Author of the publication

A survey and experimental evaluation of image spam filtering techniques.

, , , and . Pattern Recognit. Lett., 32 (10): 1436-1446 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian relevance feedback for content-based image retrieval., and . Pattern Recognit., 37 (7): 1499-1508 (2004)Analysis of error-reject trade-off in linearly combined multiple classifiers., and . Pattern Recognit., 37 (6): 1245-1265 (2004)Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection., , , , , and . ACM Trans. Priv. Secur., 24 (4): 27:1-27:31 (2021)Critical analysis of adaptive biometric systems., , and . IET Biom., 1 (4): 179-187 (2012)Combination of neural and statistical algorithms for supervised classification of remote-sensing image., , and . Pattern Recognit. Lett., 21 (5): 385-397 (2000)A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements., , , and . ICIAP (2), volume 9280 of Lecture Notes in Computer Science, page 540-550. Springer, (2015)Semi-supervised Co-update of Multiple Matchers., , and . MCS, volume 5519 of Lecture Notes in Computer Science, page 152-160. Springer, (2009)Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks., , , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2019)Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training., , , , , , and . ICIAP (2), volume 14234 of Lecture Notes in Computer Science, page 515-526. Springer, (2023)Multimodal fingerprint verification by score-level fusion: An experimental investigation., , and . J. Intell. Fuzzy Syst., 24 (1): 51-60 (2013)