共 63 条
[1]
Design and Implementation of Smartphone Applications for Speaker Count and Gender Recognition
[J].
INTERNET OF THINGS-BOOK,
2010,
:187-194
[3]
Al-Naffakh N., 2018, Trust Management XII. IFIPTM., P15, DOI [10.1007/978-3-319-95276-5_2, DOI 10.1007/978-3-319-95276-5_2]
[4]
Antal M, 2016, 2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), P243, DOI 10.1109/SACI.2016.7507379
[5]
Group Leakage Overestimates Performance: A Case Study in Keystroke Dynamics
[J].
2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2021,
2021,
:1410-1417
[7]
Barra P., 2019, DEPENDABILITY SENSOR, V5, P180
[8]
Context-Aware User Interfaces for Intelligent Emergency Applications
[J].
MODELING AND USING CONTEXT (CONTEXT 2017),
2017, 10257
:359-369
[9]
Bhardwaj A., 2018, Deep Learning Essentials: Your HandsOn Guide to the Fundamentals of Deep Learning and Neural Network Modeling
[10]
Bracewell R., 1966, Am. J. Phys., V34, P712