Author of the publication

A Collective, Probabilistic Approach to Schema Mapping.

, , , and . ICDE, page 921-932. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Unknown Insider Threat Scenarios., , , and . IEEE Symposium on Security and Privacy Workshops, page 277-288. IEEE Computer Society, (2014)Detecting and Annotating Narratives in Social Media: A Vision Paper., , , and . ICWSM Workshops, (2020)Causal Discovery of Cyber Attack Phases., , and . ICMLA, page 1348-1352. IEEE, (2019)Collective Relational Data Integration with Diverse and Noisy Evidence.. University of Maryland, College Park, MD, USA, (2019)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/25568).Explaining and Aggregating Anomalies to Detect Insider Threats., , , and . HICSS, page 2739-2748. IEEE Computer Society, (2016)A Collective, Probabilistic Approach to Schema Mapping Using Diverse Noisy Evidence., , , and . IEEE Trans. Knowl. Data Eng., 31 (8): 1426-1439 (2019)SPLAIN: Augmenting Cybersecurity Warnings with Reasons and Data., , , , , , and . CoRR, (2023)Use of Domain Knowledge to Detect Insider Threats in Computer Activities., , , , and . IEEE Symposium on Security and Privacy Workshops, page 60-67. IEEE Computer Society, (2013)