Author of the publication

Vessel track correlation and association using fuzzy logic and Echo State Networks.

, , , and . IEEE Congress on Evolutionary Computation, page 2322-2329. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Collaborative Association Rule Mining., , , and . ICEB, page 1172-1178. Academic Publishers/World Publishing Corporation, (2004)Learning over subconcepts: Strategies for 1-class classification., , and . Comput. Intell., 34 (2): 440-467 (2018)Automated Approach To Classification Of Mine-Like Objects Using Multiple-Aspect Sonar Images., , , and . J. Artif. Intell. Soft Comput. Res., 4 (2): 133-148 (2014)CPDGA: Change point driven growing auto-encoder for lifelong anomaly detection., , and . Knowl. Based Syst., (2022)Machine-Generated Text: A Comprehensive Survey of Threat Models and Detection Methods., , and . IEEE Access, (2023)ECHAD: Embedding-Based Change Detection From Multivariate Time Series in Smart Grids., , , , and . IEEE Access, (2020)A Visualization-Based Exploratory Technique for Classifier Comparison with Respect to Multiple Metrics and Multiple Domains., , and . ECML/PKDD (2), volume 5212 of Lecture Notes in Computer Science, page 660-665. Springer, (2008)Towards Ethical Content-Based Detection Of Online Influence Campaigns., , and . MLSP, page 1-6. IEEE, (2019)Adaptive Threshold for Outlier Detection on Data Streams., , and . DSAA, page 41-49. IEEE, (2018)AutoCorrel: a neural network event correlation approach., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6241 of SPIE Proceedings, page 62410N. SPIE, (2006)