Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Semi-Structured Document Categorization Using Bounded-Length Spectrum Sub-Sequence Kernels.. Data Min. Knowl. Discov., 13 (3): 309-334 (2006)Code Action Network for Binary Function Scope Identification., , , , , , , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 712-725. Springer, (2020)An Embedded Bayesian Network Hidden Markov Model for Digital Forensics., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 459-465. Springer, (2006)New Fast Algorithms for Error Rate-Based Stepwise Variable Selection in Discriminant Analysis., , and . SIAM J. Sci. Comput., 22 (3): 1036-1052 (2000)Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence., , , , , , , , and . IJCNN, page 1-8. IEEE, (2020)Transferable Graph Backdoor Attack., , , , , , , and . RAID, page 321-332. ACM, (2022)Face recognition using multiple image view line segments., and . ICPR, page 1198-1200. IEEE Computer Society, (1998)View-based object recognition using image lines., and . ICPR, page 805-807. IEEE Computer Society, (1998)Petri Net Modelling of Occam Programs for Detecting Indeterminacy, Non-termination and Deadlock Anomalies., and . PNPM, page 116-124. IEEE Computer Society, (1991)Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection., , , , , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 699-711. Springer, (2020)