Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of security techniques in web services., , , and . iiWAS, page 270-277. ACM, (2011)Optimizing Feature Selection through Binary Charged System Search., , , , , and . CAIP (1), volume 8047 of Lecture Notes in Computer Science, page 377-384. Springer, (2013)Using SOA in Critical-Embedded Systems., , , , , and . iThings/CPSCom, page 733-738. IEEE Computer Society, (2011)Strategies for Classifier Selection Based on Genetic Programming for Multimedia Data Recognition., , , , and . VISIGRAPP (2): VISAPP, page 788-795. SCITEPRESS, (2024)A review of deep learning-based approaches for deepfake content detection., , , , , , , and . Expert Syst. J. Knowl. Eng., (August 2024)Application of SOA in Safety-Critical Embedded Systems., , , , , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 345-354. Springer, (2011)Binary Flying Squirrel Optimizer for Feature Selection., , , and . BRACIS (3), volume 14197 of Lecture Notes in Computer Science, page 51-64. Springer, (2023)Opytimizer: A Nature-Inspired Python Optimizer., , and . (December 2019)Quaternion-Based Backtracking Search Optimization Algorithm., , and . CEC, page 3014-3021. IEEE, (2019)A wrapper approach for feature selection based on Bat Algorithm and Optimum-Path Forest., , , , , , and . Expert Syst. Appl., 41 (5): 2250-2258 (2014)