Keijo Haataja
According to our database1,
Keijo Haataja
authored at least 36 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Efficiency Meets Accuracy: Benchmarking Object Detection Models for Pathology Detection in Wireless Capsule Endoscopy.
IEEE Access, 2024
2023
Convolutional neural networks for real-time wood plank detection and defect segmentation.
F1000Research, 2023
A novel deep learning method for recognizing texts printed with multiple different printing methods.
F1000Research, 2023
2022
Recent advancements in machine vision methods for product code recognition: A systematic review.
F1000Research, 2022
Proceedings of the Image Processing: Algorithms and Systems XX, 2022
2021
Proposal of a novel Artificial Intelligence Distribution Service platform for healthcare.
F1000Research, 2021
Proceedings of the Intelligent Systems Design and Applications, 2021
Proceedings of the Intelligent Systems Design and Applications, 2021
Proceedings of the Image Processing: Algorithms and Systems XIX, 2021
State-of-the-Art Techniques in Artificial Intelligence for Continual Learning: A Review.
Proceedings of the Position and Communication Papers of the 16th Conference on Computer Science and Intelligence Systems, 2021
2020
Survey to healthcare professionals on the practicality of AI services for healthcare.
F1000Research, 2020
2017
Proceedings of the Tenth International Conference on Machine Vision, 2017
2016
Proceedings of the Intelligent Systems Design and Applications, 2016
2015
Systematic Literature Review on Empirical Results and Practical Implementations of Healthcare Recommender Systems: Lessons Learned and a Novel Proposal.
Int. J. Heal. Inf. Syst. Informatics, 2015
Current analysis approaches and performance needs for whole slide image processing in breast cancer diagnostics.
Proceedings of the 2015 International Conference on Embedded Computer Systems: Architectures, 2015
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015
Optimized curve design for image analysis using localized geodesic distance transformations.
Proceedings of the Image Processing: Algorithms and Systems XIII, 2015
Proceedings of the Internet of Things. IoT Infrastructures, 2015
2014
Mobile Health Applications: A Comparative Analysis and a Novel Mobile Health Platform.
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014
Computer-aided breast cancer histopathological diagnosis: Comparative analysis of three DTOCS-based features: SW-DTOCS, SW-WDTOCS and SW-3-4-DTOCS.
Proceedings of the 4th International Conference on Image Processing Theory, 2014
Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014
Computer-assisted image analysis of histopathological breast cancer images using step-DTOCS.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-3-642-40646-1, 2013
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013
3D imaging of human brain in the diagnostics of insomnia and depression: A comparative analysis, a novel insomnia/depression diagnostics approach, and lessons learned.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013
Proceedings of the 13th International Conference on Hybrid Intelligent Systems, 2013
Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2010
Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures.
IEEE Trans. Wirel. Commun., 2010
New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
Proceedings of the Eighth International Conference on Networks, 2009
2008
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008
Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006