Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting efficient data mining techniques to enhance intrusion detection systems., , and . IRI, page 512-517. IEEE Systems, Man, and Cybernetics Society, (2005)Batman or the joker?: the powerful urban computing and its ethics issues., , , and . ACM SIGSPATIAL Special, 11 (2): 16-25 (2019)Mitigating Influence of Disinformation Propagation Using Uncertainty-Based Opinion Interactions., , and . IEEE Trans. Comput. Soc. Syst., 10 (2): 435-447 (April 2023)Fast adaptive kernel density estimator for data streams., , and . Knowl. Inf. Syst., 42 (2): 285-317 (2015)Misinformation Propagation in the Age of Twitter., , , , , , and . Computer, 47 (12): 90-94 (2014)Virtual Metering: An Efficient Water Disaggregation Algorithm via Nonintrusive Load Monitoring., , , and . ACM Trans. Intell. Syst. Technol., 9 (4): 39:1-39:30 (2018)Learning Decentralized Flocking Controllers with Spatio-Temporal Graph Neural Network., , , , and . CoRR, (2023)Can LLM find the green circle? Investigation and Human-guided tool manipulation for compositional generalization., , , , , and . CoRR, (2023)Don't Go To Extremes: Revealing the Excessive Sensitivity and Calibration Limitations of LLMs in Implicit Hate Speech Detection., , , and . CoRR, (2024)DERIV: distributed brand perception tracking framework., , , and . J. Big Data, (2017)