Follow
Moshe Kam
Title
Cited by
Cited by
Year
Sensor fusion for mobile robot navigation
M Kam, X Zhu, P Kalata
Proceedings of the IEEE 85 (1), 108-119, 1997
4001997
Optimal data fusion of correlated local decisions in multiple sensor detection systems
M Kam, Q Zhu, WS Gray
IEEE Transactions on Aerospace and Electronic Systems 28 (3), 916-920, 1992
2681992
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
L Fridman, S Weber, R Greenstadt, M Kam
IEEE Systems Journal 11 (2), 513-521, 2016
2572016
Multi-channel change-point malware detection
RJ Canzanese, S Mancoridis, M Kam
US Patent 9,853,997, 2017
2102017
Neural network architecture for control
A Guez, JL Eilbert, M Kam
IEEE control systems Magazine 8 (2), 22-25, 1988
2031988
Writer identification by professional document examiners
M Kam, G Fielding, R Conn
Journal of Forensic Sciences 42 (5), 778-786, 1997
1761997
Signature authentication by forensic document examiners
M Kam, K Gummadidala, G Fielding, R Conn
Journal of forensic sciences 46 (4), 884-888, 2001
1462001
Proficiency of professional document examiners in writer identification
M Kam, J Wetstein, R Conn
Journal of Forensic Sciences 39 (1), 5-14, 1994
1291994
A noise-resistant fuzzy c means algorithm for clustering
KK Chintalapudi, M Kam
1998 IEEE international conference on fuzzy systems proceedings. IEEE World …, 1998
1261998
System and method for secure ad hoc mobile communications and applications
W Regli, M Kam
US Patent App. 11/025,314, 2005
1232005
Automatic tracking and motility analysis of human sperm in time-lapse images
LF Urbano, P Masson, M VerMilyea, M Kam
IEEE transactions on medical imaging 36 (3), 792-801, 2016
1122016
Wind measurement and simulation techniques in multi-rotor small unmanned aerial vehicles
P Abichandani, D Lobo, G Ford, D Bucci, M Kam
IEEE Access 8, 54910-54927, 2020
1032020
Multi-modal decision fusion for continuous authentication
L Fridman, A Stolerman, S Acharya, P Brennan, P Juola, R Greenstadt, ...
Computers & Electrical Engineering 41, 142-156, 2015
892015
System call-based detection of malicious processes
R Canzanese, S Mancoridis, M Kam
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
882015
Design of phased arrays in terms of random subarrays
AP Goffer, M Kam, PR Herczfeld
IEEE transactions on Antennas and Propagation 42 (6), 820-826, 1994
781994
Robot motion planning on N-dimensional star worlds among moving obstacles
RA Conn, M Kam
IEEE Transactions on Robotics and Automation 14 (2), 320-325, 1998
771998
Effects of monetary incentives on performance of nonprofessionals in document-examination proficiency tests
M Kam, G Fielding, R Conn
Journal of forensic sciences 43 (5), 1000-1004, 1998
731998
Hardware complexity of binary distributed detection systems with isolated local Bayesian detectors
M Kam, W Chang, Q Zhu
IEEE transactions on systems, man, and cybernetics 21 (3), 565-571, 1991
721991
High bit rate ultrasonic communication through metal channels
R Primerano, M Kam, K Dandekar
2009 43rd Annual Conference on Information Sciences and Systems, 902-906, 2009
632009
Decision fusion and supervisor synthesis in decentralized discrete-event systems
JH Prosser, M Kam, HG Kwatny
Proceedings of the 1997 American Control Conference (Cat. No. 97CH36041) 4 …, 1997
621997
The system can't perform the operation now. Try again later.
Articles 1–20