Author of the publication

An intra-class distribution-focused generative adversarial network approach for imbalanced tabular data learning

, , , , and . International Journal of Machine Learning and Cybernetics, (2024)
DOI: 10.1007/s13042-023-02048-5

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudonym Changing for Vehicles in VANETs: A Game-Theoretic Analysis Based Approach., , , and . NaNA, page 70-74. IEEE, (2019)CSFL: Cooperative Security Aware Federated Learning Model Using The Blockchain., , , , and . Comput. J., 67 (4): 1298-1308 (2024)A robust location fingerprint based on differential signal strength and dynamic linear interpolation., , and . Secur. Commun. Networks, 9 (16): 3618-3626 (2016)A new -map mechanism for mobility traces privacy., , , and . Concurr. Comput. Pract. Exp., (2021)Key Extraction Using Ambient Sounds for Smart Devices., , , , and . ACM Trans. Sens. Networks, 19 (1): 16:1-16:20 (February 2023)The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles., , , and . Concurr. Comput. Pract. Exp., (2023)Evolutionary game analysis on competition strategy choice of application providers., , , , and . Concurr. Comput. Pract. Exp., (2021)A Dummy-Based Privacy Protection Scheme for Location-Based Services under Spatiotemporal Correlation., , , , and . NaNA, page 443-447. IEEE, (2020)A novel adaptive radio map for RSS-based indoor positioning., , , and . Concurr. Comput. Pract. Exp., (2019)Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags., , , and . IEEE Access, (2020)