Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery., , , , , , , , and . Remote. Sens., 14 (2): 255 (2022)An explainable and efficient deep learning framework for video anomaly detection., , , , and . Clust. Comput., 25 (4): 2715-2737 (2022)Quasi-cliques Analysis for IRC Channel Thread Detection., , , , and . COMPLEX NETWORKS (1), volume 812 of Studies in Computational Intelligence, page 578-589. Springer, (2018)Video Anomaly Detection using Pre-Trained Deep Convolutional Neural Nets and Context Mining., , , and . AICCSA, page 1-8. IEEE, (2020)A BERT-based Deep Learning Approach for Reputation Analysis in Social Media., , , , , , and . AICCSA, page 1-8. IEEE, (2022)DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security., , , , and . UEMCON, page 200-209. IEEE, (2023)Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT., , , and . ACM Great Lakes Symposium on VLSI, page 691-696. ACM, (2023)One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat., , , and . AICCSA, page 1-8. IEEE Computer Society, (2019)An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion Detection., , and . AICCSA, page 1-8. IEEE, (2023)Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks., , and . AICCSA, page 1-9. IEEE, (2022)