Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spam filter optimality based on signal detection theory, , , and . Proceedings of the 2nd international conference on Security of information and networks, page 219--224. New York, NY, USA, ACM, (2009)Integrating and Benchmarking Entity Linking for Question Answering with Qanary, , , , , and . (2016)How to build a Question Answering system overnight, , , , , , , and . (2018)Violence recognition using convolutional neural network: A survey., , and . J. Intell. Fuzzy Syst., 39 (5): 7931-7952 (2020)IoT and cloud computing based automatic epileptic seizure detection using HOS features based random forest classification., and . J. Ambient Intell. Humaniz. Comput., 14 (11): 15497-15512 (2023)Image enhancement using Exposure based Sub Image Histogram Equalization., and . Pattern Recognit. Lett., (2014)Information extraction pipelines for knowledge graphs., , , , and . Knowl. Inf. Syst., 65 (5): 1989-2016 (May 2023)Sensitizing Netizen's behavior through influencer intervention enabled by crowdsourcing - a case of reddit., , and . Behav. Inf. Technol., 41 (6): 1286-1297 (2022)User-aware multilingual abusive content detection in social media., , , , and . Inf. Process. Manag., 60 (5): 103450 (September 2023)Blind image deblurring via gradient orientation-based clustered coupled sparse dictionaries., , and . Pattern Anal. Appl., 22 (2): 549-558 (2019)