Author of the publication

Spatially fine-grained urban air quality estimation using ensemble semi-supervised learning and pruning

, , , , , and . Proceedings of the 2016 ACM international joint conference on pervasive and ubiquitous computing, page 1076--1087. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining user similarity based on routine activities., , and . Inf. Sci., (2013)A hybrid deep convolutional and recurrent neural network for complex activity recognition using multimodal sensors., , and . Neurocomputing, (2019)Extracting semantic event information from distributed sensing devices using fuzzy sets., , , , and . Fuzzy Sets Syst., (2018)Smartphone-based activity recognition independent of device orientation and placement., , , and . Int. J. Commun. Syst., 29 (16): 2403-2415 (2016)Cost-Sensitive Semi-Supervised Personalized Semantic Place Label Recognition Using Multi-Context Data., , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 116:1-116:14 (2017)A Risk control Framework for Mortgaged Cars based on trajectory Mining., , , , , and . Int. J. Robotics Autom., (2020)Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features., , , , and . Inf. Sci., (2019)DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network., , , , and . KSII Trans. Internet Inf. Syst., 13 (4): 2180-2197 (2019)Mining cell-id trajectory patterns by exploiting handoff features., , , and . UbiComp Adjunct, page 153-156. ACM, (2016)CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters., , , and . Comput. Secur., (January 2024)