Your selections:
A survey on machine learning techniques for cyber security in the last decade
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Xu, Min
An investigation of credit card default prediction in the imbalanced datasets
- Alam, Talha Mahboob, Shaukat, Kamran, Hameed, Ibrahim A., Luo, Suhuai, Sarwar, Muhammad Umer, Shabbir, Shakir, Li, Jiaming, Khushi, Matloob
Analysis and findings of social engineering industry experts explorative interviews: perspectives on measures, tools, and solutions
- Aldawood, Hussain, Skinner, Geoffrey
Deep learning for intake gesture detection from wrist-worn inertial sensors: the effects of data preprocessing, sensor modalities, and sensor positions
- Heydarian, Hamid, Rouast, Philipp V., Adam, Marc T. P., Burrows, Tracy, Collins, Clare E., Rollo, Megan E.
OREBA: a dataset for objectively recognizing eating behavior and associated intake
- Rouast, Philipp V., Heydarian, Hamid, Adam, Marc T. P., Rollo, Megan E.
Robust Trajectory Tracking Control for Fully Actuated Marine Surface Vehicle
- Del-Rio-Rivera, Francisco, Ramirez-Rivera, Victor M., Donaire, Alejandro, Ferguson, Joel
- Yang, Lijuan, Zhang, Yu, Chiong, Raymond, Dhakal, Sandeep, Qi, Qiangqiang
CASA-Crowd: a Context-Aware Scale Aggregation CNN-based crowd counting technique
- Ilyas, Naveed, Ahmad, Ashfaq, Kim, Kiseon
A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks
- Wei, Jiannan, Wang, Xiaojie, Li, Nan, Yang, Guomin, Mu, Yi
Malytics: a malware detection scheme
- Yousefi-Azar, Mahmood, Hamey, Leonard G. C., Varadharajan, Vijay, Chen, Shiping
Modern Trends in Hyperspectral Image Analysis: A Review
- Khan, Muhammad Jaleed, Khan, Hamid Saeed, Yousaf, Adeel, Khurshid, Khurram, Abbas, Asad
Secure monitoring of patients with wandering behaviour in hospital environments
- Varadharajan, Vijay, Tupakula, Uday, Karmakar, Kallol
Are you sure you would like to clear your session, including search history and login status?