Author of the publication

Identifying Anomalous Flight Trajectories by leveraging ensembled outlier detection framework.

, , , , and . IJCNN, page 1-8. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interpretable Convolutional Learning Classifier System (C-LCS) for higher dimensional datasets., , , , and . SMC, page 846-853. IEEE, (2022)A Data-driven Approach for Travel Time Prediction and Analysis., , , , , and . SMC, page 834-839. IEEE, (2022)A Safer Approach to Build Recommendation Systems on Unidentifiable Data., , and . ICAART (3), page 589-596. SCITEPRESS, (2022)Security threats on Data-Driven Approaches for Luggage Screening., , , , , and . CCWC, page 474-483. IEEE, (2024)Who is Responsible for Adversarial Defense?, and . CoRR, (2021)Adversarial Input Detection Using Image Processing Techniques (IPT)., , and . UEMCON, page 309-315. IEEE, (2020)CIDMP: Completely Interpretable Detection of Malaria Parasite in Red Blood Cells using Lower-dimensional Feature Space., , , and . IJCNN, page 1-8. IEEE, (2020)A Cross-Domain Exploration of Audio and Textual Data for Multi-Modal Emotion Detection., , , , , and . PETRA, ACM, (2024)Shamir's Secret Sharing for Authentication without Reconstructing Password., , , and . CCWC, page 958-963. IEEE, (2020)Leveraging Machine Learning Approach to Setup Software-Defined Network(SDN) Controller Rules During DDoS Attack., , and . IJCCI, page 49-60. Springer, (2018)