Author of the publication

Deceptive review detection using labeled and unlabeled data.

, , , and . Multim. Tools Appl., 76 (3): 3187-3211 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation Algorithms for Optimizing Privacy and Utility., , , and . CSA, page 1-6. IEEE, (2009)Sarcastic Sentiment Detection Based on Types of Sarcasm Occurring in Twitter Data., , , and . Int. J. Semantic Web Inf. Syst., 13 (4): 89-108 (2017)Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks, and . ACEEE International Journal on Network Security, 3 (1): 4 (January 2012)Deceptive review detection using labeled and unlabeled data., , , and . Multim. Tools Appl., 76 (3): 3187-3211 (2017)Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases., , , , and . Trans. Data Priv., 6 (1): 1-17 (2013)A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems., , and . PDPTA, page 499-505. CSREA Press, (2008)On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature., , , and . IC3, volume 40 of Communications in Computer and Information Science, page 182-193. Springer, (2009)Two-stage classification approach for the recognition of handwritten atomic Odia character., , and . IJAPR, 4 (1): 44-63 (2017)Cluster Based Multipath Routing Protocol for Wireless Sensor Networks., and . Comput. Commun. Rev., 45 (2): 14-20 (2015)Data Dissemination Protocol for Mobile Sink in Wireless Sensor Networks., and . J. Comput. Eng., (2014)