A deep learning system for health care IoT and smartphone malware detection | 0 | 0.34 | 2022 |
Android malware detection through generative adversarial networks | 2 | 0.38 | 2022 |
On finding optimum commuting path in a road network: A computational approach for smart city traveling | 0 | 0.34 | 2022 |
NLP-SEA 2021 Workshop Summary. | 0 | 0.34 | 2022 |
Integrity Verification And Behavioral Classification Of A Large Dataset Applications Pertaining Smartosvia Blockchain And Generative Models | 0 | 0.34 | 2021 |
COVID-19 Patient Count Prediction Using LSTM | 1 | 0.37 | 2021 |
Conceptualization Of Smartphone Usage And Feature Preferences Among Various Demographics | 0 | 0.34 | 2020 |
Static malware detection and attribution in android byte-code through an end-to-end deep system | 1 | 0.35 | 2020 |
Power Allocation Scheme for Secret KeyGeneration in Wireless Communication | 0 | 0.34 | 2020 |
An Automated Permission Selection Framework for Android Platform | 0 | 0.34 | 2020 |
Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert. | 0 | 0.34 | 2020 |
Just-in-time customer churn prediction in the telecommunication sector | 3 | 0.38 | 2020 |
Compromised user credentials detection in a digital enterprise using behavioral analytics. | 0 | 0.34 | 2019 |
Special Issue on Knowledge Discovery in Big Data (KDBD). | 0 | 0.34 | 2019 |
The journal of knowledge engineering special issue on WorldCist'17 - fifth world conference on information systems and technologies. | 0 | 0.34 | 2019 |
Efficient motion estimation using two-bit transform and modified multilevel successive elimination | 0 | 0.34 | 2019 |
Big Data Visualization in Cardiology—A Systematic Review and Future Directions | 0 | 0.34 | 2019 |
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods | 1 | 0.35 | 2019 |
Multiple Moving Vehicle Speed Estimation Using Blob Analysis. | 0 | 0.34 | 2019 |
Features Weight Estimation Using a Genetic Algorithm for Customer Churn Prediction in the Telecom Sector. | 0 | 0.34 | 2019 |
A prudent based approach for compromised user credentials detection | 1 | 0.36 | 2018 |
Just-in-time Customer Churn Prediction: With and Without Data Transformation | 1 | 0.34 | 2018 |
Customer churn prediction in the telecommunication sector using a rough set approach. | 15 | 0.53 | 2017 |
Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach | 1 | 0.38 | 2017 |
Compact Deep Convolutional Neural Networks With Coarse Pruning. | 10 | 0.54 | 2016 |
Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study. | 3 | 0.38 | 2016 |
Structured Pruning of Deep Convolutional Neural Networks | 82 | 2.79 | 2015 |
A Prudent Based Approach for Customer Churn Prediction. | 4 | 0.39 | 2015 |
A Comparison of Two Oversampling Techniques (SMOTE vs MTDF) for Handling Class Imbalance Problem: A Case Study of Customer Churn Prediction | 3 | 0.40 | 2015 |
Site selection for food distribution using rough set approach and TOPSIS method | 3 | 0.37 | 2015 |
Posted price selling and online auctions. | 0 | 0.34 | 2015 |
Fixed Point Optimization Of Deep Convolutional Neural Networks For Object Recognition | 38 | 3.21 | 2015 |
Customer Churn Prediction in Telecommunication Industry: With and without Counter-Example | 7 | 0.71 | 2014 |
Behavioral Attestation for Web Services using access policies | 0 | 0.34 | 2013 |
Semantic Based Ontology Driven Feature Interaction Detection & Modeling. | 0 | 0.34 | 2013 |
Project scheduling conflict identification and resolution using genetic algorithms (GA) | 0 | 0.34 | 2012 |
Automated GUI Test Coverage Analysis Using GA | 5 | 0.51 | 2010 |
Evolutionary Based Automated Coverage Analysis For Gui Testing | 3 | 0.45 | 2010 |
Maximizing GUI Test Coverage Through Particle Swarm Optimization | 0 | 0.34 | 2010 |