Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things: A survey on machine learning-based intrusion detection approaches., , , , and . Comput. Networks, (2019)Malware Detection in Android-Based Mobile Environments Using Optimum-Path Forest., , , , , and . ICMLA, page 754-759. IEEE, (2015)SMS Spam Filtering Through Optimum-Path Forest-Based Classifiers., , , and . ICMLA, page 133-137. IEEE, (2015)FakeRecogna Anomaly: Fake News Detection in a New Brazilian Corpus., , , , , and . VISIGRAPP (4: VISAPP), page 830-837. SCITEPRESS, (2023)Stacking-based Committees para Detecção de Ataques em Redes de Computadores - Uma abordagem por exaustão., , , , and . SBRC, page 644-657. (2021)Unsupervised Breast Masses Classification through Optimum-Path Forest., , , , , and . CBMS, page 238-243. IEEE Computer Society, (2015)A Review of Deep Learning-based Approaches for Deepfake Content Detection., , , , , and . CoRR, (2022)Ensemble learning techniques for intrusion detection system in the context of cybersecurity., , , , , and . CoRR, (2022)Fine-tuning restricted Boltzmann machines using quaternions and its application for spam detection., , , , and . IET Networks, 8 (3): 164-168 (2019)A critical literature survey and prospects on tampering and anomaly detection in image data., , , , , , and . Appl. Soft Comput., 97 (Part B): 106727 (2020)