Author of the publication

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.

, , , , , , , and . CIKM, page 707-715. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An SVM Based Secural Image Steganography Algorithm for IoT., , , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 357-371. Springer, (2019)PraDa: Privacy-preserving Data-Deduplication-as-a-Service., , and . CIKM, page 1559-1568. ACM, (2014)DeepICU: imbalanced classification by using deep neural networks for network intrusion detection., , , , and . Int. J. Big Data Intell., 7 (3): 137-147 (2020)Flat and hierarchical system deployment for edge computing systems., , , , and . Future Gener. Comput. Syst., (2020)VDGAN: A Collaborative Filtering Framework Based on Variational Denoising with GANs., , and . IJCNN, page 1-8. IEEE, (2021)GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems., , , , , , , and . CoRR, (2016)Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm., , and . IEEE Trans. Serv. Comput., 9 (1): 18-32 (2016)Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition., , , , and . CoRR, (2021)Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey., , and . IEEE Trans. Knowl. Data Eng., 33 (4): 1601-1618 (2021)Anomalous Event Sequence Detection., , , , , , , and . IEEE Intell. Syst., 36 (3): 5-13 (2021)