From post

Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures.

, , , , и . ADC, том 10837 из Lecture Notes in Computer Science, стр. 174-185. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning Approaches for Modeling Spammer Behavior., , и . AIRS, том 6458 из Lecture Notes in Computer Science, стр. 251-260. Springer, (2010)Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures., , , , и . ADC, том 10837 из Lecture Notes in Computer Science, стр. 174-185. Springer, (2018)Chemical reaction optimization: survey on variants., , и . Evol. Intell., 12 (3): 395-420 (2019)A hybrid metaheuristic method for solving resource constrained project scheduling problem., , и . Evol. Intell., 16 (2): 519-537 (апреля 2023)How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond., , , , , и . IEEE Access, (2022)The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems., , , , и . Sensors, 23 (2): 758 (января 2023)Extraction and Recognition of Bangla Texts from Natural Scene Images Using CNN., , и . ICISP, том 12119 из Lecture Notes in Computer Science, стр. 243-253. Springer, (2020)Establishing secured communications in cluster based wireless sensor networks., , и . ISWPC, стр. 1-6. IEEE, (2013)Assessment of ITU-R predictions for Ku-Band rain attenuation in Malaysia., , , , , и . ISTT, стр. 389-393. IEEE, (2014)(k - n) Oblivious Transfer Using Fully Homomorphic Encryption System., , , и . SecureComm, том 127 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 380-392. Springer, (2013)