Author of the publication

Bayesian relevance feedback for content-based image retrieval.

, and . Pattern Recognit., 37 (7): 1499-1508 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing android malware detection explainability through function call graph APIs., , , and . J. Inf. Secur. Appl., (February 2024)Design of effective neural network ensembles for image classification purposes., and . Image Vis. Comput., 19 (9-10): 699-707 (2001)Convolutional neural networks for relevance feedback in content based image retrieval., , and . Multim. Tools Appl., 79 (37-38): 26995-27021 (2020)HMMPayl: an application of HMM to the analysis of the HTTP Payload., and . WAPA, volume 11 of JMLR Proceedings, page 81-87. JMLR.org, (2010)One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time., , , , , , and . MCS, volume 9132 of Lecture Notes in Computer Science, page 168-180. Springer, (2015)IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices., , and . CD-MAKE, volume 10410 of Lecture Notes in Computer Science, page 137-154. Springer, (2017)A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks., , and . Multiple Classifier Systems, volume 2709 of Lecture Notes in Computer Science, page 346-355. Springer, (2003)A Modular Architecture for the Analysis of HTTP Payloads Based on Multiple Classifiers., and . MCS, volume 6713 of Lecture Notes in Computer Science, page 330-339. Springer, (2011)Sensing Attacks in Computers Networks with Hidden Markov Models., , and . MLDM, volume 4571 of Lecture Notes in Computer Science, page 449-463. Springer, (2007)Alarm Clustering for Intrusion Detection Systems in Computer Networks., , and . MLDM, volume 3587 of Lecture Notes in Computer Science, page 184-193. Springer, (2005)