Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!, and . AI*IA, volume 11946 of Lecture Notes in Computer Science, page 193-209. Springer, (2019)Inferential SIR-GN: Scalable Graph Representation Learning., and . CoRR, (2021)Temporal SIR-GN: Efficient and Effective Structural Representation Learning for Temporal Graphs., , , and . Proc. VLDB Endow., 16 (9): 2075-2089 (2023)Detecting suspicious entities in Offshore Leaks networks., , and . Soc. Netw. Anal. Min., 9 (1): 62:1-62:15 (2019)Inverse Tree-OLAP: Definition, Complexity and First Solution., , and . SEBD, volume 2161 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Anomaly Detection in Cybersecurity Events Through Graph Neural Network and Transformer Based Model: A Case Study with BETH Dataset., , , and . IEEE Big Data, page 5756-5764. IEEE, (2022)Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability., , , , , and . IEEE BigData, page 5602-5608. IEEE, (2021)ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social Networks., , and . SUM, volume 9858 of Lecture Notes in Computer Science, page 303-319. Springer, (2016)Convolutional Neural Network Ensemble Fine-Tuning for Extended Transfer Learning., , and . BigData Congress, volume 10968 of Lecture Notes in Computer Science, page 110-123. Springer, (2018)Strategic Security Resource Allocation for Internet of Things., , , and . ICDCS, page 737-738. IEEE Computer Society, (2016)