_ | suspicious | _ |
aliasing detection algorithm based on | suspicious | colocalizations of Fourier coefficients, An |
Application of DNN for radar micro-doppler signature-based human | suspicious | activity recognition |
Automated Real-Time Detection of Potentially | suspicious | Behavior in Public Transport Areas |
Autonomous UAV for | suspicious | Action Detection using Pictorial Human Pose Estimation and Classification |
Can self-training identify | suspicious | ugly duckling lesions? |
Carried Object Detection Using Ratio Histogram and its Application to | suspicious | Event Analysis |
Context-Based Approach for Detecting | suspicious | Behaviours, A |
Detecting | suspicious | Background Changes in Video Surveillance of Busy Scenes |
Determination of the Number of | suspicious | Clustered Micro Calcifications on ROI of Mammogram Images, The |
Discriminant Saliency, the Detection of | suspicious | Coincidences, and Applications to Visual Recognition |
Early Detection of | suspicious | Behaviors for Safe Residence from Movement Trajectory Data |
Enhanced Intensity Analysis to Quantify Categorical Change and to Identify | suspicious | Land Transitions: A Case Study of Nanchang, China |
Framework for | suspicious | Action Detection with Mixture Distributions of Action Primitives, A |
Hybrid Deep-Learning-Based Anomaly Detection Scheme for | suspicious | Flow Detection in SDN: A Social Multimedia Perspective |
Incremental behavior modeling and | suspicious | activity detection |
novel soft cluster neural network for the classification of | suspicious | areas in digital mammograms, A |
Online learning of contexts for detecting | suspicious | behaviors in surveillance videos |
Proactive Eavesdropping via Jamming Over Multiple | suspicious | Links With Wireless-Powered Monitor |
Proactive Eavesdropping With Jamming Power Allocation in Training-Based | suspicious | Communications |
Real-Time Aerial | suspicious | Analysis (ASANA) System for the Identification and Re-Identification of Suspicious Individuals using the Bayesian ScatterNet Hybrid (BSH) Network |
Real-Time Aerial | suspicious | Analysis (ASANA) System for the Identification and Re-Identification of Suspicious Individuals using the Bayesian ScatterNet Hybrid (BSH) Network |
Real-Time Semantics-Based Detection of | suspicious | Activities in Public Spaces |
Selection of | suspicious | ROIs in Breast DCE-MRI |
Statistical Textural Distinctiveness in Multi-Parametric Prostate MRI for | suspicious | Region Detection |
Survey on W-Band Systems for | suspicious | Object Detection Using Artificial Intelligence, A |
| suspicious | Behavior Detection: Current Trends and Future Directions |
| suspicious | behaviour detection using a context space model for smart surveillance systems, A |
| suspicious | Face Detection based on Eye and other facial features movement monitoring |
| suspicious | Multi-Object Detection and Recognition Method for Millimeter Wave SAR Security Inspection Images Based on Multi-Path Extraction Network, A |
| suspicious | Object Detection for Millimeter-Wave Images With Multi-View Fusion Siamese Network |
| suspicious | -Region Segmentation From Breast Thermogram Using DLPE-Based Level Set Method |
Unsupervised Structure Learning: Hierarchical Recursive Composition, | suspicious | Coincidence and Competitive Exclusion |
Vision-Based System for Automatic Detection of | suspicious | Objects on ATM |
Wireless Information Surveillance and Intervention Over Multiple | suspicious | Links |
34 for suspicious