From post

Predicting Carbon Spectrum in Heteronuclear Single Quantum Coherence Spectroscopy for Online Feedback During Surgery.

, , , , и . IEEE ACM Trans. Comput. Biol. Bioinform., 17 (2): 719-725 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

(Un)wisdom of Crowds: Accurately Spotting Malicious IP Clusters Using Not-So-Accurate IP Blacklists.. IEEE Trans. Inf. Forensics Secur., 12 (6): 1406-1417 (2017)Forecasting Suspicious Account Activity at Large-Scale Online Service Providers., , , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 569-587. Springer, (2019)Perceptual hash based blind geometric synchronization of images for watermarking., и . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, том 6819 из SPIE Proceedings, стр. 68191G. SPIE, (2008)Comparative evaluation of semifragile watermarking algorithms., , , , и . J. Electronic Imaging, 13 (1): 209-219 (2004)Can "Something You Know" Be Saved?., и . ISC, том 5222 из Lecture Notes in Computer Science, стр. 421-440. Springer, (2008)CADENCE: Conditional Anomaly Detection for Events Using Noise-Contrastive Estimation., , и . AISec@CCS, стр. 71-82. ACM, (2019)Generating Look-alike Names For Security Challenges., , , , , , и . AISec@CCS, стр. 57-67. ACM, (2017)Nationality Classification Using Name Embeddings., , , , , , и . CIKM, стр. 1897-1906. ACM, (2017)Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population., , , , , и . NSPW, стр. 11-22. ACM, (2016)Detecting hidden enemy lines in IP address space., , и . NSPW, стр. 19-30. ACM, (2013)