Author of the publication

Automated Extraction of the Archaeological Tops of Qanat Shafts from VHR Imagery in Google Earth.

, , , , , , , and . Remote. Sens., 6 (12): 11956-11976 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Malware Immunization Based on Dynamically Assigned Sense of Self., and . ISC, volume 6531 of Lecture Notes in Computer Science, page 166-180. Springer, (2010)Roving Bugnet: Distributed Surveillance Threat and Mitigation., and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 39-50. Springer, (2009)Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation., and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-121. Springer, (2013)On the effectiveness of low latency anonymous network in the presence of timing attack., and . DSN, page 429-438. IEEE Computer Society, (2009)On the Feasibility of Detecting Software Supply Chain Attacks.. MILCOM, page 458-463. IEEE, (2021)CloudImmu: Transparent Protection of Binary Applications in the Cloud.. MILCOM, page 309-315. IEEE, (2021)Research on the lakes change in Ejin alluvial fan from long time-series landsat images., , , , and . IGARSS, page 374-377. IEEE, (2010)CIMNet: A Contextual Information Mining Network for Real-time Instance Segmentation., , , , , , , and . CCRIS, page 100-108. ACM, (2023)WormTerminator: an effective containment of unknown and polymorphic fast spreading worms., , , and . ANCS, page 173-182. ACM, (2006)Knockoff-Guided Feature Selection via A Single Pre-trained Reinforced Agent., , , , , and . CoRR, (2024)