Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

URL-based Phishing Attack Detection by Convolutional Neural Networks., , , and . Aust. J. Intell. Inf. Process. Syst., 15 (2): 60-67 (2019)Ensemble machine learning approaches for webshell detection in Internet of things environments., , , , , , , and . Trans. Emerg. Telecommun. Technol., (2022)Detection of Important Features from Images Using Heuristic Approach., and . ICIST, volume 756 of Communications in Computer and Information Science, page 432-441. Springer, (2017)Creating Learning Sets for Control Systems Using an Evolutionary Method., , and . ICAISC (SIDE-EC), volume 7269 of Lecture Notes in Computer Science, page 206-213. Springer, (2012)Road Detection Based on Shearlet for GF-3 Synthetic Aperture Radar Images., , , , and . IEEE Access, (2020)State Flipping Based Hyper-Heuristic for Hybridization of Nature Inspired Algorithms., and . ICAISC (1), volume 10245 of Lecture Notes in Computer Science, page 337-346. Springer, (2017)Recent Possibilities of Intelligent Agents in Distributed Systems.. WOA, volume 1382 of CEUR Workshop Proceedings, page 19-23. CEUR-WS.org, (2015)Data system model for easy human-machine interactions over communication interfaces., , and . IRC, page 506-511. IEEE, (2020)Uncertainty estimation in HDR imaging with Bayesian neural networks., , , , , , and . Pattern Recognit., (2024)Feature reduction for simplified handwritten digit classification model., and . SSCI, page 448-454. IEEE, (2022)