Author of the publication

A Comparison of Neural Projection Techniques Applied to Intrusion Detection Systems.

, , , and . IWANN, volume 4507 of Lecture Notes in Computer Science, page 1138-1146. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analog vector quantization chip for flexible video compression systems., and . ISCAS (4), page 367-370. IEEE, (1999)Hausdorff distance for target detection., and . ISCAS (5), page 661-664. IEEE, (2002)No-reference quality assessment of JPEG images by using CBP neural networks., and . ISCAS (5), page 772-775. IEEE, (2004)Neural structures for visual motion tracking., , and . Mach. Vis. Appl., 8 (5): 275-288 (1995)Automatic Hyperparameter Tuning for Support Vector Machines., , , and . ICANN, volume 2415 of Lecture Notes in Computer Science, page 1345-1350. Springer, (2002)Circular Back-Propagation Networks for Measuring Displayed Image Quality., , , and . ICANN, volume 2415 of Lecture Notes in Computer Science, page 1219-1224. Springer, (2002)Circular backpropagation networks embed vector quantization., , and . IEEE Trans. Neural Networks, 10 (4): 972-975 (1999)Detection-based video surveillance using Deep Neural Networks on STM32 microcontroller., , , and . ICECS 2022, page 1-4. IEEE, (2022)A tensor-based approach to touch modality classification by using machine learning., , , , and . Robotics Auton. Syst., (2015)Embedded Electronics Systems for Training Support Vector Machines., , , and . IJCNN, page 2838-2844. IEEE, (2006)