Author of the publication

Graph-based learning model for detection of SMS spam on smart phones.

, and . IWCMC, page 1046-1051. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Namesake alias mining on the Web and its role towards suspect tracking., and . Inf. Sci., (2014)CAMO: A context-aware movie ontology generated from LOD and movie databases., and . Multim. Tools Appl., 80 (5): 7247-7269 (2021)Identifying cliques in dark web forums - An agglomerative clustering approach., and . ISI, page 171-173. IEEE, (2012)An Unseen Features-Enriched Lifelong Machine Learning Framework., and . ICCSA (2), volume 13957 of Lecture Notes in Computer Science, page 471-481. Springer, (2023)A Multilayer Perceptron Architecture for Detecting Deceptive Cryptocurrencies in Coin Market Capitalization Data., and . WI, page 438-442. ACM, (2019)Fuzzy ontologies for handling uncertainties and inconsistencies in domain knowledge description., and . FUZZ-IEEE, page 1366-1373. IEEE, (2008)Mining feature-opinion pairs and their reliability scores from web opinion sources., , and . WIMS, page 15:1-15:7. ACM, (2012)Compact Residual Learning with Frequency-Based Non-Square Kernels for Small Footprint Keyword Spotting., and . ICON, page 328-336. Association for Computational Linguistics, (2022)Relation Extraction from Texts for Efficient Access to InformationApplication to Bio-Medical Text Processing., , and . IICAI, page 1719-1737. IICAI, (2007)Web content mining for alias identification: A first step towards suspect tracking., , and . ISI, page 195-197. IEEE, (2011)