Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Class Adversarial Nets for Fraud Detection., , , , and . CoRR, (2018)Few-shot Insider Threat Detection., , , and . CIKM, page 2289-2292. ACM, (2020)SAFE: A Neural Survival Analysis Model for Fraud Early Detection., , and . AAAI, page 1278-1285. AAAI Press, (2019)One-Class Adversarial Nets for Fraud Detection., , , , and . AAAI, page 1286-1293. AAAI Press, (2019)Insider Threat Detection via Hierarchical Neural Temporal Point Processes., , , and . IEEE BigData, page 1343-1350. IEEE, (2019)Hidden Buyer Identification in Darknet Markets via Dirichlet Hawkes Process., , , and . IEEE BigData, page 581-589. IEEE, (2021)CBSASNet: A Siamese Network Based on Channel Bias Split Attention for Remote Sensing Change Detection., , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)DMSHNet: Multiscale and Multisupervised Hierarchical Network for Remote-Sensing Image Change Detection., , and . IEEE Trans. Geosci. Remote. Sens., (2024)Wikipedia Vandal Early Detection: From User Behavior to User Embedding., , , and . ECML/PKDD (1), volume 10534 of Lecture Notes in Computer Science, page 832-846. Springer, (2017)Failure Analysis of Aluminum Wire Bonds in Automotive Pressure Sensors in Thermal Shock Environments., , , , , , , and . IEEE Access, (2021)