Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware Detection in Android-Based Mobile Environments Using Optimum-Path Forest., , , , , and . ICMLA, page 754-759. IEEE, (2015)Intrusion detection system using Optimum-Path Forest., , , and . LCN, page 183-186. IEEE Computer Society, (2011)Parkinson's Disease Identification Using Restricted Boltzmann Machines., , , , , and . CAIP (2), volume 10425 of Lecture Notes in Computer Science, page 70-80. Springer, (2017)Precipitates Segmentation from Scanning Electron Microscope Images through Machine Learning Techniques., , , , , and . IWCIA, volume 6636 of Lecture Notes in Computer Science, page 456-468. Springer, (2011)A Layer-Wise Information Reinforcement Approach to Improve Learning in Deep Belief Networks., , , , and . ICAISC (1), volume 12415 of Lecture Notes in Computer Science, page 231-241. Springer, (2020)Learning Parameters in Deep Belief Networks Through Firefly Algorithm., , , , , and . ANNPR, volume 9896 of Lecture Notes in Computer Science, page 138-149. Springer, (2016)ComplexWoundDB: A Database for Automatic Complex Wound Tissue Categorization., , , , , and . IWSSIP, page 1-4. IEEE, (2022)Convolutional Neural Networks and Image Patches for Lithological Classification of Brazilian Pre-Salt Rocks., , , , , , , and . VISIGRAPP (3): VISAPP, page 648-655. SCITEPRESS, (2024)Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks., , , , and . CASoN, page 181-185. IEEE, (2012)Optimum-Path Forest Pruning Parameter Estimation through Harmony Search., , , and . SIBGRAPI, page 181-188. IEEE Computer Society, (2011)