analytically solved.Moreover, we generalize our proposed framework to subspaceclustering and subspace learning by incorporating L2-graphinto spectral clustering [33] and subspace learning [34].

A. Algorithms Description

Let X = {x1, x2, . . . , xn} be a collection of data pointslocated on a union of subspaces {S1, S2, . . . , SL} and Xi =[x1, . . . , xi−1, 0, xi+1, . . . , xn], (i = 1, . . . , n). In the follow-ing, we use the data set Xi as the dictionary of xi, i.e.,D = Xi for the specific xi. The proposed objective function isas follows:

minci

1

2‖xi − Xici‖2

2 + λ

2‖ci‖2

2 (28)

where λ ≥ 0 is the ridge regression parameter to avoidoverfitting.

Equation (28) is actually the well-known ridge regressionproblem [39], which has been investigated in the context offace recognition [40]. There is, however, a lack of examina-tion on its performance in subspace clustering and subspacelearning. The optimal solution of (28) is (XT

i Xi + λI)−1XTi xi.

This means that the computational complexity is O(mn4) forn data points with m dimensions, which is very inefficient. Tosolve this problem, we rewrite (28) as

minci

1

2‖xi − Xci‖2

2 + λ

2‖ci‖2

2, s.t. eTi ci = 0. (29)

Using Lagrangian method, we have

L(ci) = 1

2‖xi − Xci‖2

2 + λ

2‖ci‖2

2 + γ eTi ci (30)

where γ is the Lagrangian multiplier. Clearly

∂L(ci)

∂ci= (

XTX + λI)ci − XTxi + γ ei. (31)

Let (∂L(ci)/∂ci) = 0, we obtain

ci = (XTX + λI

)−1(XTxi − γ ei

). (32)

Multiplying both sides of (32) by eTi , and since eT

i ci = 0,it holds that

γ = eTi

(XTX + λI

)−1XTxi

eTi

(XTX + λI

)−1ei

. (33)

Substituting γ into (32), the optimal solution is given by

c∗i = P

[

XTxi − eTi Qxiei

eTi Pei

]

(34)

where

P = (XTX + λI

)−1(35)

Q = PXT (36)

Algorithm 1 Robust Subspace Learning With L2-GraphInput: A given data set X = {xi}n

i=1, a new coming datumy ∈ span{X}, the tradeoff parameter λ and the thresholdingparameter k.

1: Calculate P and Q as in (35) and (36), and store them.2: For each point xi, obtain its representation ci via (34).3: For each ci, eliminate the effect of errors in the projec-

tion space via ci = Hk(ci), where the hard thresholdingoperator Hk(ci) keeps k largest entries in ci and zeroesthe others.

4: Construct an affinity matrix by Wij = |cij| + |cji| and nor-malize each column of W to have a unit �2-norm, wherecij is the jth entry of ci.

5: Embed W into a m′-dimensional space and calculate theprojection matrix ∈ Rm×m′

via solving

min

∥∥ TD − TDW∥∥2

F, s.t. TDDT = I, (37)

Output: The projection matrix and the low-dimensionalrepresentation of y via z = Ty.

Algorithm 2 Robust Subspace Clustering With L2-GraphInput: A collection of data points X = {xi}n

i=1 sampled froma union of linear subspaces {Si}c

i=1, the tradeoff parameterλ and thresholding parameter k;

1: Calculate P and Q as in (35) and (36), and store them.2: For each point xi, obtain its representation ci via (34).3: For each ci, eliminate the effect of errors in the projec-

tion space via ci = Hk(ci), where the hard thresholdingoperator Hk(ci) keeps k largest entries in ci and zeroesthe others.

4: Construct an affinity matrix by Wij = |cij| + |cji| and nor-malize each column of W to have a unit �2-norm, wherecij is the jth entry of ci.

5: Construct a Laplacian matrix L = −1/2W−1/2, where = diag{si} with si = ∑n

j=1 Wij.6: Obtain the eigenvector matrix V ∈ Rn×c which consists

of the first c normalized eigenvectors of L correspondingto its c smallest nonzero eigenvalues.

7: Perform k-means clustering algorithm on the rows of V.Output: The cluster assignment of X.

and the union of ei (i = 1, . . . , n) is the standard orthogonalbasis of Rn, i.e., all entries in ei are zeroes except the ithentry is 1.

After projecting the data set into the linear space spannedby itself via (34), L2-graph handles the errors by perform-ing a hard thresholding operator Hk(·) over ci, where Hk(·)keeps k largest entries in ci and zeroizes the others. Generally,the optimal k equals to the dimensionality of correspondingsubspace.

Once the L2-graph was built, we perform subspace learningand subspace clustering with it. The proposed methods aresummarized in Algorithms 1 and 2, respectively.

Page 7: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

PENG et al.: CONSTRUCTING THE L2-GRAPH FOR ROBUST SUBSPACE LEARNING AND SUBSPACE CLUSTERING 1059

Fig. 2. Estimating the latent structure of a given data set. The used data set contains 580 frontal images drawn from the first ten subjects of the ExYaleB [41].(a) Dotted curve plots the eigenvalues of L and the red solid line plots the discretized eigenvalues. One can find that the number of the unique nonzeroeigenvalues is 10. This means that the data set contains ten subjects. (b) Affinity matrix W ∈ R58×58 obtained by our algorithm. The experiment was carriedout on the first 58 samples of the first subject of ExYaleB. The left column and the top row illustrate some images. The dotted lines split the matrix into fourparts. Top-left part: the similarity relationship among the first 32 images which are illuminated from right side. Bottom-right part: the relationship among theremaining 26 images which are illuminated from left side. From the connections, it is easy to find that our method reflects the variation in the direction oflight source. (c) Eigenvalues of W. One could find that most energy concentrates to the first six components. This means that the intrinsic dimensionality ofthese data is around 6. The result is consistent with [42].

B. Computational Complexity Analysis

Given X ∈ Rm×n, the L2-graph takes O(mn2 + n3) to com-pute and store the matrices {P, Q} defined in (35) and (36). Itthen projects each data point into another space via (34) withcomplexity O(mn). Moreover, to eliminate the effects of errors,it requires O(k log k) to find k largest coefficients. Puttingeverything together, the computational complexity of L2-graphis O(mn2 + n3). This cost is considerably less than sparserepresentation-based methods [9]–[11] (O(tm2n2 + tmn3)) andLRR [12] (O(tnm2 + tn3)), where t denotes the total numberof iterations for the corresponding algorithm.

C. Estimating the Structure of Data Space With L2-Graph

In this section, we show how to estimate the number of sub-spaces, the submanifold of the given data set, and the subspacedimensionality with L2-graph.

When the obtained affinity matrix W is strictly block-diagonal, i.e., Wij �= 0 only if the data points di and dj

belong to the same subspace, one can predict the num-ber of subspace by counting the number of unique singularvalue of the Laplacian matrix L as suggested by [37], whereL = I−−1/2W−1/2 and = diag(si) with si = ∑n

j=1 Wij.In most cases, however, W is not strictly block-diagonal andtherefore such method may fail to get the correct result.Fig. 2(a) shows an example by plotting the eigenvalues ofL derived upon L2-graph (dotted curve). To solve this prob-lem, we perform the DBSCAN method [43] to discretize theeigenvalues of L. The processed eigenvalues are plotted in thesolid line. One can find that the values decrease from 0.002 to0.0011 with an interval of 0.0001. Thus, the estimated numberof subspaces is ten by counting the number of unique nonzeroeigenvalues. The result is in accordance with the ground truth.

To estimate the intrinsic dimensionality of subspace, we givean example by using the first 58 samples from the first sub-ject of extended Yale B database (ExYaleB) and building anaffinity matrix W using L2-graph as shown in Fig. 2(b). We

perform principle component analysis (PCA) on W and countthe number of the eigenvalues above a specified threshold.The number is regarded as the intrinsic dimensionality of thesubspace as shown in Fig. 2(c). Note that, Fig. 2(b) showsthat L2-graph can also reveal the submanifolds of the givendata set, i.e., two submanifolds corresponding to two direc-tions of light source in this example. This ability is helpful inunderstanding the latent data structure.

V. EXPERIMENTAL VERIFICATION AND ANALYSIS

In this section, we evaluate the performance of the L2-graphin the context of subspace learning and subspace clustering.Besides face clustering, we investigate the performance ofL2-graph for motion segmentation which is another applica-tion of subspace clustering. We consider the results in terms ofthree aspects: 1) accuracy; 2) robustness; and 3) computationalcost. Robustness is evaluated by performing experiments usingcorrupted samples. In our setting, three types of corruptionsare considered, i.e., Gaussian noise, random pixel corruption,and the images with real disguises.

A. Subspace Learning

1) Baselines: In this section, we report the performance ofL2-graph for robust feature extraction. The baseline methodsinclude LPP [14], NPE [34], eigenfaces [44], L1-graph [11],LRR [12], and latent LRR (LatLRR) [24]. We implement a fastversion of L1-graph using homotopy algorithm [45] to com-pute the sparse representation. According to [46], homotopyis one of the most competitive �1-minimization algorithms interms of accuracy, robustness, and convergence speed. LRRand LatLRR are incorporated into the framework of NPEto obtain low-dimensional features similar to L2-graph andL1-graph. After the low-dimensional features are extracted,we perform the nearest neighbor classifier to verify the per-formance of the tested methods. By following [10]–[12], wetune the parameters of LPP, NPE, L1-graph, LRR, and LatLRR

Page 8: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

1060 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017

Fig. 3. (a) Classification accuracy of the tested methods with increasing training AR1 images. (b) Recognition rate of 1-NN classifier with different subspacelearning methods over ExYaleB.

TABLE IIUSED DATABASES. c AND ni DENOTE THE NUMBER OF SUBJECTS

AND THE NUMBER OF SAMPLES FOR EACH SUBJECT

to achieve their best results. For L2-graph, we fix λ = 0.1 andassigned different k for different data sets. The used data setsand the MATLAB codes of L2-graph can be downloaded athttp://www.machineilab.org/users/pengxi.

2) Data Sets: Several popular facial data sets are usedin our experiments, including ExYaleB [41], AR [47], andmultiple PIE (MPIE) [48].

ExYaleB contains 2414 frontal-face images of 38 subjects(about 64 images for each subject), and we use the first 58samples of each subject. Following [49], we use a subsetof AR data set which contains 2600 samples from 50 maleand 50 female subjects. Specifically, it contains 1400 sampleswithout disguise, 600 images with sunglasses and 600 imageswith scarves. MPIE contains the facial images captured in foursessions. In the experiments, all the frontal faces with 14 illu-minations are investigated. For computational efficiency, weresize each images from the original size to smaller one (seeTable II).

Each data set is randomly divided into two parts, i.e., train-ing data and testing data. Thus, both training data and testingdata may contain samples with or without corruptions. Inexperiments, training data are used to learn a projection matrix,and the test datum is assigned to the nearest training datumin the projection space. For each algorithm, the same trainingand testing data partitions are used.

3) Performance With Varying Training Sample and FeatureDimension: In this section, we report the recognition results ofL2-graph over AR1 with increasing training data and ExYaleBwith varying feature dimension. For the first test, we randomlyselect ni AR images from each subject for training and usedthe rest for testing. Hence, we have ni training samples and14 − ni testing samples for each subject. For the second test,we split ExYaleB into two parts with equal size and perform1-NN classifier over the first m′ features, where m′ increasesfrom 1 to 600 with an interval of 10.

From Fig. 3, one can conclude that: 1) L2-graph performswell even though only a few of training data are available.Its accuracy is about 90% when ni = 4, and the secondbest method achieve the same accuracy when ni = 8 and2) L2-graph performs better than the other tested methodswhen m′ ≥ 50. When more features are used (m′ ≥ 350), LRRand LatLRR are comparable to NPE and eigenfaces whichachieved the second and the third best result.

4) Subspace Learning on Clean Facial Images: In this sec-tion, the experiments are conducted using MPIE. For eachsession of MPIE, we split it into two parts with the same datasize. For each test, we fix λ = 0.1 and k = 6 for L2-graphand tuned the parameters for the other algorithms.

Table III reports the results. One can find that L2-graphoutperforms the other investigated approaches. The proposedmethod achieves 100% recognition rates on the second and thethird sessions of MPIE. In fact, it could have also achievedperfect classification results on MPIE-S1 and MPIE-S4 if dif-ferent λ and k are allowed. Moreover, L2-graph uses lessdimensions but provides more discriminative information.

5) Subspace Learning on Corrupted Facial Images: In thissection, we investigate the robustness of L2-graph (λ = 0.1and k = 15) against two popular corruptions using ExYaleBover 38 subjects, i.e., white Gaussian noise (additive noise) andrandom pixel corruption (nonadditive noise). Fig. 4 illustratessome samples.

In the tests, we randomly chose a half of images (29 imagesper subject) to add these two types of corruptions. Specifically,we add white Gaussian noise to the chosen sample x via x =x + ρn, where x ∈ [0 255], ρ is the corruption ratio, and n

Page 9: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

PENG et al.: CONSTRUCTING THE L2-GRAPH FOR ROBUST SUBSPACE LEARNING AND SUBSPACE CLUSTERING 1061

TABLE IIIRECOGNITION RATE OF 1-NN CLASSIFIER WITH DIFFERENT SUBSPACE LEARNING ALGORITHMS ON THE MPIE DATABASE. THE VALUES IN

PARENTHESES DENOTE THE DIMENSIONALITY OF THE FEATURES AND THE TUNED PARAMETERS FOR THE BEST RESULT.THE BOLD NUMBER INDICATES THE HIGHEST CLASSIFICATION ACCURACY

TABLE IVRECOGNITION RATE OF THE TESTED ALGORITHMS ON THE CORRUPTED EXYALEB DATABASE. WGN AND RPC ARE ABBREVIATIONS

FOR WHITE GAUSSIAN NOISE AND RANDOM PIXEL CORRUPTION, RESPECTIVELY

Fig. 4. Samples with real possible corruptions. Top row: the images withwhite Gaussian noise. Bottom row: the images with random pixel corruption.From left to right, the corruption rate increases from 10% to 90% (with aninterval of 20%).

Fig. 5. Some sample images disguised by sunglasses (AR2) andscarves (AR3).

is the noise following the standard normal distribution. Fornonadditive corruption, we replace the value of a percentageof pixels randomly selected from the image with the valuesfollowing an uniform distribution over [0, pmax], where pmaxis the largest pixel value of x.

From Table IV, it is easy to find that L2-graph is superiorto the other approaches with a considerable performance gain.When 30% pixels are randomly corrupted, the accuracy ofL2-graph is at least 6.9% higher than that of the other methods.

6) Subspace Learning on Disguised Facial Images:Table V reports the results of L2-graph (λ = 0.1 and k = 3)over two subsets of AR database (Fig. 5). The first subset(AR2) contains 600 images without disguises and 600 imageswith sunglasses (occlusion rate is about 20%), and the secondone (AR3) includes 600 images without disguises and 600images disguised by scarves (occlusion rate is about 40%).L2-graph again outperforms the other tested methods by a

TABLE VCLASSIFICATION PERFORMANCE OF THE TESTED ALGORITHMS

ON THE DISGUISED AR IMAGES

considerable performance margin. With respect to two differ-ent disguises, the recognition rates of L2-graph are 5.8% and7.5% higher than those of the second best method.

B. Image Clustering

1) Baselines: We compare L2-graph with several recently-proposed subspace clustering algorithms, i.e., SSC [9],LRR [12], and two variants of least square regression (LSR)(LSR1 and LSR2) [50]. Moreover, we use the coefficients oflocally linear embedding [1] to build the similarity graph forsubspace clustering as [11] did, denoted by LLR (i.e., LLR).

For fair comparison, we perform the same spectral cluster-ing algorithm [33] on the graphs built by the tested algorithmsand report their best results with the tuned parameters. For theSSC algorithm, we experimentally chose the optimal value ofα from 1 to 50 with an interval of 1. For LRR, the optimalvalue of λ is selected from 10−6 to 10 as suggested in [12]. ForLSR1, LSR2, and L2-graph, the optimal value of λ is chosenfrom 10−7 to 1. Moreover, a good k is selected from 3 to 14for L2-graph and from 1 to 100 for LLR.

2) Evaluation Metrics: Typical clustering methods usuallyformulate the goal of obtaining high intracluster similarity(samples within a cluster are similar) and low intercluster sim-ilarity (samples from different clusters are dissimilar) into theirobjective functions. This is an internal criterion for the quality

Page 10: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

1062 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017

Fig. 6. Influence the parameters of L2-graph. The x-axis denotes the value of parameter. (a) Influence of λ, where k = 7. (b) Influence of k, where λ = 0.7.One can find that, L2-graph successfully eliminates the effect of errors by keeping k largest entries. The example verifies the effectiveness of our theoreticalresults.

of a clustering. But good scores on such an internal criteriondo not necessarily produce a desirable result in practice. Analternative to internal criteria is direct evaluation in the appli-cation of interest by utilizing the available label information.To this end, numerous metrics of clustering quality have beenproposed [51], [52]. In this paper, we adopt two of the mostpopular benchmarks in our experiments, namely, Accuracy (orcalled Purity) and normalized mutual information (NMI) [53].The value of Accuracy or NMI is 1 indicates perfect matchingwith the ground truth, whereas 0 indicates perfect mismatch.

3) Data Sets: We investigate the performance of the meth-ods on the data sets summarized in Table II. For computationalefficiency, we downsize each image from the original size toa smaller one and perform PCA to reduce the dimensional-ity of the data by reserving 98% energy. For example, all theAR1 images are downsized and normalized from 165 × 120to 55 × 40. After that, the experiment are carried out using167-D features produced by PCA.

4) Model Selection: L2-graph has two parameters, thetradeoff parameter λ and the thresholding parameter k. Thevalue of these parameters depends on the data distribution.In general, a bigger λ is more suitable to characterize thecorrupted images and k equals to the dimensionality of thecorresponding subspace.

To examine the influence of these parameters, we carry outsome experiments using a subset of ExYaleB which contains580 images from the first ten individuals. We randomly selecta half of samples to corrupt using white Gaussian noise. Fig. 6shows the following.

1) While λ increases from 0.1 to 1.0 and k ranges from4 to 9, Accuracy and NMI almost remain unchanged.

2) The thresholding parameter k is helpful to improve therobustness of our model. This verifies the correctness ofour theoretical result that the trivial coefficients corre-spond to the codes over the errors, i.e., IPD property of�2-norm-based projection space.

3) Larger k will impair the discrimination of the model,whereas a smaller k cannot provide enough representa-tive ability. Indeed, the optimal value of k can be found

around the intrinsic dimensionality of the correspondingsubspace. According to [42], the intrinsic dimensional-ity of the first subject of ExYaleB is 6. This result isconsistent with our experimental result.

5) Performance With Varying Number of Subspace: In thissection, we evaluate the performance of L2-graph using 1400clean AR images (167-D). The experiments are carried out onthe first c subjects of the data set, where c increases from 20to 100. Fig. 7 shows the following.

1) L2-graph algorithm is more competitive than the otherexamined algorithms. For example, when L = 100, theAccuracy of L2-graph is at least, 1.8% higher than thatof LSR1, 2.7% higher than that of LSR2, 24.5% higherthan that of SSC, 8.8% higher than that of LRR and42.5% higher than that of LLR.

2) With increasing c, the NMI of L2-graph almost remainunchanged, slightly varying from 93.0% to 94.3%.The possible reason is that NMI is robust to the datadistribution (increasing subject number).

6) Clustering on Clean Images: Six image data sets(ExYaleB, MPIE-S1, MPIE2-S2, MPIE3-S3, MPIE-S4, andCOIL100) are used in this experiment. Table VI shows thefollowing.

1) L2-graph algorithm achieves the best results in the testsexcept with MPIE-S4, where it is second best. Withrespect to the ExYaleB database, the Accuracy of theL2-graph is about 10.28% higher than that of the LSR,12.19% higher than that of the LSR2, 18.18% higherthan that of the SSC, 1.53% higher than that of the LRR,and 34.96% higher than that of LLR.

2) In the tests, L2-graph, LSR1, and LSR2 exhibit simi-lar performance, because the methods are �2-norm-basedmethods. One of the advantages of L2-graph is that itis more robust than LSR1, LSR2, and the other testedmethods.

7) Clustering on Corrupted Images: Our error-removingstrategy can improve the robustness of L2-graph without theprior knowledge of the errors. To verify this claim, we testthe robustness of L2-graph using ExYaleB over 38 subjects.

Page 11: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

PENG et al.: CONSTRUCTING THE L2-GRAPH FOR ROBUST SUBSPACE LEARNING AND SUBSPACE CLUSTERING 1063

Fig. 7. Clustering quality of different algorithms on the first c subjects of AR data set. (a) Accuracy. (b) NMI.

TABLE VICLUSTERING PERFORMANCE (%) ON SIX DIFFERENT IMAGE DATA SETS. ρ DENOTES THE CORRUPTED RATIO. THE VALUES IN THE PARENTHESES

DENOTE THE OPTIMAL PARAMETERS FOR THE REPORTED ACCURACY, I.E., L2-GRAPH (λ, k), LSR (λ), SSC(α), LRR (λ), AND LLR (k)

TABLE VIIPERFORMANCE OF L2-GRAPH, LSR [50], SSC [9], LRR [12], AND LLR [1] ON THE EXYALEB DATABASE (116-D)

For each subject of the database, we randomly chose a half ofimages (29 images per subject) to corrupt by white Gaussiannoise or random pixel corruption, where the former is additiveand the latter is nonadditive. To avoid randomness, we pro-duce ten data sets beforehand and then perform the evaluatedalgorithms over these data partitions. From Table VII, we havethe following conclusions.

1) All the investigated methods perform better in the caseof white Gaussian noise. The result is consistent witha widely-accepted conclusion that nonadditive corrup-tions are more challenging than additive ones in patternrecognition.

2) L2-graph is again considerably more robust thanLSR1, LSR2, SSC, LRR, and LLR. For exam-ple, with respect to white Gaussian noise, the per-formance gain in Accuracy between L2-graph andLSR2 varied from 14.0% to 22.8%; with respect to

random pixel corruption, the performance gain variedfrom 5.0% to 13.2%.

8) Clustering on Disguised Images: In this section, weexamine the robustness to real possible occlusions of thecompeting methods using AR2 and AR3. Beside the imple-mentation of Elhamifar and Vidal [9], we also report the resultby using homotopy method [45] to solve the �1-minimizationproblem. In the experiments, we fix λ = 0.001 and k = 12 forthe L2-graph and tuned the parameters of the tested methodsfor achieving their best performance.

Table VIII reports the performance of the tested algorithms.Clearly, L2-graph again outperforms the other methods in clus-tering quality and efficiency. Its Accuracy is about 30.59%higher than SSC-homotopy, 40.17% higher than SSC, 13.92%higher than LRR, and 48.59% higher than LLR when the facesare occluded by glasses. In the case of the faces occluded byscarves, the figures are about 40.25%, 44.00%, 17.58%, and

Page 12: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

1064 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017

Fig. 8. Some sample frames taken from the Hopkins155 database.

TABLE VIIICLUSTERING PERFORMANCE OF DIFFERENT METHODS ON THE DISGUISED AR IMAGES. THE VALUES

IN PARENTHESES DENOTE THE OPTIMAL PARAMETERS FOR ACCURACY

TABLE IXSEGMENTATION ERRORS (%) ON THE HOPKINS155 RAW DATA

54.31%, respectively. In addition, we can find that each ofthe evaluated algorithm performs very close for two differentdisguises, even though the occluded rates are largely different.

C. Motion Segmentation

Motion segmentation aims to separate a video sequenceinto multiple spatiotemporal regions of which each region rep-resents a moving object. Generally, segmentation algorithmsare based on the feature point trajectories of multiple mov-ing objects [22], [54]. Therefore, the motion segmentationproblem can be thought of the clustering of these trajecto-ries into different subspaces, and each subspace correspondsto an object.

To examine the performance of the proposed approachfor motion segmentation, we conduct experiments on theHopkins155 raw data [55], some frames of which are shownin Fig. 8. The data set includes the feature point trajectoriesof 155 video sequences, consisting of 120 video sequenceswith two motions and 35 video sequences with three motions.Thus, there are a total of 155 independent clustering tasks. Foreach algorithm, we report the mean, standard deviation (std.),and median of segmentation errors (1−Accuracy) using thesetwo data partitions (two and three motions). For L2-graph, we

fix λ = 0.1 and k = 7 (k = 14) for two motions and threemotions.

Table IX reports the mean and median segmentation errorson the data sets. We can find that the L2-graph outperformsthe other tested methods on the three-motions data set andperforms comparable to the methods on two-motion case.Moreover, all the algorithms perform better with two-motiondata than with three-motion data.

VI. CONCLUSION

Under the framework of graph-based learning, most of therecent approaches achieve robust clustering results by remov-ing the errors from the original space and then build theneighboring relation based on a “clean” data set. In contrast,we have proposed and proved that it is feasible to eliminatethe effect of the errors from the linear projection space (rep-resentation). Based on this mathematically traceable property(called IPD), we have presented two simple but effective meth-ods for robust subspace learning and clustering. Extensiveexperimental results have shown that our algorithm outper-forms eigenfaces, LPP, NPE, L1-graph, LRR, and LatLRR inunsupervised feature extraction and LSR, SSC, LRR, and LLRin image clustering and motion segmentation.

Page 13: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

PENG et al.: CONSTRUCTING THE L2-GRAPH FOR ROBUST SUBSPACE LEARNING AND SUBSPACE CLUSTERING 1065

There are several ways to further improve or extend thispaper. Although the theoretical analysis and experimentalstudies showed the connections between the parameter k andthe intrinsic dimensionality of a subspace, it is challenging todetermine the optimal value of the parameter. Therefore, weplan to explore more theoretical results on model selection infuture.

ACKNOWLEDGMENT

The authors would like to thank the anonymous reviewersfor their valuable comments and suggestions to improve thequality of this paper.

REFERENCES

[1] S. T. Roweis and L. K. Saul, “Nonlinear dimensionality reduction bylocally linear embedding,” Science, vol. 290, no. 5500, pp. 2323–2326,2000.

[2] S. C. Yan et al., “Graph embedding and extensions: A general frameworkfor dimensionality reduction,” IEEE Trans. Pattern. Anal. Mach. Intell.,vol. 29, no. 1, pp. 40–51, Jan. 2007.

[3] L. Shao, D. Wu, and X. Li, “Learning deep and wide: A spectral methodfor learning deep networks,” IEEE Trans. Neural Netw. Learn. Syst.,vol. 25, no. 12, pp. 2303–2308, Dec. 2014.

[4] J. Wu, S. Pan, X. Zhu, and Z. Cai, “Boosting for multi-graph classifi-cation,” IEEE Trans. Cybern., vol. 45, no. 3, pp. 416–429, Mar. 2015.

[5] Z. Yu et al., “Transitive distance clustering with k-means duality,” inProc. IEEE Conf. Comput. Vis. Pattern Recognit., Columbus, OH, USA,Jun. 2014, pp. 987–994.

[6] S. Jones and L. Shao, “Unsupervised spectral dual assignment clusteringof human actions in context,” in Proc. IEEE Conf. Comput. Vis. PatternRecognit., Columbus, OH, USA, Jun. 2014, pp. 604–611.

[7] Z. Yu et al., “Generalized transitive distance with minimum spanningrandom forest,” in Proc. Int. Joint Conf. Artif. Intell., Buenos Aires,Argentina, Jul. 2015, pp. 2205–2211.

[8] Y. Yuan, J. Lin, and Q. Wang, “Dual-clustering-based hyperspectral bandselection by contextual analysis,” IEEE Trans. Geosci. Remote Sens.,vol. 54, no. 3, pp. 1431–1445, Mar. 2016.

[9] E. Elhamifar and R. Vidal, “Sparse subspace clustering: Algorithm,theory, and applications,” IEEE Trans. Pattern. Anal. Mach. Intell.,vol. 35, no. 11, pp. 2765–2781, Nov. 2013.

[10] L. S. Qiao, S. C. Chen, and X. Y. Tan, “Sparsity preserving projectionswith applications to face recognition,” Pattern Recognit., vol. 43, no. 1,pp. 331–341, 2010.

[11] B. Cheng, J. Yang, S. Yan, Y. Fu, and T. S. Huang, “Learning withL1-graph for image analysis,” IEEE Trans. Image Process., vol. 19,no. 4, pp. 858–866, Apr. 2010.

[12] G. Liu et al., “Robust recovery of subspace structures by low-rank rep-resentation,” IEEE Trans. Pattern. Anal. Mach. Intell., vol. 35, no. 1,pp. 171–184, Jan. 2013.

[13] J. P. Costeira and T. Kanade, “A multibody factorization method forindependently moving objects,” Int. J. Comput. Vis., vol. 29, no. 3,pp. 159–179, 1998.

[14] X. He, S. Yan, Y. Hu, P. Niyogi, and H.-J. Zhang, “Face recognitionusing Laplacianfaces,” IEEE Trans. Pattern. Anal. Mach. Intell., vol. 27,no. 3, pp. 328–340, Mar. 2005.

[15] J. Wang, “A linear assignment clustering algorithm based on the leastsimilar cluster representatives,” IEEE Trans. Syst., Man, Cybern. A, Syst.,Humans, vol. 29, no. 1, pp. 100–104, Jan. 1999.

[16] R. Vidal, Y. Ma, and S. Sastry, “Generalized principal component anal-ysis (GPCA),” IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 12,pp. 1945–1959, Dec. 2005.

[17] J. Yan and M. Pollefeys, “A general framework for motion segmen-tation: Independent, articulated, rigid, non-rigid, degenerate and non-degenerate,” in Proc. Eur. Conf. Comput. Vis., Graz, Austria, May 2006,pp. 94–106.

[18] G. L. Chen and G. Lerman, “Spectral curvature clustering (SCC),” Int.J. Comput. Vis., vol. 81, no. 3, pp. 317–330, 2009.

[19] S. Rao, R. Tron, R. Vidal, and Y. Ma, “Motion segmentation in thepresence of outlying, incomplete, or corrupted trajectories,” IEEE Trans.Pattern Anal. Mach. Intell., vol. 32, no. 10, pp. 1832–1845, Oct. 2010.

[20] S. Xiao, W. Li, D. Xu, and D. Tao, “FaLRR: A fast low rank repre-sentation solver,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit.,Boston, MA, USA, Jun. 2015, pp. 4612–4620.

[21] J. Tang, L. Shao, X. Li, and K. Lu, “A local structural descriptorfor image matching via normalized graph Laplacian embedding,” IEEETrans. Cybern., vol. 46, no. 2, pp. 410–420, Feb. 2016.

[22] R. Vidal, “Subspace clustering,” IEEE Signal Process. Mag., vol. 28,no. 2, pp. 52–68, Mar. 2011.

[23] R. Liu, Z. Lin, F. De la Torre, and Z. Su, “Fixed-rank representation forunsupervised visual learning,” in Proc. IEEE Conf. Comput. Vis. PatternRecognit., Providence, RI, USA, Jun. 2012, pp. 598–605.

[24] G. C. Liu and S. C. Yan, “Latent low-rank representation for subspacesegmentation and feature extraction,” in Proc. IEEE Conf. Comput. Vis.,Barcelona, Spain, Nov. 2011, pp. 1615–1622.

[25] P. Favaro, R. Vidal, and A. Ravichandran, “A closed form solution torobust subspace estimation and clustering,” in Proc. IEEE Conf. Comput.Vis. Pattern Recognit., Providence, RI, USA, Jun. 2011, pp. 1801–1807.

[26] X. Peng, L. Zhang, and Z. Yi, “Scalable sparse subspace clustering,” inProc. IEEE Conf. Comput. Vis. Pattern Recognit., Portland, OR, USA,Jun. 2013, pp. 430–437.

[27] Y. Wang and H. Xu, “Noisy sparse subspace clustering,” in Proc. Int.Conf. Mach. Learn., vol. 28. Atlanta, GA, USA, Jun. 2013, pp. 89–97.

[28] J. Chen and J. Yang, “Robust subspace segmentation via low-rankrepresentation,” IEEE Trans. Cybern., vol. 44, no. 8, pp. 1432–1445,Aug. 2014.

[29] Y. Peng, J. Suo, Q. Dai, and W. Xu, “Reweighted low-rank matrixrecovery and its application in image restoration,” IEEE Trans. Cybern.,vol. 44, no. 12, pp. 2418–2430, Dec. 2014.

[30] S. Xiao, M. Tan, and D. Xu, “Weighted block-sparse low rank represen-tation for face clustering in videos,” in Proc. Eur. Conf. Comput. Vis.,Zürich, Switzerland, Sep. 2014, pp. 123–138.

[31] M. Lee, J. Lee, H. Lee, and N. Kwak, “Membership representationfor detecting block-diagonal structure in low-rank or sparse subspaceclustering,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Boston,MA, USA, Jun. 2015, pp. 1648–1656.

[32] J. Lu, G. Wang, W. Deng, and K. Jia, “Reconstruction-based metriclearning for unconstrained face verification,” IEEE Trans. Inf. ForensicsSecurity, vol. 10, no. 1, pp. 79–89, Jan. 2015.

[33] A. Y. Ng, M. I. Jordan, and Y. Weiss, “On spectral clustering: Analysisand an algorithm,” in Proc. Adv. Neural Inf. Process. Syst., vol. 14.Vancouver, BC, Canada, Dec. 2002, pp. 849–856.

[34] X. He, D. Cai, S. Yan, and H.-J. Zhang, “Neighborhood preserv-ing embedding,” in Proc. IEEE Conf. Comput. Vis., Beijing, China,Oct. 2005, pp. 1208–1213.

[35] X. Peng, Z. Yi, and H. Tang, “Robust subspace clustering via thresh-olding ridge regression,” in Proc. AAAI Conf. Artif. Intell., Austin, TX,USA, Jan. 2015, pp. 3827–3833.

[36] D. H. Yan, L. Huang, and M. I. Jordan, “Fast approximate spectralclustering,” in Proc. ACM SIGKDD Conf. Knowl. Disc. Data Mining,Paris, France, Jun. 2009, pp. 907–915.

[37] U. V. Luxburg, “A tutorial on spectral clustering,” Stat. Comput., vol. 17,no. 4, pp. 395–416, 2007.

[38] N. Papadakis and A. Bugeau, “Tracking with occlusions via graph cuts,”IEEE Trans. Pattern. Anal. Mach. Intell., vol. 33, no. 1, pp. 144–157,Jan. 2011.

[39] A. E. Hoerl and R. W. Kennard, “Ridge regression: Biased estimationfor nonorthogonal problems,” Technometrics, vol. 12, no. 1, pp. 55–67,1970.

[40] L. Zhang, M. Yang, and X. Feng, “Sparse representation or collabora-tive representation: Which helps face recognition?” in Proc. IEEE Conf.Comput. Vis., Barcelona, Spain, Nov. 2011, pp. 471–478.

[41] A. S. Georghiades, P. N. Belhumeur, and D. J. Kriegman, “From fewto many: Illumination cone models for face recognition under variablelighting and pose,” IEEE Trans. Pattern. Anal. Mach. Intell., vol. 23,no. 6, pp. 643–660, Jun. 2001.

[42] J. A. Costa and A. O. Hero, “Geodesic entropic graphs for dimension andentropy estimation in manifold learning,” IEEE Trans. Signal Process.,vol. 52, no. 8, pp. 2210–2221, Aug. 2004.

[43] M. Ester, H.-P. Kriegel, J. Sander, and X. Xu, “A density-based algorithmfor discovering clusters in large spatial databases with noise,” in Proc.Int. Conf. Knowl. Disc. Data Mining, vol. 1996. Portland, OR, USA,1996, pp. 226–231.

[44] M. Turk and A. Pentland, “Eigenfaces for recognition,” J. Cogn.Neurosci., vol. 3, no. 1, pp. 71–86, 1991.

[45] M. R. Osborne, B. Presnell, and B. A. Turlach, “A new approach tovariable selection in least squares problems,” SIAM J. Numer. Anal.,vol. 20, no. 3, pp. 389–403, 2000.

Page 14: IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, …pengxi.me/wp-content/uploads/2019/09/2017-TCYB-L2Graph.pdfIEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017 1053 Constructing

1066 IEEE TRANSACTIONS ON CYBERNETICS, VOL. 47, NO. 4, APRIL 2017

[46] A. Yang, A. Ganesh, S. S. Sastry, and Y. Ma, “Fast L1-M inimizationalgorithms and an application in robust face recognition: A review,”Dept. EECS, Univ. California, Berkeley, Berkeley, CA, USA, Tech.Rep. UCB/EECS-2010-13, Feb. 2010.

[47] A. Martínez and R. Benavente, “The AR face database,” Centre de Visióper Computador, Universitat Autóonoma de Barcelona, Barcelona,Spain, Tech. Rep. 24, 1998.

[48] R. Gross, I. Matthews, J. Cohn, T. Kanade, and S. Baker, “Multi-PIE,”Image Vis. Comput., vol. 28, no. 5, pp. 807–813, 2010.

[49] X. Peng, L. Zhang, Z. Yi, and K. K. Tan, “Learning locality-constrained collaborative representation for robust face recognition,”Pattern Recognit., vol. 47, no. 9, pp. 2794–2806, 2014.

[50] C.-Y. Lu et al., “Robust and efficient subspace segmentation via leastsquares regression,” in Proc. Eur. Conf. Comput. Vis., Florence, Italy,Oct. 2012, pp. 347–360.

[51] Y. Liu et al., “Understanding and enhancement of internal clusteringvalidation measures,” IEEE Trans. Cybern., vol. 43, no. 3, pp. 982–994,Jun. 2013.

[52] H. Xiong and Z. Li, “Clustering validation measures,” in DataClustering: Algorithms and Applications, C. C. Aggarwal andC. K. Reddy, Eds. Boca Raton, FL, USA: CRC Press, 2014.

[53] D. Cai, X. He, and J. Han, “Document clustering using locality pre-serving indexing,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 12,pp. 1624–1637, Dec. 2005.

[54] M. Lee, J. Cho, C.-H. Choi, and S. Oh, “Procrustean normal distributionfor non-rigid structure from motion,” in Proc. IEEE Conf. Comput. Vis.Pattern Recognit., Portland, OR, USA, Jun. 2013, pp. 1280–1287.

[55] R. Tron and R. Vidal, “A benchmark for the comparison of 3-D motionsegmentation algorithms,” in Proc. IEEE Conf. Comput. Vis. PatternRecognit., Minneapolis, MN, USA, Jun. 2007, pp. 1–8.

Xi Peng received the B.Eng. degree in electronicengineering and the M.Eng. degree in computerscience from the Chongqing University of Postsand Telecommunications, Chongqing, China, and thePh.D. degree from Sichuan University, Chengdu,China.

He is a Research Scientist with the Institutefor Infocomm, Research Agency for Science,Technology and Research, Singapore. His currentresearch interests include computer vision, imageprocessing, and pattern recognition.

Dr. Peng was a recipient of the Excellent Graduate Student of SichuanUniversity, the National Graduate Scholarship, the Tang Lixin Scholarship, theCSC-IBM Scholarship for Outstanding Chinese Students, and the ExcellentStudent Paper of IEEE Chengdu Section. He has served as a Guest Editorfor Image and Vision Computing, a PC Member/Reviewer for ten inter-national conferences, such as AAAI, International Joint Conference onNeural Networks, and IEEE World Congress on Computational Intelligence,and a Reviewer for over ten international journals, such as the IEEETRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, theIEEE TRANSACTIONS ON IMAGE PROCESSING, the IEEE TRANSACTIONS

ON KNOWLEDGE AND DATA ENGINEERING, the IEEE TRANSACTIONS ON

INFORMATION FORENSICS AND SECURITY, the IEEE TRANSACTIONS ON

GEOSCIENCE AND REMOTE SENSING, and the IEEE TRANSACTIONS ON

CYBERNETICS.

Zhiding Yu received the B.Eng. degree from theSchool of Electronic and Information Engineering,South China University of Technology, Guangzhou,China, in 2008, and the M.Phil. degree fromthe Department of Electronic and ComputerEngineering, Hong Kong University of Scienceand Technology, Hong Kong, in 2012. He iscurrently pursuing the Ph.D. degree with theDepartment of Electrical and Computer Engineering,Carnegie Mellon University, Pittsburgh, PA, USA.

He has co-authored the best student paper inInternational Symposium on Chinese Spoken Language Processing, 2014. Hiscurrent research interests include computer vision and machine learning.

Mr. Yu was a recipient of the Hongkong Telecom Institute of InformationTechnology Post-Graduate Excellence Scholarships (twice) from 2010 to2012, and the Best Paper Award in IEEE Winter Conference on Applicationsof Computer Vision in 2015.

Zhang Yi (F’15) received the Ph.D. degree inmathematics from the Institute of Mathematics,Chinese Academy of Science, Beijing, China,in 1994.

He is currently a Professor with the MachineIntelligence Laboratory, College of ComputerScience, Sichuan University, Chengdu, China.He has co-authored three books entitledConvergence Analysis of Recurrent NeuralNetworks (Kluwer Academic Publishers, 2004),Neural Networks: Computational Models and

Applications (Springer, 2007), and Subspace Learning of Neural Networks(CRC Press, 2010). His current research interests include neural networksand big data.

Prof. Zhang was an Associate Editor of the IEEE TRANSACTIONS ON

NEURAL NETWORKS AND LEARNING SYSTEMS, from 2009 to 2012,and has been an Associate Editor of the IEEE TRANSACTIONS ON

CYBERNETICS, since 2014.

Huajin Tang (M’01) received the B.Eng. degreefrom Zhejiang University, Hangzhou, China, in1998, the M.Eng. degree from Shanghai Jiao TongUniversity, Shanghai, China, in 2001, and the Ph.D.degree in electrical and computer engineering fromthe National University of Singapore, Singapore, in2005.

He was a System Engineer withSTMicroelectronics, Singapore, from 2004 to2006, and then a Post-Doctoral Fellow withthe Queensland Brain Institute, University of

Queensland, Brisbane, QLD, Australia, from 2006 to 2008. He was a GroupLeader of Cognitive Computing with the Institute for Infocomm, ResearchAgency for Science, Technology and Research, Singapore, from 2008 to2015. He is currently a Professor with the College of Computer Science,Sichuan University, Chengdu, China. He has authored one monograph(Springer-Verlag, 2007) and over 30 international journal papers. His currentresearch interests include neuromorphic computing, cognitive systems,robotic cognition, and machine learning.

Dr. Tang serves as an Associate Editor for the IEEE TRANSACTIONS

ON NEURAL NETWORKS AND LEARNING SYSTEMS and the IEEETRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS, and anEditorial Board Member of Frontiers in Robotics and Artificial Intelligence.He served as the Program Chair of the 7th IEEE International Conferenceon Cybernetics and Intelligent Systems (CIS-RAM) in 2015, and theCo-Program Chair of the 6th IEEE International CIS-RAM in 2013.