Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Scalable Intrusion Detection Systems with Stacking Based Ensemble Learning., , , and . ISDA, volume 418 of Lecture Notes in Networks and Systems, page 859-869. Springer, (2021)Evaluation of Recurrent Neural Networks for Detecting Injections in API Requests., and . CCWC, page 936-941. IEEE, (2021)Automating Human Evaluation of Dialogue Systems.. NAACL-HLT (Student Research Workshop), page 229-234. Association for Computational Linguistics, (2022)Super-NaturalInstructions: Generalization via Declarative Instructions on 1600+ NLP Tasks., , , , , , , , , and 25 other author(s). EMNLP, page 5085-5109. Association for Computational Linguistics, (2022)Benchmarking Generalization via In-Context Instructions on 1, 600+ Language Tasks., , , , , , , , , and 30 other author(s). CoRR, (2022)Ensemble Learning Approach for Short-term Energy Consumption Prediction., , , and . COMAD/CODS, page 284-285. ACM, (2022)Detection of injections in API requests using recurrent neural networks and transformers., and . Int. J. Electron. Secur. Digit. Forensics, 14 (6): 638-658 (2022)Stacking Deep learning and Machine learning models for short-term energy consumption forecasting., , , and . Adv. Eng. Informatics, (2022)