Search Constraints
Search Results
Select an image to start the slideshow
Detecting Various Types of Malicious Users at One Sitting in Online Social Networks
1 of 17
Time Series Data Analytics
2 of 17
Deep Learning Approach to Trespass Detection using Video Surveillance Data
3 of 17
Pointwise and Instance Segmentation for 3D Point Cloud
4 of 17
Training Noise-Robust Spoken Phrase Detectors with Scarce and Private Data: An Application to Classroom Observation Videos
5 of 17
Using Smart Scheduling to Reduce the Negative Impacts of Instrumentation-based Defenses on Embedded Systems
6 of 17
Boosting Gene Expression Clustering with System-Wide Biological Information and Deep Learning
7 of 17
Improving Math Learning With Embodied Game- Based Mobile and Wearable Technologies
8 of 17
Quantifying, Modeling and Managing How People Interact with Visualizations on the Web
9 of 17
Sequential Data Mining and its Applications to Pharmacovigilance
10 of 17
Robot-Enhanced ABA Therapy: Exploring Emerging Artificial Intelligence Embedded Systems in Socially Assistive Robots for the Treatment of Autism
11 of 17
Deep Learning on Graph-structured Data
12 of 17
Secure Key Agreement for Wearable Medical Devices
13 of 17
Augmenting Network Flows with User Interface Context to Inform Access Control Decisions
14 of 17
Reusable Annotations for Matching of Event Sequences to Construct Firewall Policies
15 of 17
How's My Network - Incentives and Impediments of Home Network Measurements
16 of 17
Deep Learning on Attributed Sequences
17 of 17