Author of the publication

Extraction Method of Alarm Transaction Based on Morphology Similarity Clustering.

, , , , and . ICCA, page 917-921. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)A Kernel Matching Pursuit Approach to Man-Made Objects Detection in Aerial Images., , and . IbPRIA (2), volume 4478 of Lecture Notes in Computer Science, page 507-514. Springer, (2007)Monitoring Freeze Injury and Evaluating Losing to Sugar-Cane Using RS and GPS., , , , and . CCTA (1), volume 293 of IFIP Advances in Information and Communication Technology, page 307-316. Springer, (2008)Compressing Deep Models using Multi Tensor Train Decomposition., , , and . ICCAIS, page 1-6. IEEE, (2019)A Disposable Organophosphorus Pesticides Enzyme Biosensor Based on Magnetic Composite Nano-Particles Modified Screen Printed Carbon Electrode., , , , and . Sensors, 10 (1): 625-638 (2010)A Three-Stage Deep Learning Model for Accurate Retinal Vessel Segmentation., , and . IEEE J. Biomed. Health Informatics, 23 (4): 1427-1436 (2019)Vascular Active Contour for Vessel Tree Segmentation., , , , , , and . IEEE Trans. Biomed. Eng., 58 (4): 1023-1032 (2011)Machine Learning and Deep Learning Methods for Cybersecurity., , , , , , , , and . IEEE Access, (2018)Analysis of the Effects Power-Inversion (PI) Adaptive Algorithm Have on GNSS Received Pseudorange Measurement., , , , and . IEEE Access, (2022)Salient object detection with image-level binary supervision., , , , , , , and . Pattern Recognit., (2022)