Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Compression-Based Multi-Objective Evolutionary Algorithm for Community Detection in Social Networks., , and . IEEE Access, (2020)Utility-based bandwidth allocation algorithm for heterogeneous wireless network., , and . WCSP, page 1-6. IEEE, (2012)Social Engineering Attack-Defense Strategies Based on Reinforcement Learning., , , , and . Comput. Syst. Sci. Eng., 47 (2): 2153-2170 (2023)Adversarial Text Generation for Personality Privacy Protection., , , , and . DSIT, page 159-165. ACM, (2021)The Design of a Mobile Application MetaPlant., , , , , and . DTPI, page 1-4. IEEE, (2023)Scanning microarrays at multiple intensities enhances discovery of differentially expressed genes., , , , , and . Bioinform., 22 (15): 1863-1870 (2006)Three-dimensional reconstruction of protein networks provides insight into human genetic disease., , , , , and . Nature biotechnology, 30 (2): 159--164 (Feb 15, 2012)INstruct: a database of high-quality 3D structurally resolved protein interactome networks., , , and . Bioinform., 29 (12): 1577-1579 (2013)An Explainable Machine Learning Framework for Intrusion Detection Systems., , , and . IEEE Access, (2020)Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process., , , and . IET Inf. Secur., 14 (4): 401-409 (2020)