Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Survey of Data Mining-based Fraud Detection Research, , , and . CoRR, (2010)Resilient Identity Crime Detection., , , and . IEEE Trans. Knowl. Data Eng., 24 (3): 533-546 (2012)Optimal service resource management strategy for IoT-based health information system considering value co-creation of users., , and . Ind. Manag. Data Syst., 124 (3): 1132-1154 (2024)From Data to Insights: A Comprehensive Survey on Advanced Applications in Thyroid Cancer Research., , and . CoRR, (2024)An Intelligent Algorithm for Modeling and Optimizing Dynamic Supply Chains Complexity., , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 975-980. Springer, (2006)Demand Response Architectures and Load Management Algorithms for Energy-Efficient Power Grids: A Survey., , , , , and . KICSS, page 134-141. IEEE, (2012)The Relationship between Complementary Services and Service System Value Creation: A Case Study of eMarketplaces in Saudi Arabia., , and . KICSS, page 211-215. IEEE, (2012)Anomaly Detection in Dynamic Graphs via Transformer., , , , , and . CoRR, (2021)On the communal analysis suspicion scoring for identity crime in streaming credit applications., , , and . Eur. J. Oper. Res., 195 (2): 595-612 (2009)Deep convolutional neural networks in thyroid disease detection: A multi-classification comparison by ultrasonography and computed tomography., , , , and . Comput. Methods Programs Biomed., (2022)