Author of the publication

An Integrated Approach for Mining Meta-rules.

, , , , , and . MLDM, volume 3587 of Lecture Notes in Computer Science, page 549-557. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding query interfaces by statistical parsing., , , , , , and . ACM Trans. Web, 7 (2): 8:1-8:22 (2013)A Novel Defensive Strategy for Facial Manipulation Detection Combining Bilateral Filtering and Joint Adversarial Training., , , , and . Secur. Commun. Networks, (2021)FedDSR: Daily Schedule Recommendation in a Federated Deep Reinforcement Learning Framework., , , , , and . IEEE Trans. Knowl. Data Eng., 35 (4): 3912-3924 (April 2023)Quick Spatial Outliers Detecting with Random Sampling., , , and . Canadian AI, volume 3501 of Lecture Notes in Computer Science, page 302-306. Springer, (2005)Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual Reality., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 516-523. IEEE, (2023)A Revised Model for Sea-Surface Wind Inversion Data with Joint Interpolation Optimization and Residual Network., , , , , and . ISKE, page 355-362. IEEE, (2023)A multi-channel approach through fusion of audio for detecting video inter-frame forgery., , , , and . Comput. Secur., (2018)Overcome the Brightness and Jitter Noises in Video Inter-Frame Tampering Detection., , , , and . Sensors, 21 (12): 3953 (2021)WMCA: A Weighted Matrix Coverage Based Approach to Cluster Multivariate Time Series., , and . ICNC (1), page 382-386. IEEE Computer Society, (2009)Using similarity analysis to detect frame duplication forgery in videos., , and . Multimedia Tools Appl., 75 (4): 1793-1811 (2016)