Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Text Imbalance Handling and Classification for Cross- platform Cyber-crime Detection using Deep Learning., , and . ICCCNT, page 1-7. IEEE, (2020)Putative Drug and Vaccine Target Identification in Leishmania donovani Membrane Proteins Using Naïve Bayes Probabilistic Classifier., , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 14 (1): 204-211 (2017)Meta network attention-based feature matching for heterogeneous defect prediction., and . Autom. Softw. Eng., 32 (1): 11 (June 2025)Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network., , and . IEEE Trans. Serv. Comput., 17 (5): 2210-2222 (September 2024)A new hybrid wrapper TLBO and SA with SVM approach for gene expression data., , and . Inf. Sci., (2019)TRGNet: a deep transfer learning approach for software defect prediction., and . Expert Syst. Appl., (2025)An Assistive Tool For Fileless Malware Detection., , , , and . WAC, page 21-25. IEEE, (2021)BLADE: Robust malware detection against obfuscation in android., , and . Digit. Investig., (2021)Dense representative tooth landmark/axis detection network on 3D model., , , , , , , and . Comput. Aided Geom. Des., (2022)GeoBMS: Hybrid Cloud/ On-Premise Architecture for Building Energy Optimization., , and . GIoTS, page 1-6. IEEE, (2019)