Author of the publication

An improved scheme for privacy-preserving collaborative anomaly detection.

, , , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms., , , , and . CoRR, (2016)An efficient approach to detecting concept-evolution in network data streams., , and . ATNAC, page 1-7. IEEE, (2011)Training robust models using Random Projection., , , , , and . ICPR, page 531-536. IEEE, (2016)Dimensionality-Driven Learning with Noisy Labels., , , , , , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 3361-3370. PMLR, (2018)Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning., , , , and . LCN, page 469-472. IEEE, (2018)Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning., , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 493-501. Springer, (2016)Defending Regression Learners Against Poisoning Attacks., , , , and . CoRR, (2020)Ensemble Fuzzy Clustering Using Cumulative Aggregation on Random Projections., , , , and . IEEE Trans. Fuzzy Syst., 26 (3): 1510-1524 (2018)Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining., , and . CIKM, page 2015-2018. ACM, (2017)Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns., , and . CoRR, (2020)