From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Deep Learning Approach for Detecting Security Attacks on Blockchain., , , , и . ITASEC, том 2597 из CEUR Workshop Proceedings, стр. 212-222. CEUR-WS.org, (2020)Exploiting Deep Learning and Explanation Methods for Movie Tag Prediction., , , и . IDEAS, стр. 177-184. ACM, (2023)Ensembling Sparse Autoencoders for Network Covert Channel Detection in IoT Ecosystems., , , , и . ISMIS, том 13515 из Lecture Notes in Computer Science, стр. 209-218. Springer, (2022)Towards Extreme Multi-Label Classification of Multimedia Content., , , и . SEBD, том 3194 из CEUR Workshop Proceedings, стр. 367-374. CEUR-WS.org, (2022)ProMetheuS: A Suite for Process Mining Applications., , , и . CAiSE Forum, том 855 из CEUR Workshop Proceedings, стр. 58-65. CEUR-WS.org, (2012)Discovering accurate deep learning based predictive models for automatic customer support ticket classification., , , и . SAC, стр. 1098-1101. ACM, (2021)Deviance-Aware Discovery of High Quality Process Models., , , и . ICTAI, стр. 724-731. IEEE Computer Society, (2017)A Data-adaptive Trace Abstraction Approach to the Prediction of Business Process Performances., , , , и . ICEIS (1), стр. 56-65. SciTePress, (2013)Learning Deep Fake-News Detectors from Scarcely-Labelled News Corpora., , , и . ICEIS (1), стр. 344-353. SCITEPRESS, (2023)Mining models of exceptional objects through rule learning., , , , и . SAC, стр. 1078-1082. ACM, (2010)