Author of the publication

A survey of multi-class imbalanced data classification methods.

, , , , and . J. Intell. Fuzzy Syst., 44 (2): 2471-2501 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary., , , , , , , and . AsiaCCS, page 633-645. ACM, (2019)Understanding the Reproducibility of Crowd-reported Security Vulnerabilities., , , , , , and . USENIX Security Symposium, page 919-936. USENIX Association, (2018)Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts., , , , , and . USENIX Security Symposium, page 17-32. USENIX Association, (2017)DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis., , , , and . USENIX Security Symposium, page 1787-1804. USENIX Association, (2019)Characterizing and Detecting WebAssembly Runtime Bugs., , , , , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (2): 37:1-37:29 (February 2024)Mitigating Security Risks in Linux with KLAUS: A Method for Evaluating Patch Correctness., , , , , and . USENIX Security Symposium, page 4247-4264. USENIX Association, (2023)Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 93-109 (January 2024)RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability., , , , and . TrustCom, page 91-98. IEEE, (2021)A survey of multi-class imbalanced data classification methods., , , , and . J. Intell. Fuzzy Syst., 44 (2): 2471-2501 (2023)An overview of high utility itemsets mining methods based on intelligent optimization algorithms., , , , and . Knowl. Inf. Syst., 64 (11): 2945-2984 (2022)