Your selections:
Performance evaluation of multi-tier ensemble classifiers for phishing websites
- Abawajy, Jemal, Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
Global optimization : Cutting angle method
- Bagirov, Adil, Beliakov, Gleb
- Bagirov, Adil, Beliakov, Gleb
Implementation of novel methods of global and nonsmooth optimization : GANSO programming library
- Beliakov, Gleb, Ugon, Julien
Non-smooth optimization methods for computation of the conditional value-at-risk and portfolio optimization
- Beliakov, Gleb, Bagirov, Adil
Parallelization of the discrete gradient method of non-smooth optimization and its applications
- Beliakov, Gleb, Tobon, Monsalve, Bagirov, Adil
Derivative-free optimization and neural networks for robust regression
- Beliakov, Gleb, Kelarev, Andrei, Yearwood, John
An application of novel clustering technique for information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Application of rank correlation, clustering and classification in information security
- Beliakov, Gleb, Yearwood, John, Kelarev, Andrei
Solving DC programs using the cutting angle method
- Ferrer, Albert, Bagirov, Adil, Beliakov, Gleb
Detecting K-complexes for sleep stage identification using nonsmooth optimization
- Moloney, David, Sukhorukova, Nadezda, Vamplew, Peter, Ugon, Julien, Li, Gang, Beliakov, Gleb, Philippe, Carole, Amiel, Hélène, Ugon, Adrien
K-complex detection using a hybrid-synergic machine learning method
- Vu, Huy Quan, Li, Gang, Sukhorukova, Nadezda, Beliakov, Gleb, Liu, Shaowu, Philippe, Carole, Amiel, Hélène, Ugon, Adrien
Are you sure you would like to clear your session, including search history and login status?