Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical Analysis for Investigating the Effect of Machine Learning Techniques on Malware Prediction., , , , , and . ENASE, page 453-460. SCITEPRESS, (2023)An Empirical Study to investigate the Effectiveness of Different Variants of SMOTE for Improving Web Service Anti-Patterns Prediction., , , and . ISEC, page 19:1-19:5. ACM, (2021)SEDTWik: Segmentation-based Event Detection from Tweets Using Wikipedia., , , and . NAACL-HLT (Student Research Workshop), page 77-85. Association for Computational Linguistics, (2019)An Empirical Analysis on the Prediction of Web Service Anti-patterns Using Source Code Metrics and Ensemble Techniques., , , , and . ICCSA (7), volume 12955 of Lecture Notes in Computer Science, page 263-276. Springer, (2021)COVID-19 Article Classification Using Word-Embedding and Extreme Learning Machine with Various Kernels., , , , and . AINA (3), volume 451 of Lecture Notes in Networks and Systems, page 69-81. Springer, (2022)An Empirical Framework for Software Aging-Related Bug Prediction using Weighted Extreme Learning Machine., , , , and . FedCSIS (Communication Papers), volume 37 of Annals of Computer Science and Information Systems, page 181-188. (2023)Adversarial and Auxiliary Features-Aware BERT for Sarcasm Detection., , , , , and . COMAD/CODS, page 163-170. ACM, (2021)BARLAT: A Nearly Unsupervised Approach for Aspect Category Detection., , , , , and . Neural Process. Lett., 54 (5): 4495-4519 (2022)Predicting Software Defect Severity Level Using Deep-Learning Approach with Various Hidden Layers., , , , , , and . ICONIP (6), volume 1517 of Communications in Computer and Information Science, page 744-751. Springer, (2021)An Empirical Study on Application of Word Embedding Techniques for Prediction of Software Defect Severity Level., , , , , and . FedCSIS, volume 25 of Annals of Computer Science and Information Systems, page 477-484. (2021)