Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient approach to detecting concept-evolution in network data streams., , and . ATNAC, page 1-7. IEEE, (2011)Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning., , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 493-501. Springer, (2016)Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning., , , , and . LCN, page 469-472. IEEE, (2018)Training robust models using Random Projection., , , , , and . ICPR, page 531-536. IEEE, (2016)Dimensionality-Driven Learning with Noisy Labels., , , , , , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 3361-3370. PMLR, (2018)Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms., , , , and . CoRR, (2016)Ensemble Fuzzy Clustering Using Cumulative Aggregation on Random Projections., , , , and . IEEE Trans. Fuzzy Syst., 26 (3): 1510-1524 (2018)Defending Regression Learners Against Poisoning Attacks., , , , and . CoRR, (2020)Improving Scalability of Contrast Pattern Mining for Network Traffic Using Closed Patterns., , and . CoRR, (2020)Round Trip Translation Defence against Large Language Model Jailbreaking Attacks., , , and . CoRR, (2024)