Author of the publication

Anomaly Detection, Consider Your Dataset First An Illustration on Fraud Detection.

, , , , , and . ICTAI, page 1351-1355. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimension-free Concentration Bounds on Hankel Matrices for Spectral Learning., , and . CoRR, (2013)Theoretical Analysis of Domain Adaptation with Optimal Transport., , and . CoRR, (2016)Methodology for Efficient CNN Architectures in Profiling Attacks., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020 (1): 1-36 (2020)Joint Semi-supervised Similarity Learning for Linear Classification., , , and . ECML/PKDD (1), volume 9284 of Lecture Notes in Computer Science, page 594-609. Springer, (2015)Learning probabilistic models of tree edit distance., , , and . Pattern Recognit., 41 (8): 2611-2629 (2008)Theoretical Analysis of Domain Adaptation with Optimal Transport., , and . ECML/PKDD (2), volume 10535 of Lecture Notes in Computer Science, page 737-753. Springer, (2017)Multi-relational Data Mining in Medical Databases., , and . AIME, volume 2780 of Lecture Notes in Computer Science, page 365-374. Springer, (2003)Learning Rational Stochastic Tree Languages., and . ALT, volume 4754 of Lecture Notes in Computer Science, page 242-256. Springer, (2007)Algorithmic Robustness for Semi-Supervised (ε, γ, τ)-Good Metric Learning., , , , and . ICLR (Workshop), (2015)Using Contextual Representations to Efficiently Learn Context-Free Languages., , and . J. Mach. Learn. Res., (2010)