CORC

浏览/检索结果: 共16条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Classifying user connections through social media avatars and users social activities: a case study in identifying sellers on social media 期刊论文
ENTERPRISE INFORMATION SYSTEMS, 2020, 页码: 20
作者:  Mao, Yu;  Zhu, Yifan;  Liu, Yiping;  Lin, Qika;  Lu, Hao
收藏  |  浏览/下载:16/0  |  提交时间:2021/03/02
"Suspicious" salivary gland FNA: Risk of malignancy and interinstitutional variability 期刊论文
CANCER CYTOPATHOLOGY, 2018, 卷号: 126, 期号: 2
作者:  Maleki, Zahra;  Miller, James Adam;  Arab, Seyedeh Elham;  Fadda, Guido;  Bo, Ping
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
SPATIO-TEMPORAL MOTION ANALYSIS BASED SUSPICIOUS BEHAVIOR DETECTION 会议论文
2016 13TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2016-01-01
作者:  Chu, Wangbin[1];  Guan, Yepeng[2]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/26
A Survey on Software Fault Localization 期刊论文
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2016, 卷号: 42, 期号: 8
作者:  Wong, W. Eric;  Gao, Ruizhi;  Li, Yihao;  Abreu, Rui;  Wotawa, Franz
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Recognition of suspicious behavior using case-based reasoning 期刊论文
Journal of Central South University, 2015, 卷号: 22, 期号: 1, 页码: 241-250
作者:  Xia Limin;  Yang Baojuan;  Tu Hongbin
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/03
Application and Efficiency of Probabilistic Neural Network in Suspicious Transaction Surveillance 会议论文
Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA 2015), Nanchang, PEOPLES R CHINA, JUN 13-14, 2015
作者:  Li Zhenghua*
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/24
一种基于Windows内核驱动的可疑样本采集系统的设计与实现 期刊论文
信息网络安全, 2014
张涛; 焦英楠; 禄立杰; 文伟平
收藏  |  浏览/下载:3/0  |  提交时间:2015/10/23
SVM-based Abnormal Account Monitoring Model of Bank 会议论文
International Conference of the Economic-Management-and-Trade-Cooperation (EMTC), Xian, PEOPLES R CHINA, 2014-01-01
作者:  Qin, Xue-Zhi;  Li, Jing-Yi;  Hu, You-Qun
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/09
Computer Aided Detection for Breast Calcification Clusters Based on Improved Instance Selection and an Adaptive Neuro-fuzzy Network 会议论文
作者:  Wang, Xiao-dong;  Feng, Jun;  Li, Yao-lin;  Li, Zhan;  Wang, Qiu-ping
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/03
DroidLogger: Reveal suspicious behavior of Android applications via instrumentation 其他
2012-01-01
Dai, Shuaifu; Wei, Tao; Zou, Wei
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13


©版权所有 ©2017 CSpace - Powered by CSpace