Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event sequence mining to develop profiles for computer forensic investigation purposes.. ACSW, volume 54 of CRPIT, page 145-153. Australian Computer Society, (2006)Local Intrinsic Dimensionality Signals Adversarial Perturbations., , , , , and . CDC, page 6118-6125. IEEE, (2022)Removing Undesirable Concepts in Text-to-Image Generative Models with Learnable Prompts., , , , , and . CoRR, (2024)Incremental Meta-Mining from Large Temporal Data Sets., and . ER Workshops, volume 1552 of Lecture Notes in Computer Science, page 41-54. Springer, (1998)Towards Understanding Pixel Vulnerability under Adversarial Attacks for Images., , , , , and . CoRR, (2020)Opportunities for Knowledge Discovery in Spatio-Temporal Information Systems., and . Australas. J. Inf. Syst., (1998)Survey of Spatio-Temporal Databases., and . GeoInformatica, 3 (1): 61-99 (1999)Investigative Profile Analysis With Computer Forensic Log Data Using Attribute Generalisation., , and . AusDM, page 17-28. University of Technology Sydney, Australia, (2002)Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness., , , , , , , , and . AAAI, page 14783-14791. AAAI Press, (2023)Investigative Profiling with Computer Forensic Log Data and Association Rules., and . ICDM, page 11-18. IEEE Computer Society, (2002)