default search action
Jan Kohout
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Alan Spark, Jan Kohout, Ludmila Verespejová, Martin Chovanec, Jan Mares:
Multi Path Heterogeneous Neural Networks: Novel comprehensive classification method of facial nerve function. Biomed. Signal Process. Control. 101: 107152 (2025) - 2024
- [j8]Mohsen Shayestegan, Jan Kohout, Ludmila Verespejová, Martin Chovanec, Jan Mares:
Comparison of Feature Selection and Supervised Methods for Classifying Gait Disorders. IEEE Access 12: 17876-17894 (2024) - [j7]Mohsen Shayestegan, Jan Kohout, Katerina Trnková, Martin Chovanec, Jan Mares:
Gait disorder classification based on effective feature selection and unsupervised methodology. Comput. Biol. Medicine 170: 108077 (2024) - 2023
- [j6]Mohsen Shayestegan, Jan Kohout, Katerina Trnková, Martin Chovanec, Jan Mares:
Motion Tracking in Diagnosis: Gait Disorders Classification with a Dual-Head Attentional Transformer-LSTM. Int. J. Comput. Intell. Syst. 16(1): 98 (2023) - [c13]Jaroslav Hlavác, Martin Kopp, Jan Kohout, Tomás Skopal:
Class Representatives Selection in Non-metric Spaces for Nearest Prototype Classification. SISAP 2023: 111-124 - 2021
- [j5]Jan Kohout, Ludmila Verespejová, Pavel Kríz, Lenka Cervená, Karel Stícha, Jan Crha, Katerina Trnková, Martin Chovanec, Jan Mares:
Advanced Statistical Analysis of 3D Kinect Data: Mimetic Muscle Rehabilitation Following Head and Neck Surgeries Causing Facial Paresis. Sensors 21(1): 103 (2021) - [c12]Jaroslav Hlavác, Martin Kopp, Michael Polák, Jan Kohout:
Towards Reliable Network Entity Tracking Using Behavioural Bag of Words Representation. ITAT 2021: 53-60 - [c11]Paul Prasse, Jan Brabec, Jan Kohout, Martin Kopp, Lukás Bajer, Tobias Scheffer:
Learning Explainable Representations of Malware Behavior. ECML/PKDD (4) 2021: 53-68 - [i3]Paul Prasse, Jan Brabec, Jan Kohout, Martin Kopp, Lukás Bajer, Tobias Scheffer:
Learning Explainable Representations of Malware Behavior. CoRR abs/2106.12328 (2021) - [i2]Jaroslav Hlavác, Martin Kopp, Jan Kohout:
Cluster Representatives Selection in Non-Metric Spaces for Nearest Prototype Classification. CoRR abs/2107.01345 (2021) - [i1]Jan Kohout, Cenek Skarda, Kyrylo Shcherbin, Martin Kopp, Jan Brabec:
A framework for comprehensible multi-modal detection of cyber threats. CoRR abs/2111.05764 (2021)
2010 – 2019
- 2018
- [j4]Jan Kohout, Tomás Komárek, Premysl Cech, Jan Bodnár, Jakub Lokoc:
Learning communication patterns for malware discovery in HTTPs data. Expert Syst. Appl. 101: 129-142 (2018) - [j3]Jan Kohout, Tomás Pevný:
Network Traffic Fingerprinting Based on Approximated Kernel Two-Sample Test. IEEE Trans. Inf. Forensics Secur. 13(3): 788-801 (2018) - [c10]Martin Kopp, Martin Grill, Jan Kohout:
Community-based anomaly detection. WIFS 2018: 1-6 - 2016
- [j2]Jan Jusko, Martin Rehák, Jan Stiborek, Jan Kohout, Tomás Pevný:
Using Behavioral Similarity for Botnet Command-and-Control Discovery. IEEE Intell. Syst. 31(5): 16-22 (2016) - [c9]Jakub Lokoc, Jan Kohout, Premysl Cech, Tomás Skopal, Tomás Pevný:
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach. PAISI 2016: 131-145 - [c8]Premysl Cech, Jan Kohout, Jakub Lokoc, Tomás Komárek, Jakub Marousek, Tomás Pevný:
Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce. SISAP 2016: 311-324 - 2015
- [c7]Jan Kohout, Tomás Pevný:
Unsupervised detection of malware in persistent web traffic. ICASSP 2015: 1757-1761 - [c6]Jan Kohout, Tomás Pevný:
Automatic discovery of web servers hosting similar applications. IM 2015: 1310-1315 - [c5]Jan Kohout, Jirí Cigler, Jan Siroky, Pavel Hrncirik, Jan Nahlik, Jan Mengler:
Application of knowledge-based control on an antibiotics production fermentation process. IWCIM 2015: 1-5 - 2013
- [c4]Jan Kohout, Roman Neruda:
Two-Phase Genetic Algorithm for Social Network Graphs Clustering. AINA Workshops 2013: 197-202 - 2012
- [c3]Jan Kohout, Roman Neruda:
Exploration and Exploitation Operators for Genetic Graph Clustering Algorithm. ISMIS 2012: 87-92 - 2011
- [j1]Barbora Hladká, Jirí Mírovský, Jan Kohout:
An attractive game with the document: (im)possible? Prague Bull. Math. Linguistics 96: 5-26 (2011)
2000 – 2009
- 2005
- [c2]Ladislav Dusek, Ivan Holoubek, Jirí Jarkovský, Jana Koptikova, Jan Kohout, Roman Smid, Petr Pavlis, Jan Muzík, Jirí Hrebícek:
Human and Ecological Risk Assessment, Expert Systems. EnviroInfo 2005: 948-952 - [c1]Jirí Hrebícek, Jan Kohout:
Formalized Analysis Supporting Automated Scenarios for Environmental Risk Assessment. EnviroInfo 2005: 989-990
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint