Author of the publication

Supervised learning of sparse context reconstruction coefficients for data representation and classification.

, , , , and . Neural Comput. Appl., 28 (1): 135-143 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Borders and gateways: measuring and analyzing national as chokepoints., , , , and . COMPASS, page 184-194. ACM, (2019)Representing Data by Sparse Combination of Contextual Data Points for Classification., , , , and . ISNN, volume 9377 of Lecture Notes in Computer Science, page 373-381. Springer, (2015)Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering., , , , , , , and . SafeAI@AAAI, volume 2301 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations., , , and . IEEE Symposium on Security and Privacy Workshops, page 43-49. IEEE, (2019)AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos., , , , , , , , and . ICCV, page 3967-3976. IEEE, (2019)Supervised learning of sparse context reconstruction coefficients for data representation and classification., , , , and . Neural Comput. Appl., 28 (1): 135-143 (2017)Enhancing privacy in participatory sensing applications with multidimensional data., , , , and . PerCom, page 144-152. IEEE Computer Society, (2012)Supervised learning of sparse context reconstruction coefficients for data representation and classification., , , , and . CoRR, (2015)Internet Topology over Time, , , and . CoRR, (2012)Representing data by sparse combination of contextual data points for classification., , and . CoRR, (2015)