Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge Matching Puzzles as Hard SAT/CSP Benchmarks., , , and . CP, volume 5202 of Lecture Notes in Computer Science, page 560-565. Springer, (2008)Explainable Machine Learning Models for Predicting COVID-19 Cases in Catalonia Based on Wastewater Monitoring Data., , , , , and . CCIA, volume 375 of Frontiers in Artificial Intelligence and Applications, page 262-266. IOS Press, (2023)The rise of machine learning for detection and classification of malware: Research developments, trends and challenges., , and . J. Netw. Comput. Appl., (2020)CSP problems as algorithmic benchmarks: measures, methods and models.. University of Lleida, Spain, (2009)Bounding the Phase Transition on Edge Matching Puzzles., , , and . ISMVL, page 80-85. IEEE Computer Society, (2009)Auditing static machine learning anti-Malware tools against metamorphic attacks., , , and . Comput. Secur., (2021)Generating highly balanced sudoku problems as hard problems., , , , and . J. Heuristics, 17 (5): 589-614 (2011)An End-to-End Deep Learning Architecture for Classification of Malware's Binary Content., , and . ICANN (3), volume 11141 of Lecture Notes in Computer Science, page 383-391. Springer, (2018)A Hierarchical Convolutional Neural Network for Malware Classification., , and . IJCNN, page 1-8. IEEE, (2019)Generating Hard SAT/CSP Instances Using Expander Graphs., , , and . AAAI, page 1442-1443. AAAI Press, (2008)