Author of the publication

A Trustable LSTM-Autoencoder Network for Cyberbullying Detection on Social Media Using Synthetic Data.

, , , , and . IEEE Big Data, page 5418-5427. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Theoretically-Sound Accuracy/Privacy-Constrained Framework for Computing Privacy Preserving Data Cubes in OLAP Environments., and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 527-548. Springer, (2012)An Analytical Approach for Providing Approximate Answers to Aggregate Queries on Bi-Dimensional OLAP Data Cubes., and . SEBD, page 30-41. (2004)Algorithms for Managing, Querying and Processing Big Data in Cloud Environments.. Algorithms, 9 (1): 13 (2016)A Semantic-based Framework for Supporting Interaction and Cooperation in Content-Based Web3.0 Applications., , , , and . SEBD, page 131-138. Curran Associates, (2013)The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution., , and . IDEAS, page 148-156. ACM, (2018)An Innovative Deep-Learning Algorithm for Supporting the Approximate Classification of Workloads in Big Data Environments., , , and . IDEAL (2), volume 11872 of Lecture Notes in Computer Science, page 225-237. Springer, (2019)Modeling and Managing Uncertainty in Concurrent Database Transactions., , and . KES, volume 243 of Frontiers in Artificial Intelligence and Applications, page 1263-1272. IOS Press, (2012)A Process-Driven Methodology for Continuous Information Systems Modeling., , and . ICEIS (3-2), page 82-88. (2008)978-989-8111-38-8.Knowledge-Driven Digital Forensics., and . SEBD, page 36-47. Curran Associates, Inc., (2015)EBC: A Topology Control Algorithm for Achieving High QoS in Sensor Networks., , , and . QSHINE, volume 22 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 613-626. Springer, (2009)