Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Biju Issac 0001
Northumbria University, UK - Biju Issac 0002
University of Miami, FL, USA
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 62 matches
- 2024
- Zahid Ahmed, Biju Issac, Sufal Das:
Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping. IEEE Access 12: 57458-57477 (2024) - Aschalew Tirulo, Siddhartha Chauhan, Biju Issac:
Ensemble LOF-based detection of false data injection in smart grid demand response system. Comput. Electr. Eng. 116: 109188 (2024) - Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang:
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers. Inf. Fusion 111: 102529 (2024) - 2023
- Lida Ketsbaia, Biju Issac, Xiaomin Chen, Seibu Mary Jacob:
A Multi-Stage Machine Learning and Fuzzy Approach to Cyber-Hate Detection. IEEE Access 11: 56046-56065 (2023) - Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang:
IoT-Based Android Malware Detection Using Graph Neural Network With Adversarial Defense. IEEE Internet Things J. 10(10): 8432-8444 (2023) - Rupam Kumar Sharma, Biju Issac, Qin Xin, Thippa Reddy Gadekallu, Keshab Nath:
Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. Sensors 23(12): 5562 (2023) - Rahul Yumlembam, Biju Issac, Longzhi Yang, Seibu Mary Jacob:
Android Malware Classification and Optimisation Based on BM25 Score of Android API. INFOCOM Workshops 2023: 1-6 - 2022
- Husnain Rafiq, Nauman Aslam, Biju Issac, Rizwan Hamid Randhawa:
An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection. INFOCOM Workshops 2022: 1-6 - Jeyamohan Neera, Xiaomin Chen, Nauman Aslam, Biju Issac, Eve O'Brien:
A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization. SECRYPT 2022: 325-332 - Husnain Rafiq, Nauman Aslam, Biju Issac, Rizwan Hamid Randhawa:
On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features. SKIMA 2022: 216-221 - 2021
- Ajith Abraham, Yukio Ohsawa, Niketa Gandhi, M. Akhil Jabbar, Abdelkrim Haqiq, Seán F. McLoone, Biju Issac:
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 15-18 December 2020. Advances in Intelligent Systems and Computing 1383, Springer 2021, ISBN 978-3-030-73688-0 [contents] - 2020
- Simran Gibson, Biju Issac, Li Zhang, Seibu Mary Jacob:
Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms. IEEE Access 8: 187914-187932 (2020) - Lida Ketsbaia, Biju Issac, Xiaomin Chen:
Detection of Hate Tweets using Machine Learning and Deep Learning. TrustCom 2020: 751-758 - Jack Pye, Biju Issac, Nauman Aslam, Husnain Rafiq:
Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms. TrustCom 2020: 1777-1782 - Jordan Stobbs, Biju Issac, Seibu Mary Jacob:
Phishing Web Page Detection Using Optimised Machine Learning. TrustCom 2020: 483-490 - 2019
- Rupam Kumar Sharma, Biju Issac, Hemanta Kumar Kalita:
Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants. IEEE Access 7: 52427-52439 (2019) - Niddal H. Imam, Biju Issac, Seibu Mary Jacob:
A Semi-Supervised Learning Approach for Tackling Twitter Spam Drift. Int. J. Comput. Intell. Appl. 18(2): 1950010:1-1950010:17 (2019) - 2018
- Syed Ali Raza Shah, Biju Issac:
Performance comparison of intrusion detection systems and application of machine learning to Snort system. Future Gener. Comput. Syst. 80: 157-170 (2018) - Syed Ali Raza Shah, Biju Issac, Seibu Mary Jacob:
Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning. Int. J. Comput. Intell. Appl. 17(2): 1850007:1-1850007:17 (2018) - Esha Barlaskar, Yumnam Jayanta Singh, Biju Issac:
Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres. Int. J. Grid Util. Comput. 9(1): 1-17 (2018) - Bismita Choudhury, Patrick H. H. Then, Biju Issac, Valliappan Raman, Manas Kumar Haldar:
A Survey on Biometrics and Cancelable Biometrics Systems. Int. J. Image Graph. 18(1): 1850006:1-1850006:39 (2018) - Rupam Kumar Sharma, Hemanta Kumar Kalita, Biju Issac:
Are machine learning based intrusion detection system always secure? An insight into tampered learning. J. Intell. Fuzzy Syst. 35(3): 3635-3651 (2018) - Kamlesh Mistry, Biju Issac, Seibu Mary Jacob, Jyoti Jasekar, Li Zhang:
Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation. ICARCV 2018: 424-429 - Mohammed F. Suleiman, Biju Issac:
Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets. ICCTA 2018: 19-23 - Kamlesh Mistry, Jyoti Jasekar, Biju Issac, Li Zhang:
Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour. IJCNN 2018: 1-7 - 2017
- Lauretha Rura, Biju Issac, Manas Kumar Haldar:
Online Voting System based on Image Steganography and Visual Cryptography. J. Comput. Inf. Technol. 25(1): 47-61 (2017) - Viktor Richert, Biju Issac, Nauman Israr:
Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments. Wirel. Commun. Mob. Comput. 2017 (2017) - Syed Ali Raza Shah, Biju Issac:
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System. CoRR abs/1710.04843 (2017) - 2016
- Wael Alzaid, Biju Issac:
Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks. Int. J. Bus. Data Commun. Netw. 12(1): 36-62 (2016) - Lauretha Rura, Biju Issac, Manas Kumar Haldar:
Implementation and Evaluation of Steganography Based Online Voting System. Int. J. Electron. Gov. Res. 12(3): 71-93 (2016)
skipping 32 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-30 06:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint