Author of the publication

Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing.

, , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 581-593. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms., , , , and . CoRR, (2016)Ensemble Fuzzy Clustering Using Cumulative Aggregation on Random Projections., , , , and . IEEE Trans. Fuzzy Syst., 26 (3): 1510-1524 (2018)Defending Regression Learners Against Poisoning Attacks., , , , and . CoRR, (2020)Training robust models using Random Projection., , , , , and . ICPR, page 531-536. IEEE, (2016)Dimensionality-Driven Learning with Noisy Labels., , , , , , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 3361-3370. PMLR, (2018)An efficient approach to detecting concept-evolution in network data streams., , and . ATNAC, page 1-7. IEEE, (2011)Round Trip Translation Defence against Large Language Model Jailbreaking Attacks., , , and . CoRR, (2024)Be Persistent: Towards a Unified Solution for Mitigating Shortcuts in Deep Learning., , and . CoRR, (2024)Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns., , and . CoRR, (2020)Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning., , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 493-501. Springer, (2016)