Author of the publication

Locality constrained low-rank representation for hyperspectral image classification.

, , and . IGARSS, page 493-496. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Variational Model for Single Image Dehazing., , , , and . IEEE Access, (2019)Cross-Project Transfer Representation Learning for Vulnerable Function Discovery., , , , , , and . IEEE Trans. Ind. Informatics, 14 (7): 3289-3297 (2018)Using Relationship-Building in Event Profiling for Digital Forensic Investigations., and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 40-52. Springer, (2010)Comprehensive Analysis of Network Traffic Data., , , , , and . CIT, page 423-430. IEEE Computer Society, (2016)Distributed Detection of Zero-Day Network Traffic Flows., , , , , and . AusDM, volume 845 of Communications in Computer and Information Science, page 173-191. Springer, (2017)Robust performance testing for digital forensic tools., and . Digital Investigation, 6 (1-2): 71-81 (2009)Predicting the Impact of Android Malicious Samples via Machine Learning., , , , , and . IEEE Access, (2019)Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations., , and . Int. J. Digit. Crime Forensics, 4 (4): 1-14 (2012)Identifying Drawbacks in Malicious PDF Detectors., , , and . FNSS, volume 878 of Communications in Computer and Information Science, page 128-139. Springer, (2018)Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis., , , , and . IEEE Trans. Cybern., 50 (7): 3081-3093 (2020)