Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering Anomalies by Incorporating Feedback from an Expert., , , , and . ACM Trans. Knowl. Discov. Data, 14 (4): 49:1-49:32 (2020)IoT Device Type Identification Using Hybrid Deep Learning Approach for Increased IoT Security., , and . IWCMC, page 565-570. IEEE, (2020)Machine learning algorithms for event detection., , and . Mach. Learn., 79 (3): 257-259 (2010)What's Strange About Recent Events, , , and . Journal of Urban Health, (June 2003)Supplement 1.An Ensemble Learning and Problem Solving Architecture for Airspace Management., , , , , , , , , and 27 other author(s). IAAI, AAAI, (2009)Towards recognizing "cool": can end users help computer vision recognize subjective attributes of objects in images?, , , , , , , and . IUI, page 285-288. ACM, (2012)Integrating rich user feedback into intelligent user interfaces., , , , , and . IUI, page 50-59. ACM, (2008)Implementation of a Gaussian process-based machine learning grasp predictor., , , and . Auton. Robots, 40 (4): 687-699 (2016)Deep Learning Model Portability for Domain-Agnostic Device Fingerprinting., , , and . IEEE Access, (2023)Bayesian Network Anomaly Pattern Detection for Disease Outbreaks, , , and . Proceedings of the Twentieth International Conference on International Conference on Machine Learning, page 808--815. AAAI Press, (2003)