Search for persons
X
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Machine Intelligence and Emerging Technologies ,
1
Segmented-Truncated-SVD for Effective Feature Extraction in..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Machine Intelligence and Emerging Technologies ,
2
Segmented-Incremental-PCA for Hyperspectral Image Classific..:
, In:
?
2022 12th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) ,
3
Microarray Image Segmentation Based on Level Set and Regrid..:
, In:
?
2023 17th International Conference on Electronics Computer and Computation (ICECCO) ,
4
Design and Implementation of an IoT-based Smart Pillbox for..:
, In:
?
2021 IEEE International Conference on Robotics, Automation, Artificial-Intelligence and Internet-of-Things (RAAICON) ,
6
An Approach of Implementing IoT Based Rooftop Rainwater Har..:
, In:
?
2022 4th International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE) ,
7
Segmented-Sparse-PCA for Hyperspectral Image Classification:
, In:
?
2022 25th International Conference on Computer and Information Technology (ICCIT) ,
8
Spectrally-Segmented-Incremental-PCA for Hyperspectral Imag..:
, In:
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks ,
10
iDDAF: An Intelligent Deceptive Data Acquisition Framework ..:
, In:
?
2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC) ,
11
DDAF: Deceptive Data Acquisition Framework against Stealthy..:
, In:
?
2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) ,
12
G-IDS: Generative Adversarial Networks Assisted Intrusion D..:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
13