Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection System using ML Classification Algorithm for Network Security., , , , , and . IC3I, page 1416-1422. IEEE, (2022)Mining pharmaceutical spam from Twitter., , , and . ISDA, page 813-817. IEEE, (2010)DeepAir: Air Quality Prediction using Deep Neural Network., , and . TENCON, page 869-873. IEEE, (2019)A Review of Approaches on Facets for Building IT-Based Career Guidance Systems., , , and . BDA, volume 14418 of Lecture Notes in Computer Science, page 246-260. Springer, (2023)Ultra-Long Sequence Distributed Transformer., , , , , , , , , and . CoRR, (2023)Debiasing Personal Identities in Toxicity Classification., and . CoRR, (2019)FrESCO: Framework for Exploring Scalable Computational Oncology., , , , , , and . J. Open Source Softw., 8 (90): 5345 (October 2023)Automating Genetic Algorithm Mutations for Molecules Using a Masked Language Model., , , , , , and . IEEE Trans. Evol. Comput., 26 (4): 793-799 (2022)Machine Learning Algorithms for Identifying Fake Currencies., , , , and . SN Comput. Sci., 4 (4): 368 (July 2023)Air Quality Data Collection in Hyderabad Using Low-Cost Sensors: Initial Experiences., , , , and . DASFAA (Workshops), volume 13248 of Lecture Notes in Computer Science, page 402-416. Springer, (2022)