Your selections:
Detecting intrusion in the traffic signals of an intelligent traffic system
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Saha, Tapash
- Ulhaq, Anwaar, Yin, Xiaoxia, Zhang, Yunchan, Gondal, Iqbal
- Goode, Natassia, Salmon, Paul, Taylor, Natalie, Lenné, Michael, Finch, Caroline
Mobile malware detection - An analysis of the impact of feature categories
- Khoda, Mahbub, Kamruzzaman, Joarder, Gondal, Iqbal, Imam, Tasadduq
Weighted ANN input layer for adaptive features selection for robust fault classification
- Amar, Muhammad, Gondal, Iqbal, Wilson, Campbell
Improving authorship attribution in twitter through topic-based sampling
- Pan, Luoxi, Gondal, Iqbal, Layton, Robert
Secure passive keyless entry and start system using machine learning
- Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza
Breast density classification for cancer detection using DCT-PCA feature extraction and classifier ensemble
- Haque, Md Sarwar, Hassan, Md Rafiul, BinMakhashen, Galal, Owaidh, Abdullah, Kamruzzaman, Joarder
Influence of clustering on the opinion formation dynamics in online social networks
- Das, Rajkumar, Kamruzzaman, Joarder, Karmakar, Gour
Target learning : A novel framework to mine significant dependencies for unlabeled data
- Wang, Limin, Chen, Shenglei, Mammadov, Musa
Decoupled modeling of gene regulatory networks using Michaelis-Menten kinetics
- Youseph, Ahammed, Chetty, Madhu, Karmakar, Gour
Permit-to-work systems as a health and safety risk control strategy in mining : A prospective study in resilience engineering
- Pillay, Manikam, Tuck, Michael
Reversible data hiding in encrypted images based on image partition and spatial correlation
- Song, Chang, Zhang, Yifeng, Lu, Guojun
PU-shapelets : Towards pattern-based positive unlabeled classification of time series
- Liang, Shen, Zhang, Yanchun, Ma, Jiangang
A novel no-reference subjective quality metric for free viewpoint video using human eye movement
- Podder, Pallab, Paul, Manoranjan, Murshed, Manzur
Alignment-free fingerprint template protection technique based on minutiae neighbourhood information
- Nazmul, Rumana, Islam, Rafiqul, Chowdhury, Ahsan
A server side solution for detecting webInject : A machine learning approach
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal, Brown, Simon
Exploiting temporal genetic correlations for enhancing regulatory network optimization
- Youseph, Ahammed, Chetty, Madhu, Karmakar, Gour
An anomaly intrusion detection system using C5 decision tree classifier
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter
- Grant, Eryn, Goode, Natassia, Salmon, Paul, Lenné, Michael, Scott-Parker, Bridie, Finch, Caroline
Are you sure you would like to clear your session, including search history and login status?