Sensor fusion for mobile robot navigation M Kam, X Zhu, P Kalata Proceedings of the IEEE 85 (1), 108-119, 1997 | 400 | 1997 |
Optimal data fusion of correlated local decisions in multiple sensor detection systems M Kam, Q Zhu, WS Gray IEEE Transactions on Aerospace and Electronic Systems 28 (3), 916-920, 1992 | 268 | 1992 |
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location L Fridman, S Weber, R Greenstadt, M Kam IEEE Systems Journal 11 (2), 513-521, 2016 | 257 | 2016 |
Multi-channel change-point malware detection RJ Canzanese, S Mancoridis, M Kam US Patent 9,853,997, 2017 | 210 | 2017 |
Neural network architecture for control A Guez, JL Eilbert, M Kam IEEE control systems Magazine 8 (2), 22-25, 1988 | 203 | 1988 |
Writer identification by professional document examiners M Kam, G Fielding, R Conn Journal of Forensic Sciences 42 (5), 778-786, 1997 | 176 | 1997 |
Signature authentication by forensic document examiners M Kam, K Gummadidala, G Fielding, R Conn Journal of forensic sciences 46 (4), 884-888, 2001 | 146 | 2001 |
Proficiency of professional document examiners in writer identification M Kam, J Wetstein, R Conn Journal of Forensic Sciences 39 (1), 5-14, 1994 | 129 | 1994 |
A noise-resistant fuzzy c means algorithm for clustering KK Chintalapudi, M Kam 1998 IEEE international conference on fuzzy systems proceedings. IEEE World …, 1998 | 126 | 1998 |
System and method for secure ad hoc mobile communications and applications W Regli, M Kam US Patent App. 11/025,314, 2005 | 123 | 2005 |
Automatic tracking and motility analysis of human sperm in time-lapse images LF Urbano, P Masson, M VerMilyea, M Kam IEEE transactions on medical imaging 36 (3), 792-801, 2016 | 112 | 2016 |
Wind measurement and simulation techniques in multi-rotor small unmanned aerial vehicles P Abichandani, D Lobo, G Ford, D Bucci, M Kam IEEE Access 8, 54910-54927, 2020 | 103 | 2020 |
Multi-modal decision fusion for continuous authentication L Fridman, A Stolerman, S Acharya, P Brennan, P Juola, R Greenstadt, ... Computers & Electrical Engineering 41, 142-156, 2015 | 89 | 2015 |
System call-based detection of malicious processes R Canzanese, S Mancoridis, M Kam 2015 IEEE International Conference on Software Quality, Reliability and …, 2015 | 88 | 2015 |
Design of phased arrays in terms of random subarrays AP Goffer, M Kam, PR Herczfeld IEEE transactions on Antennas and Propagation 42 (6), 820-826, 1994 | 78 | 1994 |
Robot motion planning on N-dimensional star worlds among moving obstacles RA Conn, M Kam IEEE Transactions on Robotics and Automation 14 (2), 320-325, 1998 | 77 | 1998 |
Effects of monetary incentives on performance of nonprofessionals in document-examination proficiency tests M Kam, G Fielding, R Conn Journal of forensic sciences 43 (5), 1000-1004, 1998 | 73 | 1998 |
Hardware complexity of binary distributed detection systems with isolated local Bayesian detectors M Kam, W Chang, Q Zhu IEEE transactions on systems, man, and cybernetics 21 (3), 565-571, 1991 | 72 | 1991 |
High bit rate ultrasonic communication through metal channels R Primerano, M Kam, K Dandekar 2009 43rd Annual Conference on Information Sciences and Systems, 902-906, 2009 | 63 | 2009 |
Decision fusion and supervisor synthesis in decentralized discrete-event systems JH Prosser, M Kam, HG Kwatny Proceedings of the 1997 American Control Conference (Cat. No. 97CH36041) 4 …, 1997 | 62 | 1997 |