Author of the publication

Spotting Cyber Breaches in IoT Devices.

, and . FedCSIS, volume 35 of Annals of Computer Science and Information Systems, page 1307-1310. (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multivariate Functional Regression Analysis with Application to Classification Problems., , and . ECDA, page 173-183. Springer, (2014)Using derivatives in a longest common subsequence dissimilarity measure for time series classification.. Pattern Recognit. Lett., (2014)Evolutionarily Tuned Generalized Pseudo-Inverse in Linear Discriminant Analysis., and . Comput. Informatics, 35 (3): 615-634 (2016)GEval: Tool for Debugging NLP Datasets and Models., , , , and . BlackboxNLP@ACL, page 254-262. Association for Computational Linguistics, (2019)Spotting Cyber Breaches in IoT Devices., and . FedCSIS, volume 35 of Annals of Computer Science and Information Systems, page 1307-1310. (2023)A comparison of tests for the one-way ANOVA problem for functional data., and . Comput. Stat., 30 (4): 987-1010 (2015)Generalization of the Procrustes coefficient to functional data., and . Commun. Stat. Simul. Comput., 49 (3): 808-816 (2020)Learning edge importance in bipartite graph-based recommendations., , and . FedCSIS, volume 30 of Annals of Computer Science and Information Systems, page 227-233. (2022)Regression Methods for Combining Multiple Classifiers., and . Communications in Statistics - Simulation and Computation, 44 (3): 739-755 (2015)Independence test and canonical correlation analysis based on the alignment between kernel matrices for multivariate functional data., , and . Artif. Intell. Rev., 53 (1): 475-499 (2020)