Stamatios-Aggelos N. Alexandropoulos
Stamatios-Aggelos N. Alexandropoulos
Unknown affiliation
Verified email at math.upatras.gr
Title
Cited by
Cited by
Year
No free lunch theorem: A review
SP Adam, SAN Alexandropoulos, PM Pardalos, MN Vrahatis
Approximation and optimization, 57-82, 2019
342019
Data preprocessing in predictive data mining
SAN Alexandropoulos, SB Kotsiantis, MN Vrahatis
The Knowledge Engineering Review 34, 2019
192019
Multi-objective evolutionary optimization algorithms for machine learning: A recent survey
SAN Alexandropoulos, CK Aridas, SB Kotsiantis, MN Vrahatis
Approximation and Optimization, 35-55, 2019
172019
A deep dense neural network for bankruptcy prediction
SAN Alexandropoulos, CK Aridas, SB Kotsiantis, MN Vrahatis
International Conference on Engineering Applications of Neural Networks, 435-444, 2019
72019
Stacking strong ensembles of classifiers
SAN Alexandropoulos, CK Aridas, SB Kotsiantis, MN Vrahatis
IFIP International Conference on Artificial Intelligence Applications and …, 2019
52019
Random resampling in the one-versus-all strategy for handling multi-class problems
CK Aridas, SAN Alexandropoulos, SB Kotsiantis, MN Vrahatis
International Conference on Engineering Applications of Neural Networks, 111-121, 2017
42017
Dynamic search trajectory methods for global optimization
SAN Alexandropoulos, PM Pardalos, MN Vrahatis
Annals of Mathematics and Artificial Intelligence 88 (1), 3-37, 2020
32020
A new ensemble method for outlier identification
SAN Alexandropoulos, SB Kotsiantis, VE Piperigou, MN Vrahatis
2020 10th International Conference on Cloud Computing, Data Science …, 2020
32020
Financial fraudulent statements detection through a deep dense artificial neural network
GS Temponeras, SAN Alexandropoulos, SB Kotsiantis, MN Vrahatis
2019 10th International Conference on Information, Intelligence, Systems and …, 2019
32019
Transformations of cryptographic schemes through interpolation techniques
SAN Alexandropoulos, GC Meletiou, DS Triantafyllou, MN Vrahatis
Computation, Cryptography, and Network Security, 1-17, 2015
12015
Bottom-up hierarchical ramp secret sharing scheme
SAN Alexandropoulos, GC Meletiou, DS Triantafyllou, MN Vrahatis
h Intern, 136, 2017
2017
Secret Sharing Schemes through Structured Matrices
SAN Alexandropoulos, GC Meletiou, DS Triantafyllou, MN Vrahatis
Cryptography, Cyber Security and Information Warfare (3rd CryCybIW), 0
The system can't perform the operation now. Try again later.
Articles 1–12