Author of the publication

Caveline Detection at the Edge for Autonomous Underwater Cave Exploration and Mapping.

, , , , , and . ICMLA, page 1392-1398. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Employing Deep Ensemble Learning for Improving the Security of Computer Networks Against Adversarial Attacks., , , , and . IEEE Trans. Netw. Serv. Manag., 20 (2): 2096-2105 (June 2023)An Unsupervised Learning Approach for Wayside Train Wheel Flat Detection., , , , , and . Sensors, 23 (4): 1910 (February 2023)Improving transfer entropy and partial transfer entropy for relative detection of effective connectivity strength between time series., , and . Commun. Nonlinear Sci. Numer. Simul., (November 2023)MRAM-based Analog Sigmoid Function for In-memory Computing., , , and . ACM Great Lakes Symposium on VLSI, page 319-323. ACM, (2022)Privacy-preserving Federated Learning System for Fatigue Detection., , , , and . CSR, page 624-629. IEEE, (2023)An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework., , , and . IEEE Trans. Netw. Serv. Manag., 20 (2): 1332-1344 (June 2023)Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization., , , , , and . IEEE Trans. Serv. Comput., 17 (1): 18-29 (January 2024)Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization., , , , , and . CoRR, (2022)An explainable machine learning-based approach for analyzing customers' online data to identify the importance of product attributes., , , and . CoRR, (2024)Energy-Efficient Deployment of Machine Learning Workloads on Neuromorphic Hardware., , , and . IGSC, page 1-7. IEEE, (2022)