Your selections:
Applying reinforcement learning in playing Robosoccer using the AIBO
Structural image retrieval using automatic image annotation and region based inverted file
- Zhang, Dengsheng, Islam, Md, Lu, Guojun
Semantic image retrieval using region based inverted file
- Zhang, Dengsheng, Islam, Md, Lu, Guojun, Hou, Jin
Isolation-based anomaly detection
- Liu, Fei, Ting, Kaiming, Zhou, Zhi-Hua
A comparison of machine learning algorithms for multilabel classification of CAN
- Kelarev, Andrei, Stranieri, Andrew, Yearwood, John, Jelinek, Herbert
A review on automatic image annotation techniques
- Zhang, Dengsheng, Islam, Md, Lu, Guojun
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
Secure passive keyless entry and start system using machine learning
- Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza
- Ruan, Chunyang, Ma, Jiangang, Wang, Ye, Zhang, Yanchun, Yang, Yun
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
A new loss function for robust classification
- Zhao, Lei, Mammadov, Musa, Yearwood, John
Function similarity using family context
- Black, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
An application of high-dimensional statistics to predictive modeling of grade variability
- Hinz, Juri, Grigoryev, Igor, Novikov, Alexander
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Survey of intrusion detection systems : techniques, datasets and challenges
- Khraisat, Ansam, Iqbal, Gondal, Vamplew, Peter, Kamruzzaman, Joarder
Rapid health data repository allocation using predictive machine learning
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
Predicting the condensate viscosity near the wellbore by ELM and ANFIS-PSO strategies
- Mousazadeh, Fatemeh, Naeem, Mohammad, Daneshfar, Reza, Soulgani, Bahram, Naseri, Maryam
Biopsychosocial Data Analytics and Modeling
Cyberbullying detection on social networks using machine learning approaches
- Islam, Md Manowarul, Uddin, Md Ashraf, Islam, Linta, Akter, Arnisha, Sharmin, Selina, Acharjee, Uzzal
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
Are you sure you would like to clear your session, including search history and login status?