Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scalable sampling scheme for clustering in network traffic analysis., , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 38. ACM, (2007)Approximate data mining in very large relational data., , , and . ADC, volume 49 of CRPIT, page 3-13. Australian Computer Society, (2006)Traffic forecasting in complex urban networks: Leveraging big data and machine learning., , , , , and . IEEE BigData, page 1019-1024. IEEE Computer Society, (2015)Closing the BIG-LID: An Effective Local Intrinsic Dimensionality Defense for Nonlinear Regression Poisoning., , , , , and . IJCAI, page 3176-3184. ijcai.org, (2021)Image Analysis Enhanced Event Detection from Geo-tagged Tweet Streams., , and . CoRR, (2020)Robust Wireless Network Anomaly Detection with Collaborative Adversarial Autoencoders., , , and . ICC, page 6343-6348. IEEE, (2023)A Group Formation Game for Local Anomaly Detection., , and . CDC, page 2086-2091. IEEE, (2023)Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection., , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 105-119. Springer, (2022)Characteristic-Based Descriptors for Motion Sequence Recognition., , , and . PAKDD, volume 5012 of Lecture Notes in Computer Science, page 369-380. Springer, (2008)Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach., , and . IJCNN, page 1-8. IEEE, (2019)