Author of the publication

Constructing and Understanding Customer Spending Prediction Models.

, , , , and . SN Comput. Sci., 4 (6): 852 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis., and . FDSE, volume 8860 of Lecture Notes in Computer Science, page 86-96. Springer, (2014)Security Visualization for peer-to-peer resource sharing applications, and . CoRR, (2009)A Visual Model for Web Applications Security Monitoring., and . CoRR, (2019)A Visual Model for Privacy Awareness and Understanding in Online Social Networks., and . FDSE, volume 11814 of Lecture Notes in Computer Science, page 383-398. Springer, (2019)Differential Privacy in Deep Learning: An Overview., , , , and . ACOMP, page 97-102. IEEE Computer Society, (2019)Constructing and Understanding Customer Spending Prediction Models., , , , and . SN Comput. Sci., 4 (6): 852 (November 2023)On the Feasibility of Machine Learning Models for Customer Spending Prediction Problem., , , , and . FDSE (CCIS Volume), volume 1688 of Communications in Computer and Information Science, page 517-531. Springer, (2022)Visualizing Access Logs of a Scientific Digital Library Effectively as Multiple Time Series Using Modified Horizon Graphs., , , and . ACOMP, page 85-91. IEEE Computer Society, (2019)Extending Web Application IDS Interface: Visualizing Intrusions in Geographic and Web Space., and . ACOMP, page 28-34. IEEE Computer Society, (2015)A Three-Way Energy Efficient Authentication Protocol Using Bluetooth Low Energy., , , and . FDSE, volume 12466 of Lecture Notes in Computer Science, page 273-289. Springer, (2020)