From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 394-395. Springer, (2008)Geometric & Topological Representations of Maximum Classes with Applications to Sample Compression., и . COLT, стр. 299-310. Omnipress, (2008)A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning., , , , и . IEEE Trans. Inf. Forensics Secur., 11 (3): 556-570 (2016)DBA bandits: Self-driving index tuning under ad-hoc, analytical workloads with safety guarantees., , , и . CoRR, (2020)Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge, , и . CoRR, (2011)Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks., и . CoRR, (2017)Validity: a framework for cross-disciplinary collaboration in mining indicators of learning from MOOC forums., , , , и . LAK, стр. 546-547. ACM, (2016)Machine Learning in Network Anomaly Detection: A Survey., , , , , и . IEEE Access, (2021)Predicting dynamic spectrum allocation: a review covering simulation, modelling, and prediction., , , , и . Artif. Intell. Rev., 56 (10): 10921-10959 (октября 2023)No DBA? No regret! Multi-armed bandits for index tuning of analytical and HTAP workloads with provable guarantees., , , и . CoRR, (2021)