Author of the publication

Recognizing Predatory Chat Documents using Semi-supervised Anomaly Detection.

, , , and . Document Recognition and Retrieval, page 1-9. Society for Imaging Science and Technology, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Comprehension of Textual User Requirements and their Static and Dynamic Modeling., and . Software Engineering Research and Practice, page 266-273. CSREA Press, (2006)A Visualization Tool for Reactive Systems Simulation., , and . Automation, Control, and Information Technology, page 65-70. IASTED/ACTA Press, (2005)Reliability Assessment of E-Commerce Applications., and . ICETE (2), page 30-37. INSTICC Press, (2004)Automated Assessment of Use Cases Elicitation from Requirements Text., and . WER, (2008)Nested NL Representation for OO Analysis and Design., and . SEKE, page 49-54. Knowledge Systems Institute Graduate School, (2009)Context-based User Stereotype Model for Mobile User Interfaces in Health Care Applications., , and . ANT/SEIT, volume 19 of Procedia Computer Science, page 1020-1027. Elsevier, (2013)Reactive Autonomic System Performance Modeling and Self-monitoring with Category Theory., , and . ICSOFT (1), page 325-330. INSTICC Press, (2009)Automatic Quality Assessment of SRS Text by Means of a Decision-Tree-Based Text Classifier., , and . QSIC, page 209-218. IEEE Computer Society, (2007)Abusive Language Detection Using BERT Pre-trained Embedding., , and . ICPRAI, volume 12068 of Lecture Notes in Computer Science, page 695-701. Springer, (2020)Lean Measurement: A Proposed Approach., and . IWSM-Mensura, volume 2725 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)