Author of the publication

A novel multi-class SVM model using second-order cone constraints.

, , and . Appl. Intell., 44 (2): 457-469 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time-weighted Fuzzy Support Vector Machines for classification in changing environments., , and . Inf. Sci., (2021)Clustering Very Large Multi-dimensional Datasets with MapReduce, , , , , and . Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, August 21-24, 2011, page 690-698. ACM, (2011)An embedded feature selection approach for support vector classification via second-order cone programming., and . Intell. Data Anal., 19 (6): 1259-1273 (2015)A second-order cone programming formulation for twin support vector machines., , and . Appl. Intell., 45 (2): 265-276 (2016)Support vector machine under uncertainty: An application for hydroacoustic classification of fish-schools in Chile., , , and . Expert Syst. Appl., 40 (10): 4029-4034 (2013)Redefining nearest neighbor classification in high-dimensional settings., and . Pattern Recognit. Lett., (2018)Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC., , and . IACR Cryptology ePrint Archive, (2019)Robust twin support vector regression via second-order cone programming., and . Knowl. Based Syst., (2018)PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs., , , , , , and . IACR Cryptol. ePrint Arch., (2024)Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms., , , , , , , , and . IEEE Symposium on Security and Privacy, page 523-537. IEEE Computer Society, (2012)