From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SIM-ELM: Connecting the ELM model with similarity-function learning., , , и . Neural Networks, (2016)Towards a Near-real-time Protocol Tunneling Detector based on Machine Learning Techniques., , , и . CoRR, (2023)Machine Learning-Based System for Detecting Unseen Malicious Software., , , , и . ApplePies, том 351 из Lecture Notes in Electrical Engineering, стр. 9-15. Springer, (2014)Inductive bias for semi-supervised extreme learning machine., , , и . Neurocomputing, (2016)Real-time behavioral DGA detection through machine learning., , , , , и . ICCST, стр. 1-6. IEEE, (2017)PhishVision: A Deep Learning Based Visual Brand Impersonation Detector for Identifying Phishing Attacks., , , и . OL2A (1), том 1981 из Communications in Computer and Information Science, стр. 123-134. Springer, (2023)Semi-supervised machine learning approach for unknown malicious software detection., , , и . INISTA, стр. 52-59. IEEE, (2014)A Virtual Museum for Flemish artworks. A digital reconstruction of Genoese collections., , , , , и . VSMM, стр. 607-610. IEEE, (2012)A machine learning approach for Twitter spammers detection., , , и . ICCST, стр. 1-6. IEEE, (2014)DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach., , , и . CoRR, (2020)