Author of the publication

Identifying Fake News in the Russian-Ukrainian Conflict Using Machine Learning.

, , , , , , , and . AINA (3), volume 655 of Lecture Notes in Networks and Systems, page 546-557. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep learning-based MSMS spectra reduction in support of running multiple protein search engines on cloud., , , and . BIBM, page 1909-1914. IEEE Computer Society, (2017)Towards Centralized MS/MS Spectra Preprocessing: An Empirical Evaluation of Peptides Search Engines using Ground Truth Datasets., , and . BIBE, page 194-199. IEEE Computer Society, (2017)Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning., , , , , and . Int. J. Interact. Mob. Technol., 16 (14): 123-135 (July 2022)A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications., , , , , , , , , and 2 other author(s). ACR, volume 700 of Lecture Notes in Networks and Systems, page 569-586. Springer, (2023)Parameters optimization of deep learning models using Particle swarm optimization., , , , and . IWCMC, page 1285-1290. IEEE, (2017)Optimizing Protein Search Engines using Particle Swarm Optimization., , , and . BIBE, page 340-345. IEEE Computer Society, (2017)Deep vs. shallow learning-based filters of MS/MS spectra in support of protein search engines., , , , and . BIBM, page 1175-1182. IEEE Computer Society, (2017)Identifying Fake News in the Russian-Ukrainian Conflict Using Machine Learning., , , , , , , and . AINA (3), volume 655 of Lecture Notes in Networks and Systems, page 546-557. Springer, (2023)Developing Future Human-Centered Smart Cities: Critical Analysis of Smart City Security, Interpretability, and Ethical Challenges., , , , , and . CoRR, (2020)Survey on authentication and security protocols and schemes over 5G networks., , , , , , , , and . Int. J. Distributed Sens. Networks, 18 (10): 155013292211266 (2022)