Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adoption of Cloud Computing in Hotel Industry as Emerging Services., , , and . iConference, volume 10766 of Lecture Notes in Computer Science, page 218-228. Springer, (2018)Towards a Robotic Chinese Calligraphy Writing Framework., , , , , , and . ROBIO, page 493-498. IEEE, (2018)Fuzzy-import hashing: A static analysis technique for malware detection., , , , , and . Digit. Investig., (2021)Integration strategies for toxicity data from an empirical perspective., and . UKCI, page 1-8. IEEE, (2014)Dendritic Cell Algorithm Enhancement Using Fuzzy Inference System for Network Intrusion Detection., , , and . FUZZ-IEEE, page 1-6. IEEE, (2019)Adaptive fuzzy interpolation and extrapolation with multiple-antecedent rules., and . FUZZ-IEEE, page 1-8. IEEE, (2010)Grooming Detection using Fuzzy-Rough Feature Selection and Text Classification., , , , and . FUZZ-IEEE, page 1-8. IEEE, (2018)Toxicity risk assessment from heterogeneous uncertain data with possibility-probability distribution., and . FUZZ-IEEE, IEEE, (2013)Fuzzy system approaches to negotiation pricing decision support., , , , and . J. Intell. Fuzzy Syst., 29 (2): 685-699 (2015)Multi-criterion mammographic risk analysis supported with multi-label fuzzy-rough feature selection., , , , , and . Artif. Intell. Medicine, (2019)