From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Adversary Model of Fraudsters' Behavior to Improve Oversampling in Credit Card Fraud Detection., , , и . IEEE Access, (2023)Streaming active learning strategies for real-life credit card fraud detection: assessment and visualization., , , и . Int. J. Data Sci. Anal., 5 (4): 285-300 (2018)Semi-Supervised Template Attack., , , , , и . IACR Cryptology ePrint Archive, (2012)Enabling Multimedia QoS Control with Black-Box Modelling., и . Soft-Ware, том 2311 из Lecture Notes in Computer Science, стр. 46-59. Springer, (2002)A Time Series Approach for Profiling Attack., , , и . SPACE, том 8204 из Lecture Notes in Computer Science, стр. 75-94. Springer, (2013)TCGAbiolinksGUI: A graphical user interface to analyze cancer molecular and clinical data., , , , , , , и . F1000Research, (2018)A Page-Classification Approach to Web Usage Semantic Analysis., , , и . Eng. Lett., 14 (1): 120-126 (2007)New functionalities in the TCGAbiolinks package for the study and integration of cancer data from GDC and GTEx., , , , , , , , и . PLoS Comput. Biol., (2019)EMG subspace alignment and visualization for cross-subject hand gesture classification., , , , , и . CoRR, (2024)Traffic Simulation with Incomplete Data: the Case of Brussels., , и . EMODE@SIGSPATIAL, стр. 15-24. ACM, (2023)