From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Palmprint Recognition Under Unconstrained Scenes., , , и . ACCV (2), том 4844 из Lecture Notes in Computer Science, стр. 1-11. Springer, (2007)Spatial and temporal analysis of traffic states on large scale networks., , , , , и . ITSC, стр. 1215-1220. IEEE, (2010)Palmprint Recognition Based on Directional Features and Graph Matching., , и . ICB, том 4642 из Lecture Notes in Computer Science, стр. 1164-1173. Springer, (2007)Identity Verification by Using Handprint., , , и . ICB, том 4642 из Lecture Notes in Computer Science, стр. 328-337. Springer, (2007)GMRF Estimation under Topological and Spectral Constraints., , , и . ECML/PKDD (2), том 8725 из Lecture Notes in Computer Science, стр. 370-385. Springer, (2014)Palmprint image synthesis: A preliminary study., , , и . ICIP, стр. 285-288. IEEE, (2008)Characterizing the Evasion Attackability of Multi-label Classifiers., , и . CoRR, (2020)Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes., , , , , и . CRiSIS, том 13857 из Lecture Notes in Computer Science, стр. 18-33. Springer, (2022)RiskTeller: Predicting the Risk of Cyber Incidents., , и . CCS, стр. 1299-1311. ACM, (2017)Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems., , , , , и . RAID, стр. 135-150. ACM, (2023)