Author of the publication

Fast Memory Efficient Local Outlier Detection in Data Streams.

, , , , and . IEEE Trans. Knowl. Data Eng., 28 (12): 3246-3260 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing., , , , , and . IEEE Trans. Ind. Informatics, 16 (6): 4187-4195 (2020)CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing., , , and . IACR Cryptology ePrint Archive, (2012)Scalable Big Data Privacy with MapReduce., , and . Encyclopedia of Big Data Technologies, Springer, (2019)SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud., , , , , and . Concurr. Comput. Pract. Exp., 25 (18): 2561-2576 (2013)LSHiForest: A Generic Framework for Fast Tree Isolation based Ensemble Anomaly Analysis, , , , , , and . (2017)HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing., , , , and . Concurr. Comput. Pract. Exp., 28 (3): 646-660 (2016)A data-operation model based on partial vector space for batch processing in workflow., , , and . Concurr. Comput. Pract. Exp., 23 (16): 1936-1950 (2011)Edge computing empowered anomaly detection framework with dynamic insertion and deletion schemes on data streams., and . World Wide Web, 25 (5): 2163-2183 (2022)Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment., , , , , , and . IEEE Trans. Ind. Informatics, 17 (6): 4159-4167 (2021)Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning., , , , , and . CoRR, (2023)