Author of the publication

On Improving Automated Detection of Cyber-Bully in Social Networks with Constrained Datasets: A Hierarchical Deep Learning Approach.

, , , , , and . ICC, page 1746-1751. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unified Approach for Calculating the Outage Performance of Two-Way AF Relaying Over Fading Channels., , , , and . IEEE Trans. Vehicular Technology, 64 (3): 1218-1229 (2015)Compressed Wideband Spectrum Sensing: Concept, Challenges, and Enablers., , and . IEEE Communications Magazine, 56 (4): 136-141 (2018)Intelligent Service Monitoring and Support., , , , and . ICC, page 1-6. IEEE, (2009)An Energy-Efficient VM Prediction and Migration Framework for Overcommitted Clouds., , , and . IEEE Trans. Cloud Computing, 6 (4): 955-966 (2018)MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles., , , , , and . CoRR, (2018)Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings., , , , and . CoRR, (2018)Forced Spectrum Access Termination Probability Analysis under Restricted Channel Handoff., , , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 358-365. Springer, (2012)Prediction-Based Delay Optimization Data Collection Algorithm for Underwater Acoustic Sensor Networks., , , , and . IEEE Trans. Vehicular Technology, 68 (7): 6926-6936 (2019)An adaptive cache management approach in ICN with pre-filter queues., , , , , and . Comput. Commun., (2020)P2P-based resource allocation with coalitional game for D2D networks., , , , and . Pervasive Mob. Comput., (2017)