Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient techniques for document sanitization., , , and . CIKM, page 843-852. ACM, (2008)Processing multi-way spatial joins on map-reduce., , , , , and . EDBT, page 113-124. ACM, (2013)On Efficiently Processing Workflow Provenance Queries in Spark., , , , , and . ICDCS, page 1443-1452. IEEE, (2019)D-SVM: A Deep Support Vector Machine Model with Different Kernel Types for Improved Intrusion Detection Performance., , and . Int. J. Perform. Eng., 19 (9): 598 (2023)A Multi-Layer Feed Forward Network Intrusion Detection System using Individual Component Optimization Methodology for Cloud Computing., , and . Int. J. Perform. Eng., 18 (11): 781-790 (2022)Monitoring and surveillance of urban road traffic using low altitude drone images: a deep learning approach., and . Multim. Tools Appl., 81 (14): 19683-19703 (2022)InstructABSA: Instruction Learning for Aspect Based Sentiment Analysis., , , , and . CoRR, (2023)DeepMTL Pro: Deep Learning Based Multiple Transmitter Localization and Power Estimation., , , and . Pervasive Mob. Comput., (2022)A New Approach for the Security of VPN., and . ICTCS, page 13:1-13:5. (2016)Measuring 3D left ventricular strain from unwrapped harmonic phase., , , , and . ISBI, page 1433-1436. IEEE, (2008)