Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Feedback Analysis for Mobile Malware Detection., , , , and . ICISSP, page 83-94. SciTePress, (2017)Modeling Graph Database Schema, , , and . IT Professional, 19 (6): 34--43 (2017)Ensemble methods for improving the performance of neighborhood-based collaborative filtering., , , , and . RecSys, page 261-264. ACM, (2009)Leveraging metadata to recommend keywords for academic papers, , and . Journal of the Association for Information Science and Technology, 67 (12): 3073--3091 (December 2016)Information Retrieval System for Medical Narrative Reports., , and . FQAS, volume 3055 of Lecture Notes in Computer Science, page 217-228. Springer, (2004)Source Model Selection for Deep Learning in the Time Series Domain., and . IEEE Access, (2020)Attribute-Driven Hidden Markov Model Trees for Intention Prediction., , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1103-1119 (2012)Efficient Multidimensional Suppression for K-Anonymity., , , and . IEEE Trans. Knowl. Data Eng., 22 (3): 334-347 (2010)Probability-Based Algorithm for Bearing Diagnosis with Untrained Spall Sizes., , , , , and . Sensors, 20 (5): 1298 (2020)TTANAD: Test-Time Augmentation for Network Anomaly Detection., , , and . Entropy, 25 (5): 820 (2023)