From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DCT-based Hyperspectral Image Classification on Resource-Constrained Platforms., , , , и . WHISPERS, стр. 1-5. IEEE, (2021)A Visualization-Based Analysis on Classifying Android Malware., , , и . ML4CS, том 11806 из Lecture Notes in Computer Science, стр. 304-319. Springer, (2019)Tensor locality preserving projection for hyperspectral image classification., , , и . IGARSS, стр. 771-774. IEEE, (2017)The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT., , , , , , , и . CoRR, (2019)Visual representation of penetration testing actions and skills in a technical tree model., , и . ACSW, стр. 8:1-8:10. ACM, (2017)Toward Incremental Parallelization Using Navigational Programming., , , , , , и . IEICE Trans. Inf. Syst., 89-D (2): 390-398 (2006)Editorial: Recent advances in machine learning for cybersecurity., , и . Concurr. Comput. Pract. Exp., (2019)L1 Adaptive Output Feedback Controller with Operating Constraints for Solid Oxide Fuel Cells., , и . ICINCO (1), стр. 499-507. SciTePress, (2014)Investigating Security Vulnerabilities in Modern Vehicle Systems., , , и . ATIS, том 651 из Communications in Computer and Information Science, стр. 29-40. (2016)Security analysis of modern mission critical android mobile applications., , и . ACSW, стр. 2:1-2:9. ACM, (2017)