Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers, and . (2023)A Survey of Traffic Sign Recognition Systems Based on Convolutional Neural Networks., , and . EIT, page 570-573. IEEE, (2018)A near real-time, parallel and distributed adaptive object detection and retraining framework based on AdaBoost algorithm., , and . HPEC, page 1-8. IEEE, (2015)Emerging Research in the Security of Modern and Autonomous Vehicles., , and . EIT, page 543-547. IEEE, (2018)Identifying Fake News in the Russian-Ukrainian Conflict Using Machine Learning., , , , , , , and . AINA (3), volume 655 of Lecture Notes in Networks and Systems, page 546-557. Springer, (2023)The Theory of Planned Behavior and High School Students Interest in Computer Science., , , and . EIT, page 764-769. IEEE, (2018)Detecting Phishing Websites Based on Machine Learning Techniques., and . ACR, volume 700 of Lecture Notes in Networks and Systems, page 513-522. Springer, (2023)Highly Scalable, Parallel and Distributed AdaBoost Algorithm using Light Weight Threads and Web Services on a Network of Multi-Core Machines., , and . CoRR, (2013)A Hierarchical Approach to Landmarks Detection in Taekwondo Poomsae Videos., , , and . CSA, page 1-6. IEEE, (2009)Machine Learning in Network Security Using KNIME Analytics.. CoRR, (2020)