Author of the publication

Special issue on machine learning-based applications and techniques in cyber intelligence.

, , and . Neural Comput. Appl., 31 (12): 8135-8137 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing for discrete choice models. Economics Letters, 98 (2): 176--184 (February 2008)The role of mobile forensics in terrorism investigations involving the use of cloud apps., , , , and . MobiMedia, page 199-204. ACM, (2016)Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications., , , and . Wireless Personal Communications, 95 (3): 1855-1857 (2017)Exploiting Lists of Names for Named Entity Identification of Financial Institutions from Unstructured Documents., , and . CoRR, (2016)Group-driven Reinforcement Learning for Personalized mHealth Intervention., , , , and . CoRR, (2017)Resilient Reorder Buffer Design for Network-on-Chip., and . ISQED, page 92-97. IEEE, (2019)Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing., , , , and . CoRR, (2018)Rational Strategy to Stabilize an Unstable High-Efficiency Binary Nonfullerene Organic Solar Cells with a Third Component, , , , , , , and . Advanced Energy Materials, 9 (20): 1900376 (April 2019)A Novel Circulating Current Controller for MMC Capacitor Voltage Fluctuation Suppression., , , and . IEEE Access, (2019)On-Chip Circuit for Measuring Period Jitter and Skew of Clock Distribution Networks., , and . CICC, page 157-160. IEEE, (2007)