Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatial Patterns of Offender Groups., , , and . ISI, page 13-18. IEEE, (2018)Cost-Sensitive Learning for Medical Insurance Fraud Detection With Temporal Information., , , and . IEEE Trans. Knowl. Data Eng., 35 (10): 10451-10463 (October 2023)Fishing Vessels Activity Detection from Longitudinal AIS Data., , , , , , and . SIGSPATIAL/GIS, page 347-356. ACM, (2020)TripTracker: Unsupervised Learning of Fishing Vessel Routine Activity Patterns., , , , and . IEEE BigData, page 1928-1939. IEEE, (2021)Exploring the structural characteristics of social networks in a large criminal court database., , and . ISI, page 209-214. IEEE, (2013)Cubism: Co-balanced Mixup for Unsupervised Volcano-Seismic Knowledge Transfer., , , , , and . ECML/PKDD (5), volume 13717 of Lecture Notes in Computer Science, page 581-597. Springer, (2022)An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation., , , and . ISI, page 1-6. IEEE, (2023)Mining Vessel Trajectories for Illegal Fishing Detection., , , , , and . IEEE BigData, page 1917-1927. IEEE, (2019)B2Rank: An Algorithm for Ranking Blogs Based on Behavioral Features., , and . Web Intelligence, page 104-107. IEEE Computer Society, (2007)