Author of the publication

Machine learning algorithms for improving security on touch screen devices: a survey, challenges and new perspectives.

, , , , , and . Neural Comput. Appl., 32 (17): 13651-13678 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Elderly Behaviors Based on Deep Learning for Healthcare: Recent Advances, Methods, Real-World Applications and Challenges., , , and . IEEE Access, (2022)Self-Adaptive Hybridized Lion Optimization Algorithm With Transfer Learning for Ancient Tamil Character Recognition in Stone Inscriptions., , , , , , , and . IEEE Access, (2023)Multilayer Stacked Ensemble Learning Model to Detect Phishing Websites., , , and . IEEE Access, (2022)Recent Challenges and Opportunities in Video Summarization With Machine Learning Algorithms., , , , , , and . IEEE Access, (2022)Kids' Emotion Recognition Using Various Deep-Learning Models with Explainable AI., , , , , , , , and . Sensors, 22 (20): 8066 (2022)Cost-Effective Resources for Computing Approximation Queries in Mobile Cloud Computing Infrastructure., , , , and . Sensors, 23 (17): 7416 (September 2023)Prediction of Oil Prices Using Bagging and Random Subspace., and . IBICA, volume 303 of Advances in Intelligent Systems and Computing, page 343-354. Springer, (2014)A Soft Set Approach for Handling Conflict Situation on Movie Selection., , , , , , , , , and 1 other author(s). IEEE Access, (2019)Optimizing the impact of data augmentation for low-resource grammatical error correction., , , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (6): 101572 (June 2023)Recent advances in mobile touch screen security authentication methods: A systematic literature review., , , , , , , , , and . Comput. Secur., (2019)