Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking Change Detector Algorithms from Different Concept Drift Perspectives., , , and . Future Internet, 15 (5): 169 (May 2023)Sport action mining: Dribbling recognition in soccer., , , , , , and . Multim. Tools Appl., 81 (3): 4341-4364 (2022)Deep computer vision system for cocoa classification., , , , , and . Multim. Tools Appl., 81 (28): 41059-41077 (2022)Tuning Machine Learning to Address Process Mining Requirements., , , and . IEEE Access, (2024)Detecting and Mitigating Adversarial Examples in Regression Tasks: A Photovoltaic Power Generation Forecasting Case Study., , , and . Inf., 12 (10): 394 (2021)Authorship verification applied to detection of compromised accounts on online social networks - A continuous approach., , and . Multimedia Tools Appl., 76 (3): 3213-3233 (2017)Pre-trained Data Augmentation for Text Classification., and . BRACIS, volume 12319 of Lecture Notes in Computer Science, page 551-565. Springer, (2020)Selecting Optimal Trace Clustering Pipelines with Meta-learning., , , and . BRACIS (1), volume 13653 of Lecture Notes in Computer Science, page 150-164. Springer, (2022)Unsupervised learning clustering and self-organized agents applied to help network management., , , and . Expert Syst. Appl., (2016)Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on Wavelets., , , , , and . TOMM, 14 (1s): 26:1-26:17 (2018)