From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Special issue HAIS 2015: Recent advancements in hybrid artificial intelligence systems and its application to real-world problems., , , , , и . Neurocomputing, (2019)Anomaly-based user comments detection in social news websites using troll user comments as normality representation., , , , и . Log. J. IGPL, 24 (6): 883-898 (2016)PUMA: Permission Usage to Detect Malware in Android., , , , , и . CISIS/ICEUTE/SOCO Special Sessions, том 189 из Advances in Intelligent Systems and Computing, стр. 289-298. Springer, (2012)A Theoretical Framework for Supporting Clustering Validation via Non-Negative-Matrix-Factorization Trace Sequences Over Probabilistic Spaces., , , и . DASC/PiCom/CBDCom/CyberSciTech, стр. 1080-1087. IEEE, (2023)A Comprehensive Interaction Model for ASystems., , и . ISMAR, стр. 104-107. IEEE Computer Society, (2015)Enhancing scalability in anomaly-based email spam filtering., , , , и . CEAS, стр. 13-22. ACM, (2011)Anomaly Detection for the Prediction of Ultimate Tensile Strength in Iron Casting Production., , , и . DEXA (2), том 6861 из Lecture Notes in Computer Science, стр. 519-526. Springer, (2011)Efficient failure-free foundry production., , и . ETFA, стр. 237-240. IEEE, (2008)Semi-supervised learning for packed executable detection., , , , и . NSS, стр. 342-346. IEEE, (2011)JURD: Joiner of Un-Readable Documents to reverse tokenization attacks to content-based spam filters., , , и . CCNC, стр. 259-264. IEEE, (2013)