From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Experimental Analysis of the Relationship between Biometric Template Update and the Doddington's Zoo: A Case Study in Face Verification., , и . ICIAP, том 5716 из Lecture Notes in Computer Science, стр. 434-442. Springer, (2009)CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism., , и . ERCIM News, (2015)A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements., , , и . ICIAP (2), том 9280 из Lecture Notes in Computer Science, стр. 540-550. Springer, (2015)Image Recognition by Integration of Connectionist and Symbolic Approaches., , и . IJPRAI, 9 (3): 485-515 (1995)Evasion attacks against machine learning at test time, , , , , , , и . Joint European Conference on Machine Learning and Knowledge Discovery in Databases, стр. 387--402. Springer, (2013)Multiple Classifier Systems.. Encyclopedia of Biometrics, Springer US, (2009)Poisoning Behavioral Malware Clustering., , , , , , и . CoRR, (2018)Design of Effective Multiple Classifier Systems by Clustering of Classifiers, , , и . IEEE, (2000)On Security and Sparsity of Linear Classifiers for Adversarial Settings., , , , и . CoRR, (2017)On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks., , , , , , , и . CoRR, (2018)