Your selections:
Improved image analysis methodology for detecting changes in evidence positioning at crime scenes
- Petty, Mark, Teng, Shyh, Murshed, Manzur
- Ghayur, Adeel, Verheyen, Vincent
Integrating biological heuristics and gene expression data for gene regulatory network inference
- Zarnegar, Armita, Jelinek, Herbert, Vamplew, Peter, Stranieri, Andrew
Isolation set-kernel and its application to multi-instance learning
- Xu, Bi-Cun, Ting, Kaiming, Zhou, Zhi-Hua
Measuring soil strain using fibre optic sensors
- Costa, Susanga, Kahandawa, Gayan, Chen, Jian, Xue, Jianfeng
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
- Shelat, Niraj, Das, Narottam, Khan, Masud, Islam, Syed
One-shot malware outbreak detection using spatio-temporal isomorphic dynamic features
- Park, Sean, Gondal, Iqbal, Kamruzzaman, Joarder, Zhang, Leo
Privacy and Security of Connected Vehicles in Intelligent Transportation System
- Jolfaei, Alireza, Kant, Krishna
PU-shapelets : Towards pattern-based positive unlabeled classification of time series
- Liang, Shen, Zhang, Yanchun, Ma, Jiangang
Reversible data hiding in encrypted images based on image partition and spatial correlation
- Song, Chang, Zhang, Yifeng, Lu, Guojun
Security hardening of implantable cardioverter defibrillators
- Jaffar, Iram, Usman, Muhammad, Jolfaei, Alireza
Selective adversarial learning for mobile malware
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
Semi-invasive system for detecting and monitoring dementia patients
- Yamsanwar, Yash, Patankar, Amol, Kulkarni, Siddhivinayak, Stratton, David, Stranieri, Andrew
Trusted autonomous vehicle : measuring trust using on-board unit data
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder
Verification of latency and delays related to a digital topology based on IEC 61850
- Kumar, Shantanu, Das, Narottam, Islam, Syed, Abu-Siada, Ahmed
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
A kernel-based approach for content-based image retrieval
- Karmakar, Priyabrata, Teng, Shyh, Lu, Guojun, Zhang, Dengsheng
A novel perceptual dissimilarity measure for image retrieval
- Shojanazeri, Hamid, Zhang, Dengsheng, Teng, Shyh, Aryal, Sunil, Lu, Guojun
Are you sure you would like to clear your session, including search history and login status?