关注
Wanli Ma
Wanli Ma
在 canberra.edu.au 的电子邮件经过验证
标题
引用次数
年份
: A Variational Universal Background Model for EEG-Based Person Authentication
H Tran, D Tran, W Ma, P Nguyen
International Conference on Neural Information Processing, 478-485, 2019
2019
A Comprehensive Survey of the Application of the Microsoft Kinect for Fall Avoidance in the Elderly through Gait and Sit/Stand Parameters
J Pipitone, D Tran, W Ma
2012
A comprehensive survey of the feature extraction methods in the EEG research
MA Rahman, W Ma, D Tran, J Campbell
Algorithms and Architectures for Parallel Processing: 12th International …, 2012
312012
A conceptual framework for assessing password quality
W Ma, J Campbell, D Tran, D Kleeman
International Journal of Computer Science and Network Security 7 (1), 179-185, 2007
292007
A general aggregate model for improving multi-class brain-computer interface systems' performance
T Hoang, D Tran, X Huang, W Ma
The 2013 International Joint Conference on Neural Networks (IJCNN), 1-5, 2013
12013
A Generic Framework for Soft Subspace Pattern Recognition
D Tran, W Ma, D Sharma, L Bui, T Le
Theory and Novel Applications of Machine Learning, 2009
12009
A multi-agent security architecture
R Sulaiman, D Sharma, W Ma, D Tran
2009 Third International Conference on Network and System Security, 184-191, 2009
102009
A multi-agent security framework for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
Knowledge-Based Intelligent Information and Engineering Systems: 11th …, 2007
112007
A Multi-Agent-Based IT Security Approach
D Sharma, W Ma, D Tran, S Liu, M Anderson
Architectural Design of Multi-Agent Systems: Technologies and Techniques …, 2007
2007
A multiple agents based intrusion detection system
W Ma, D Sharma
International Conference on Knowledge-Based and Intelligent Information and …, 2005
62005
A New Approach to Compressed File Fragment Identification
K Nguyen, D Tran, W Ma, D Sharma
International Joint Conference: CISIS’15 and ICEUTE’15, 377-387, 2015
42015
A New Approach to Executable File Fragment Detection in Network Forensics
K Nguyen, D Tran, W Ma, D Sharma
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
22014
A new fuzzy membership computation method for fuzzy support vector machines
T Le, D Tran, W Ma, D Sharma
International Conference on Communications and Electronics 2010, 153-157, 2010
122010
A new security model using multilayer approach for E-health services
R Sulaiman, D Sharma, MA Wanli, T Dat
Journal of Computer Science 7 (11), 1691-1703, 2011
52011
A new support vector machine method for medical image classification
T Le, D Tran, W Ma, D Sharma
2010 2nd European Workshop on Visual Information Processing (EUVIP), 165-170, 2010
92010
A new term ranking method based on relation extraction and graph model for text classification
D Huynh, D Tran, W Ma, D Sharma
Proceedings of the Thirty-Fourth Australasian Computer Science Conference …, 2011
182011
A Noise tolerant spam email detection engine
D Tran, W Ma, D Sharma
WITSP (5th Workshop on Internet, Telecommunications & Signal Processing), 1-5, 2006
52006
A novel application of deep learning to forensic hair analysis methodology
M Airlie, J Robertson, W Ma, D Airlie, E Brooks
Australian Journal of Forensic Sciences 56 (3), 311-322, 2024
32024
A novel approach to programming: Agent based software engineering
D Sharma, W Ma, D Tran, M Anderson
Knowledge-Based Intelligent Information and Engineering Systems: 10th …, 2006
42006
A novel parameter refinement approach to one class support vector machine
T Le, D Tran, W Ma, D Sharma
Neural Information Processing: 18th International Conference, ICONIP 2011 …, 2011
32011
系统目前无法执行此操作,请稍后再试。
文章 1–20