Mehbodniya, A.[Abolfazl]
Co Author Listing * Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN)
* Online product sentiment analysis using random evolutionary whale optimization algorithm and deep belief network
Mehboob, R.[Rubab]
Co Author Listing * encoded histogram of ridge bifurcations and contours for fingerprint presentation attack detection, An