[1] Cover T and Hart P, IEEE Transactions on Information Theory 13, 21 (1967).
[2] Pedregosa F, Varoquaux G and Gramfort A, Journal of Machine Learning Research 12, 2825 (2011).
[3] Kreibig S.D, Biological Psychology 84, 394 (2010).
[4] Kim K.H, Bang S.W and Kim S.R, Medical & Biological Engineering & Computing 42, 419 (2004).
[5] Li L and Chen J.H, International Conference on Intelligent Information Hiding and Multimedia, 355 (2006).
[6] Chang C.Y, Tsai J.S, Wang C.J and Chung P.C, IEEE Conference on Computational Intelligence in Bioinformatics &Computational Biology, 278 (2009).
[7] Gou J.P, Qiu W.M, Yi Z, Xu Y, Mao Q.R and Zhan Y.Z, ACM Transactions on Intelligent Systems and Technology 10, 1 (2019).
[8] Koelstra S, Muhl C, Soleymani M, Lee J.S, Yazdani A, Ebrahimi T, Pun T, Nijholt A and Patras I, IEEE Transactions on Active Computing 3, 18 (2012).