Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diffusion map for clustering fMRI spatial maps extracted by independent component analysis., , , , , , and . MLSP, page 1-6. IEEE, (2013)Adaptive framework for network traffic classification using dimensionality reduction and clustering., and . ICUMT, page 274-279. IEEE, (2012)Online anomaly detection using dimensionality reduction techniques for HTTP log analysis., , and . Comput. Networks, (2015)Model Fooling Threats Against Medical Imaging., , and . Artificial Intelligence and Cybersecurity, Springer International Publishing, (2023)Analysing Finnish Cybersecurity Thesis Topics Using Taxonomic Frameworks., , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-8. IEEE, (2022)Chromatic and spatial analysis of one-pixel attacks against an image classifier., , , and . CoRR, (2021)Gear classification and fault detection using a diffusion map framework., , and . Pattern Recognit. Lett., (2015)Chromatic and Spatial Analysis of One-Pixel Attacks Against an Image Classifier., , , and . NETYS, volume 13464 of Lecture Notes in Computer Science, page 303-316. Springer, (2022)One-Pixel Attacks Against Medical Imaging: A Conceptual Framework., and . WorldCIST (1), volume 1365 of Advances in Intelligent Systems and Computing, page 197-203. Springer, (2021)Anomaly Detection from Network Logs Using Diffusion Maps., , and . EANN/AIAI (1), volume 363 of IFIP Advances in Information and Communication Technology, page 172-181. Springer, (2011)