Author of the publication

A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection.

, , , , , , and . TASE, page 1-8. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning based Moving Object Detection for Video Surveillance., , , , and . ICCE-TW, page 1-2. IEEE, (2019)Limited-Anchor Deep Neural Network for Moving Object Detection., , , , , and . ICCE-TW, page 1-2. IEEE, (2020)Enhancing Siamese Visual Tracking With Background Relations., , , and . ICMLA, page 340-344. IEEE, (2021)Image bit-planes representation for moving object detection in real-time video surveillance., , and . ICCE-TW, page 1-2. IEEE, (2016)Human detection using non-negative matrix factorization., , and . ICCE-TW, page 370-371. IEEE, (2015)Human action recognition based on non-negative matrix factorization., , , , and . APSIPA, page 1091-1093. IEEE, (2015)Invisible Adversarial Attacks on Deep Learning-Based Face Recognition Models., , , and . IEEE Access, (2023)Automatic Brain Extraction for T1-Weighted Magnetic Resonance Images Using Region Growing., , , , and . BIBE, page 250-253. IEEE Computer Society, (2016)Evidence Distilling for Fact Extraction and Verification., , , , and . NLPCC (1), volume 11838 of Lecture Notes in Computer Science, page 211-222. Springer, (2019)Natural language processing (NLP) aided qualitative method in health research., , , , , , and . J. Integr. Des. Process. Sci., 27 (1): 41-58 (2023)