Author of the publication

Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing.

, , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 581-593. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep reinforcement learning for application scheduling in resource-constrained, multi-tenant serverless computing environments., , and . Future Gener. Comput. Syst., (June 2023)CrisisTransformers: Pre-trained language models and sentence encoders for crisis-related social media texts., , and . CoRR, (2023)SLA-Based Scheduling of Spark Jobs in Hybrid Cloud Computing Environments., , , and . IEEE Trans. Computers, 71 (5): 1117-1132 (2022)Story points changes in agile iterative development., , and . Empir. Softw. Eng., 27 (6): 156 (2022)Are Online Consumer Reviews Credible? A Predictive Model based on Deep Learning., , and . ACIS, page 40. (2022)Towards a Credibility Analysis Model for Online Reviews., , and . PACIS, page 157. (2019)Optimizing checkpoint-based fault-tolerance in distributed stream processing systems: Theory to practice., , and . Softw. Pract. Exp., 52 (1): 296-315 (2022)Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints., , , and . ECIR, volume 9022 of Lecture Notes in Computer Science, page 489-494. (2015)Relieving hot spots in collaborative intrusion detection systems during worm outbreaks., , and . NOMS, page 49-56. IEEE, (2008)High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning., , , and . Pattern Recognit., (2016)