Author of the publication

Detection of User Cluster with Suspicious Activity in Online Social Networking Sites.

, and . ADCONS, page 220-225. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of User Cluster with Suspicious Activity in Online Social Networking Sites., and . ADCONS, page 220-225. IEEE, (2013)Towards a generic framework for short term firm-specific stock forecasting., , and . ICACCI, page 2681-2688. IEEE, (2014)Image-Based Facial Expression Recognition Using Local Neighborhood Difference Binary Pattern., , , and . CVIP (1), volume 1022 of Advances in Intelligent Systems and Computing, page 457-470. Springer, (2018)Decoding robustness performance comparison for QR and data matrix code., , and . CCSEIT, page 722-731. ACM, (2012)Convolutional Ensembling based Few-Shot Defect Detection Technique., , , , and . ICVGIP, page 6:1-6:7. ACM, (2022)MaNLP@SMM4H'22: BERT for Classification of Twitter Posts., , and . SMM4H@COLING, page 42-43. Association for Computational Linguistics, (2022)Facial Expression Recognition Using Histogram of Oriented Gradients with SVM-RFE Selected Features., , and . HIS, volume 1179 of Advances in Intelligent Systems and Computing, page 339-349. Springer, (2019)Performance Analysis of Out-Band OpenFlow Switch Architecture: The Single Node Case., , and . ANTS, page 1-5. IEEE, (2018)Reconstructing Synthetic Lensless Images in the Low-Data Regime., , , and . BMVC, page 765-766. BMVA Press, (2023)Three Way Authentication Protocol, and . CoRR, (2012)