Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly-based user comments detection in social news websites using troll user comments as normality representation., , , , and . Log. J. IGPL, 24 (6): 883-898 (2016)Detecting malicious Android applications based on the network packets generated., , , , and . Neurocomputing, (2021)On Combining Convolutional Autoencoders and Support Vector Machines for Fault Detection in Industrial Textures., , , and . Sensors, 21 (10): 3339 (2021)Autoencoder-Enhanced Clustering: A Dimensionality Reduction Approach to Financial Time Series., , , , and . IEEE Access, (2024)Efficient Machine Learning on Edge Computing Through Data Compression Techniques., , , , , and . IEEE Access, (2023)How IoT and computer vision could improve the casting quality., , , , and . IOT, page 7:1-7:8. ACM, (2019)Automatic categorisation of comments in social news websites., , , , and . Expert Syst. Appl., 39 (18): 13417-13425 (2012)Territorial innovation models: to be or not to be, that's the question., , , , , and . Scientometrics, 120 (3): 1163-1191 (2019)Can BlockChain Technology Provide Information Systems with Trusted Database? The Case of HyperLedger Fabric., , and . FQAS, volume 11529 of Lecture Notes in Computer Science, page 265-277. Springer, (2019)Fight Detection in Images Using Postural Analysis., , , , , and . HAIS, volume 12886 of Lecture Notes in Computer Science, page 231-242. Springer, (2021)