Illicit image detection : An MRF model based stochastic approach
Illicit image detection using erotic pose estimation based on kinematic constraints
Optimization of classifiers for data mining based on combinatorial semigroups
Internet security applications of the Munn rings
Establishing phishing provenance using orthographic features
Rees matrix constructions for clustering of data
New traceability codes and identification algorithm for tracing pirates
Are you sure you would like to clear your session, including search history and login status?