Author of the publication

A new investment strategy based on data mining and Neural Networks.

, and . IJCNN, page 3094-3099. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Commentary Paper 3 on Visual Players Detection and Tracking in Soccer Matches.. AVSS, page 337-338. IEEE Computer Society, (2008)Commentary Paper 2 on Ä Probabilistic Bayesian Framework for Model-Based Object Tracking Using Undecimated Wavelet Packet Descriptors".. AVSS, page 117-118. IEEE Computer Society, (2008)Blind Detection for Additive Embedding Using Underdetermined ICA., , , and . ISM, page 758-761. IEEE Computer Society, (2006)New detector for spread-spectrum based image watermarking using underdetermined ICA., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721Y. SPIE, (2006)Multivariate mutual information for audio video fusion., , , , , and . Signal, Image and Video Processing, 10 (7): 1265-1272 (2016)Audio Splicing Detection and Localization Using Environmental Signature., , , and . CoRR, (2014)State-of-the-Art Survey on In-Vehicle Network Communication (CAN-Bus) Security and Vulnerabilities., and . CoRR, (2018)Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay., , and . CoRR, (2019)Steganalysis of Youtube Compressed Video Using High-order Statistics in 3D DCT Domain., , and . IIH-MSP, page 191-194. IEEE, (2012)Statistical modeling of footprints of QIM steganography.. ICME, page 1487-1492. IEEE Computer Society, (2010)