Author of the publication

Deep Learning-based Model to Fight Against Ad Click Fraud.

, , , , , and . ACM Southeast Regional Conference, page 176-181. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mini-Batch Normalized Mutual Information: A Hybrid Feature Selection Method., , , , and . IEEE Access, (2019)Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers., and . SECRYPT, page 245-252. INSTICC Press, (2008)A novel index retrieval and query optimisation method for private information retrieval in location-based service application., , and . Int. J. Intell. Inf. Database Syst., 14 (4): 379-402 (2021)Secure e-Cheque Clearance between Financial Institutions., , , and . CEC/EEE, page 99-106. IEEE Computer Society, (2007)Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme., and . CNSA, volume 89 of Communications in Computer and Information Science, page 270-279. Springer, (2010)A Novel Tamper Evident Single Database Information-Theoretic Private Information Retrieval for User Privacy Applications., and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 304-321. Springer, (2018)A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications., , and . IACR Cryptol. ePrint Arch., (2021)A novel recursive privacy-preserving information retrieval approach for private retrieval., , and . Int. J. Intell. Inf. Database Syst., 15 (3): 267-294 (2022)Key pre-distribution schemes to support various architectural deployment models in WSN., and . Int. J. Inf. Comput. Secur., 8 (2): 139-157 (2016)COMB: A Hybrid Method for Cross-validated Feature Selection., , , , , and . ACM Southeast Regional Conference, page 100-106. ACM, (2020)