Author of the publication

Relations Between Entropy and Accuracy Trends in Complex Artificial Neural Networks.

, , , , , , , and . COMPLEX NETWORKS, volume 1016 of Studies in Computational Intelligence, page 452-460. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relations Between Entropy and Accuracy Trends in Complex Artificial Neural Networks., , , , , , , and . COMPLEX NETWORKS, volume 1016 of Studies in Computational Intelligence, page 452-460. Springer, (2021)Analysis on the Effects of Graph Perturbations on Centrality Metrics., , , , , , and . COMPLEX NETWORKS (2), volume 1078 of Studies in Computational Intelligence, page 433-444. Springer, (2022)Disrupting Resilient Criminal Networks through Data Analysis: The case of Sicilian Mafia., , , , , , and . CoRR, (2020)Social Network Analysis of Sicilian Mafia Interconnections., , , , , , and . COMPLEX NETWORKS (2), volume 882 of Studies in Computational Intelligence, page 440-450. Springer, (2019)Network Connectivity Under a Probabilistic Node Failure Model., , , , and . IEEE Trans. Netw. Sci. Eng., 9 (4): 2463-2480 (2022)Computer-aided diagnosis for breast cancer classification using deep neural networks and transfer learning., , , , and . Comput. Methods Programs Biomed., (2022)Graph and Network Theory for the analysis of Criminal Networks., , , , and . CoRR, (2021)Criminal Networks Analysis in Missing Data scenarios through Graph Distances., , , , , , , and . CoRR, (2021)Graph Comparison and Artificial Models for Simulating Real Criminal Networks., , , , , , and . COMPLEX NETWORKS (2), volume 944 of Studies in Computational Intelligence, page 286-297. Springer, (2020)Artificial Neural Networks Training Acceleration Through Network Science Strategies., , , , and . NUMTA (2), volume 11974 of Lecture Notes in Computer Science, page 330-336. Springer, (2019)