Some good practices for applying convolutional neural networks to buried threat detection in Ground Penetrating Radar

Author(s):  
Daniel Reichman ◽  
Leslie M. Collins ◽  
Jordan M. Malof
Sign in / Sign up

Export Citation Format

Share Document