From post

A Hypersphere Information Granule-Based Fuzzy Classifier Embedded With Fuzzy Cognitive Maps for Classification of Imbalanced Data.

, , и . IEEE Trans. Emerg. Top. Comput. Intell., 8 (1): 175-190 (февраля 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An investigation into iPod Touch generation 2., , и . InfoSecCD, стр. 94-98. ACM, (2011)Enhance learning through developing network security hands-on lab for online students., и . InfoSecCD, стр. 11:1. ACM, (2014)Resistance Analysis to Intruders' Evasion of Detecting Intrusion., , и . ISC, том 4176 из Lecture Notes in Computer Science, стр. 383-397. Springer, (2006)Hybrid O(n Ön) Clustering for Sequential Web Usage Mining., и . Australian Conference on Artificial Intelligence, том 4304 из Lecture Notes in Computer Science, стр. 1022-1026. Springer, (2006)Robust Image Steganography: Hiding Messages in Frequency Coefficients., , , , и . AAAI, стр. 14955-14963. AAAI Press, (2023)Application of Hidden Markov Model on the Prediction of Hepatitis B Incidences., и . ICSH, том 11924 из Lecture Notes in Computer Science, стр. 209-221. Springer, (2019)Landmark-RxR: Solving Vision-and-Language Navigation with Fine-Grained Alignment Supervision., , , , , , и . NeurIPS, стр. 652-663. (2021)Improved Thumbprint and Its Application for Intrusion Detection., и . ICCNMC, том 3619 из Lecture Notes in Computer Science, стр. 433-442. Springer, (2005)Using VR in Science Subjects: Popularity and Public Attitudes on Twitter., , и . ICEBE, стр. 154-158. IEEE, (2022)An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover., , и . WISA, том 13720 из Lecture Notes in Computer Science, стр. 77-88. Springer, (2022)