Author of the publication

Quantification of Unvertainty in Classification Rules Discovered from Databases.

, , and . Comput. Intell., (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simple Recurrent Neural Networks is all we need for clinical events predictions using EHR data., , , , , , , , , and . CoRR, (2021)Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks., , , , , , , and . J. Comput. Sci., (2018)Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey., , , and . Int. J. Distributed Sens. Networks, (2013)FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation., , , , and . CoRR, (2022)Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks., , , and . J. Netw. Comput. Appl., 34 (4): 1097-1107 (2011)A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks., , , and . J. Netw. Comput. Appl., (2017)Network and system security., and . J. Netw. Comput. Appl., 32 (2): 345-346 (2009)A Study of Data Pre-processing Techniques for Imbalanced Biomedical Data Classification., , , , and . CoRR, (2019)Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation., , , , , , , , and . Comput. Secur., (2022)