Author of the publication

LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data.

, , , , , and . World Wide Web, 21 (3): 825-847 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A big data approach to sentiment analysis using greedy feature selection with cat swarm optimization-based long short-term memory neural networks., , , and . J. Supercomput., 76 (6): 4414-4429 (2020)The Role of Positive and Negative Citations in Scientific Evaluation., , , , and . CoRR, (2020)LogEvent2vec: LogEvent-to-Vector Based Anomaly Detection for Large-Scale Logs in Internet of Things., , , , , , and . Sensors, 20 (9): 2451 (2020)Soft computing approaches based bookmark selection and clustering techniques for social tagging systems., and . Clust. Comput., 22 (Supplement): 3183-3189 (2019)Optimizing the network energy of cloud assisted internet of things by using the adaptive neural learning approach in wireless sensor networks., and . Comput. Ind., (2019)BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks., , , , , , and . Ad Hoc Networks, (2017)Geo-Social Distance-Based Data Dissemination for Socially Aware Networking., , , , , and . IEEE Access, (2016)DoS Attack Detection Based on Deep Factorization Machine in SDN., , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1727-1742 (2023)Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain., , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1805-1819 (2023)A Recurrent Learning Method Based on Received Signal Strength Analysis for Improving Wireless Sensor Localization., and . Circuits Syst. Signal Process., 39 (2): 1019-1037 (2020)