From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust IoT Malware Detection and Classification Using Opcode Category Features on Machine Learning., , , , и . IEEE Access, (2023)Non-Marker based Mobile Augmented Reality and its Applications using Object Recognition., и . J. Univers. Comput. Sci., 18 (20): 2832-2850 (2012)A Case Study: Development of an Organism-Specific Protein Interaction Database and Its Associated Tools., , и . Int. J. Cooperative Inf. Syst., 12 (2): 225-239 (2003)A Preliminary Result of Food Object Detection using Swin Transformer., , , , , и . ICCTA, стр. 183-187. ACM, (2022)Histogram Entropy Representation and Prototype Based Machine Learning Approach for Malware Family Classification., , , , и . IEEE Access, (2021)Nearest Neighbor Based Prototype Classification Preserving Class Regions., и . J. Inf. Process. Syst., 13 (5): 1345-1357 (2017)Evolved IoT Malware Detection using Opcode Category Sequence through Machine Learning., , , , и . ICCCN, стр. 1-7. IEEE, (2022)Comparative Analysis of Low-Dimensional Features and Tree-Based Ensembles for Malware Detection Systems., , , и . IEEE Access, (2020)Predictive Model for Protein Function Using Modular Neural Approach., , , , и . ICAPR (1), том 3686 из Lecture Notes in Computer Science, стр. 400-409. Springer, (2005)Robust Authentication Analysis of Copyright Images through Deep Hashing Models with Self-supervision., , , , , и . J. Univers. Comput. Sci., 29 (8): 938-958 (августа 2023)