From post

A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images.

, , и . IEICE Trans. Inf. Syst., 103-D (2): 454-458 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhanced Fast Handover Mechanism Using MIH Services in MIPv6., , , , , , и . WWIC, том 3970 из Lecture Notes in Computer Science, стр. 120-131. Springer, (2006)User Behavior and Application Modeling in Decentralized Edge Cloud Infrastructures., , , , , , , , и . GECON, том 10537 из Lecture Notes in Computer Science, стр. 193-203. Springer, (2017)Serving Node Selection in Wireless Multi-Hop Cellular System., , и . VTC Fall, стр. 1-5. IEEE, (2006)Multi-body dynamics simulations of high speed transfer robots disposed between presses., , , , , и . URAI, стр. 253-254. IEEE, (2017)Overlay Ring Based Secure Group Communication Scheme for Mobile Agents., , , и . ICCSA (2), том 5593 из Lecture Notes in Computer Science, стр. 302-313. Springer, (2009)Parallel Congruent Regions on a Mesh-Connected Computer., , , и . HiPC, том 1970 из Lecture Notes in Computer Science, стр. 194-203. Springer, (2000)Performance Test of Autonomous Emergency Braking System Based on Commercial Radar., , , и . IIAI-AAI, стр. 1211-1212. IEEE Computer Society, (2016)Optimizing I/O performance in ViMo-S hypervisor with zero-copy method., , , и . ICSCA, стр. 50-54. ACM, (2017)A New GAN-Based Anomaly Detection (GBAD) Approach for Multi-Threat Object Classification on Large-Scale X-Ray Security Images., , и . IEICE Trans. Inf. Syst., 103-D (2): 454-458 (2020)Analysis of a finite-buffer polling system with exhaustive service based on virtual buffering., и . IEEE Trans. Commun., 42 (12): 3144-3149 (1994)