Author of the publication

A Comprehensive Approach to Image Spam Detection: From Server to Client Solution.

, , and . IEEE Trans. Inf. Forensics Secur., 5 (4): 826-836 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic Commerce Teaching Resources Platform Construction Solution Study., and . WHICEB, page 46. Association for Information Systems, (2012)Research on adaptive analysis of stochastic signals based on HHT transform., , and . URAI, page 662-670. IEEE, (2016)Closely spaced multipath mitigation in GNSS receiver based on maximum likelihood estimation., and . WCSP, page 1-5. IEEE, (2013)Convergence analysis of nonmonotone Levenberg-Marquardt algorithms for complementarity problem., and . Appl. Math. Comput., 216 (5): 1652-1659 (2010)An algorithm for portfolio selection in a frictional market., and . Appl. Math. Comput., 182 (2): 1629-1638 (2006)An application of DPCA to oil data for CBM modeling., , and . Eur. J. Oper. Res., 174 (1): 112-123 (2006)Web3D-based automatic furniture layout system using recursive case-based reasoning and floor field., , , and . Multimedia Tools Appl., 78 (4): 5051-5079 (2019)Zoom control of wide area tracking system., and . IEEE Conf. of Intelligent Systems, page 402-407. IEEE, (2010)Electron Transfer-Based Single Molecule Fluorescence as a Probe for Nano-Environment Dynamics., , , , , and . Sensors, 14 (2): 2449-2467 (2014)Improving Gaussian Process Classification with Outlier Detection, with Applications in Image Classification., and . ACCV (4), volume 6495 of Lecture Notes in Computer Science, page 153-164. Springer, (2010)