Your selections:
Semantic image retrieval using region based inverted file
- Zhang, Dengsheng, Islam, Md, Lu, Guojun, Hou, Jin
Applying reinforcement learning in playing Robosoccer using the AIBO
A comparison of machine learning algorithms for multilabel classification of CAN
- Kelarev, Andrei, Stranieri, Andrew, Yearwood, John, Jelinek, Herbert
A review on automatic image annotation techniques
- Zhang, Dengsheng, Islam, Md, Lu, Guojun
Isolation-based anomaly detection
- Liu, Fei, Ting, Kaiming, Zhou, Zhi-Hua
Structural image retrieval using automatic image annotation and region based inverted file
- Zhang, Dengsheng, Islam, Md, Lu, Guojun
A new loss function for robust classification
- Zhao, Lei, Mammadov, Musa, Yearwood, John
Automated segmentation of mouse OCT volumes (ASiMOV): Validation & clinical study of a light damage model
- Antony, Bhavna, Kim, Byung-Jin, Lang, Andrew, Carass, Aaron, Prince, Jerry, Zack, Donald
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
Deep user modeling for content-based event recommendation in event-based social networks
- Wang, Zhibo, Zhang, Yongquan, Chen, Honglong, Li, Zhetao, Xia, Feng
Secure passive keyless entry and start system using machine learning
- Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza
A survey on big multimedia data processing and management in smart cities
- Usman, Muhammad, Jan, Mian, He, Xiangjian, Chen, Jinjun
Algorithm development for the non-destructive testing of structural damage
- Noori Hoshyar, Azadeh, Rashidi, Maria, Liyanapathirana, Ranjith, Samali, Bijan
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
- Ruan, Chunyang, Ma, Jiangang, Wang, Ye, Zhang, Yanchun, Yang, Yun
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
Survey of intrusion detection systems : techniques, datasets and challenges
- Khraisat, Ansam, Iqbal, Gondal, Vamplew, Peter, Kamruzzaman, Joarder
A probabilistic reverse power flows scenario analysis framework
- Demazy, Antonin, Alpcan, Tansu, Mareels, Iven
A survey on representation learning efforts in cybersecurity domain
- Usman, Muhammad, Jan, Mian, He, Xiangjian, Chen, Jinjun
An application of high-dimensional statistics to predictive modeling of grade variability
- Hinz, Juri, Grigoryev, Igor, Novikov, Alexander
Are you sure you would like to clear your session, including search history and login status?