Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Co-Training Style Algorithms., , , , and . ICNC (7), page 196-201. IEEE Computer Society, (2008)I2Rec: An Iterative and Interactive Recommendation System for Event-Based Social Networks., , , and . SBP-BRiMS, volume 9708 of Lecture Notes in Computer Science, page 250-261. Springer, (2016)An Ensemble Learning Framework for Online Web Spam Detection., and . ICMLA (1), page 40-45. IEEE, (2013)Effectively Detecting Content Spam on the Web Using Topical Diversity Measures., and . Web Intelligence, page 266-273. IEEE Computer Society, (2012)Predicting Privacy Behavior on Online Social Networks., , and . ICWSM, page 91-100. AAAI Press, (2015)Spam Detection: E-mail/Social Network., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Towards Building a Personalized Online Web Spam Detector in Intelligent Web Browsers., , and . Web Intelligence, page 585-590. IEEE Computer Society, (2013)Detecting malignant patients via modified boosted tree., , and . Sci. China Inf. Sci., 53 (7): 1369-1378 (2010)Pattern Discovery and Anomaly Detection via Knowledge Graph., , , , , and . FUSION, page 2392-2399. IEEE, (2018)On the Class Imbalance Problem., , , , and . ICNC (4), page 192-201. IEEE Computer Society, (2008)