Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging colour-based pseudo-labels to supervise saliency detection in hyperspectral image datasets., , , , , and . J. Intell. Inf. Syst., 57 (3): 423-446 (2021)A novel spectral-spatial co-training algorithm for the transductive classification of hyperspectral imagery data., , and . Pattern Recognit., (2017)$SILVIA$: An eXplainable Framework to Map Bark Beetle Infestation in Sentinel-2 Images., , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2023)Machine Learning + On-line Libraries = IDL., , , , and . ECDL, volume 1324 of Lecture Notes in Computer Science, page 195-214. Springer, (1997)Stepwise Induction of Logistic Model Trees., , , and . ISMIS, volume 4994 of Lecture Notes in Computer Science, page 68-77. Springer, (2008)Leveraging Grad-CAM to Improve the Accuracy of Network Intrusion Detection Systems., , , , and . DS, volume 12986 of Lecture Notes in Computer Science, page 385-400. Springer, (2021)Wind Power Forecasting Using Time Series Cluster Analysis., , , and . Discovery Science, volume 8777 of Lecture Notes in Computer Science, page 276-287. Springer, (2014)Completion Time and Next Activity Prediction of Processes Using Sequential Pattern Mining., , , , and . Discovery Science, volume 8777 of Lecture Notes in Computer Science, page 49-61. Springer, (2014)An XAI-based adversarial training approach for cyber-threat detection., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-8. IEEE, (2022)A knowledge-based approach to the layout analysis., , and . ICDAR, page 466-471. IEEE Computer Society, (1995)