Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings., , , and . J. Comput. Inf. Syst., 62 (5): 975-997 (September 2022)A Digital Communication Twin for Addressing Misinformation: Vision, Challenges, Opportunities., , , , , , , , , and 2 other author(s). IEEE Internet Comput., 26 (2): 36-41 (2022)Data-Driven Forecasting of Agitation for Persons with Dementia: A Deep Learning-Based Approach., , , , and . SN Comput. Sci., 2 (4): 326 (2021)Zen_Space: A Smartphone App for Individually Tailored Stress Management Support for College Students., and . ICSH, volume 10347 of Lecture Notes in Computer Science, page 123-133. Springer, (2017)An artificial immunity approach to malware detection in a mobile platform., , and . EURASIP J. Information Security, (2017)Mitigating shortage of labeled data using clustering-based active learning with diversity exploration., , , , , , and . CoRR, (2022)Music Embedding: A Tool for Incorporating Music Theory into Computational Music Applications., and . CoRR, (2021)A clustering-based active learning method to query informative and representative samples., , , , , , and . Appl. Intell., 52 (11): 13250-13267 (2022)Monkeypox At-a-glance from Google Trends and Reddit., , and . CHASE, page 166-167. IEEE, (2022)Characterizing Coding Style of Phishing Websites Using Machine Learning Techniques., , and . TransAI, page 101-105. IEEE, (2022)