Author of the publication

Scenario-Based Insider Threat Detection From Cyber Activities.

, , and . IEEE Trans. Comput. Social Systems, 5 (3): 660-675 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scenario-Based Insider Threat Detection From Cyber Activities., , and . IEEE Trans. Comput. Social Systems, 5 (3): 660-675 (2018)Fully Automated Image De-fencing using Conditional Generative Adversarial Networks., , , , and . CoRR, (2019)Privacy preservation through facial de-identification with simultaneous emotion preservation., , and . Signal Image Video Process., 15 (5): 951-958 (2021)Frontal gait recognition from occluded scenes., , and . Pattern Recognit. Lett., (2015)Exploiting pose dynamics for human recognition from their gait signatures., and . Multim. Tools Appl., 80 (28-29): 35903-35921 (2021)Frontal Gait Recognition From Incomplete Sequences Using RGB-D Camera., , and . IEEE Trans. Inf. Forensics Secur., 9 (11): 1843-1856 (2014)A deep learning computational approach for the classification of COVID-19 virus., , , and . Comput. methods Biomech. Biomed. Eng. Imaging Vis., 11 (3): 786-795 (May 2023)Generating Secure Images for CAPTCHAs through Noise Addition., , , , , and . SACMAT, page 169-172. ACM, (2015)Pose Depth Volume extraction from RGB-D streams for frontal gait recognition., , , and . J. Vis. Commun. Image Represent., 25 (1): 53-63 (2014)A robust and efficient image de-fencing approach using conditional generative adversarial networks., , , , and . Signal Image Video Process., 15 (2): 297-305 (2021)