Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Simple yet Efficient Ensemble Approach for AI-generated Text Detection., , , , , , and . CoRR, (2023)Lateral Movement Detection Using User Behavioral Analysis., , , , , , , , , and 2 other author(s). CoRR, (2022)Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning., , , , , , , and . CoRR, (2024)A Novel Approach To User Agent String Parsing For Vulnerability Analysis Using Mutli-Headed Attention., , , , , , , , and . CoRR, (2023)Do-AIQ: A Design-of-Experiment Approach to Quality Evaluation of AI Mislabel Detection Algorithm., , , , , , and . CoRR, (2022)Procedure code overutilization detection from healthcare claims using unsupervised deep learning methods., , , , , , and . BMC Medical Informatics Decis. Mak., 23 (1): 196 (December 2023)Discovering Command and Control Channels Using Reinforcement Learning., , , , , , , , , and . CoRR, (2024)Graph Representational Learning for Internal Audit., , , , , , and . ISWC (Posters/Demos/Industry), volume 3632 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Zero Day Threat Detection Using Metric Learning Autoencoders., , , , , , , , , and . ICMLA, page 1318-1325. IEEE, (2022)FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks., , , , , and . CCWC, page 28-35. IEEE, (2024)