From post

A Systematic Literature Review of Law Enforcement Image Recognition Methods based on Generative Adversarial Networks Framework.

, и . KES, том 207 из Procedia Computer Science, стр. 3635-3644. Elsevier, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploring drug-related crimes with social network analysis., , , и . KES, том 159 из Procedia Computer Science, стр. 1907-1917. Elsevier, (2019)Noise control in document classification based on fuzzy formal concept analysis., и . FUZZ-IEEE, стр. 2583-2588. IEEE, (2011)The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network., , и . ICACT, стр. 35-41. IEEE, (2021)The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network., , и . ICACT, стр. 35-41. IEEE, (2022)Heuristic-Based Approach for Constructing Hierarchical Knowledge Structures., , , и . IEA/AIE, том 5579 из Lecture Notes in Computer Science, стр. 439-448. Springer, (2009)Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations., , и . ICACT, стр. 1108-1115. IEEE, (2019)Tool Mark Identification of Skype Traffic., , и . ICACT, стр. 361-366. IEEE, (2020)A Systematic Literature Review of Law Enforcement Image Recognition Methods based on Generative Adversarial Networks Framework., и . KES, том 207 из Procedia Computer Science, стр. 3635-3644. Elsevier, (2022)A Systematic Review of Detecting Illicit Bitcoin Transactions., , и . KES, том 207 из Procedia Computer Science, стр. 3217-3225. Elsevier, (2022)A Knowledge Discovery Approach to Supporting Crime Prevention., , , и . JCIS, Atlantis Press, (2006)