Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Categorical Features Transformation with Compact One-Hot Encoder for Fraud Detection in Distributed Environment., , , and . AusDM, volume 996 of Communications in Computer and Information Science, page 69-80. Springer, (2018)Unified Expression Ripple Down Rules based Fraud Detection Technique for Scalable Data., , and . ICDM, page 1-16. ibai Publishing, (2020)Automated DD-path testing: A challenging task in software testing., , , and . ICDIM, page 230-236. IEEE, (2014)Experimental Artifacts for Morphological Tweaking of Chemical Sensor Materials: Studies on ZnO., and . Sensors, 12 (6): 8259-8277 (2012)A Survey of Big Workflow., , , and . DaEng, volume 520 of Lecture Notes in Electrical Engineering, page 529-539. Springer, (2015)Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified Expressions., , and . ICA3PP (2), volume 11945 of Lecture Notes in Computer Science, page 399-409. Springer, (2019)A Dynamic Robust DL-Based Model for Android Malware Detection., , and . IEEE Access, (2021)MalDroid: Secure DL-enabled intelligent malware detection framework., , , and . IET Commun., 16 (10): 1160-1171 (2022)A model transformation from NL to SBVR., , , and . ICDIM, page 220-225. IEEE, (2014)Spam Email Categorization with NLP and Using Federated Deep Learning., , , , , and . ADMA (2), volume 13726 of Lecture Notes in Computer Science, page 15-27. Springer, (2022)