: A Variational Universal Background Model for EEG-Based Person Authentication H Tran, D Tran, W Ma, P Nguyen International Conference on Neural Information Processing, 478-485, 2019 | | 2019 |
A Comprehensive Survey of the Application of the Microsoft Kinect for Fall Avoidance in the Elderly through Gait and Sit/Stand Parameters J Pipitone, D Tran, W Ma | | 2012 |
A comprehensive survey of the feature extraction methods in the EEG research MA Rahman, W Ma, D Tran, J Campbell Algorithms and Architectures for Parallel Processing: 12th International …, 2012 | 31 | 2012 |
A conceptual framework for assessing password quality W Ma, J Campbell, D Tran, D Kleeman International Journal of Computer Science and Network Security 7 (1), 179-185, 2007 | 29 | 2007 |
A general aggregate model for improving multi-class brain-computer interface systems' performance T Hoang, D Tran, X Huang, W Ma The 2013 International Joint Conference on Neural Networks (IJCNN), 1-5, 2013 | 1 | 2013 |
A Generic Framework for Soft Subspace Pattern Recognition D Tran, W Ma, D Sharma, L Bui, T Le Theory and Novel Applications of Machine Learning, 2009 | 1 | 2009 |
A multi-agent security architecture R Sulaiman, D Sharma, W Ma, D Tran 2009 Third International Conference on Network and System Security, 184-191, 2009 | 10 | 2009 |
A multi-agent security framework for e-health services R Sulaiman, D Sharma, W Ma, D Tran Knowledge-Based Intelligent Information and Engineering Systems: 11th …, 2007 | 11 | 2007 |
A Multi-Agent-Based IT Security Approach D Sharma, W Ma, D Tran, S Liu, M Anderson Architectural Design of Multi-Agent Systems: Technologies and Techniques …, 2007 | | 2007 |
A multiple agents based intrusion detection system W Ma, D Sharma International Conference on Knowledge-Based and Intelligent Information and …, 2005 | 6 | 2005 |
A New Approach to Compressed File Fragment Identification K Nguyen, D Tran, W Ma, D Sharma International Joint Conference: CISIS’15 and ICEUTE’15, 377-387, 2015 | 4 | 2015 |
A New Approach to Executable File Fragment Detection in Network Forensics K Nguyen, D Tran, W Ma, D Sharma Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 2 | 2014 |
A new fuzzy membership computation method for fuzzy support vector machines T Le, D Tran, W Ma, D Sharma International Conference on Communications and Electronics 2010, 153-157, 2010 | 12 | 2010 |
A new security model using multilayer approach for E-health services R Sulaiman, D Sharma, MA Wanli, T Dat Journal of Computer Science 7 (11), 1691-1703, 2011 | 5 | 2011 |
A new support vector machine method for medical image classification T Le, D Tran, W Ma, D Sharma 2010 2nd European Workshop on Visual Information Processing (EUVIP), 165-170, 2010 | 9 | 2010 |
A new term ranking method based on relation extraction and graph model for text classification D Huynh, D Tran, W Ma, D Sharma Proceedings of the Thirty-Fourth Australasian Computer Science Conference …, 2011 | 18 | 2011 |
A Noise tolerant spam email detection engine D Tran, W Ma, D Sharma WITSP (5th Workshop on Internet, Telecommunications & Signal Processing), 1-5, 2006 | 5 | 2006 |
A novel application of deep learning to forensic hair analysis methodology M Airlie, J Robertson, W Ma, D Airlie, E Brooks Australian Journal of Forensic Sciences 56 (3), 311-322, 2024 | 3 | 2024 |
A novel approach to programming: Agent based software engineering D Sharma, W Ma, D Tran, M Anderson Knowledge-Based Intelligent Information and Engineering Systems: 10th …, 2006 | 4 | 2006 |
A novel parameter refinement approach to one class support vector machine T Le, D Tran, W Ma, D Sharma Neural Information Processing: 18th International Conference, ICONIP 2011 …, 2011 | 3 | 2011 |