Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-Money Laundering Alert Optimization Using Machine Learning with Graphs., , , , , , and . CoRR, (2021)Machine learning methods to detect money laundering in the bitcoin blockchain in the presence of label scarcity., , , , and . ICAIF, page 23:1-23:8. ACM, (2020)Active learning for imbalanced data under cold start., , , , , and . ICAIF, page 17:1-17:9. ACM, (2021)ARMS: Automated rules management system for fraud detection., , , , and . CoRR, (2020)From random-walks to graph-sprints: a low-latency node embedding framework on continuous-time dynamic graphs., , , , , , and . ICAIF, page 176-184. ACM, (2023)The GANfather: Controllable generation of malicious activity to improve defence systems., , , , , and . ICAIF, page 133-140. ACM, (2023)Interleaved Sequence RNNs for Fraud Detection., , , , , and . KDD, page 3101-3109. ACM, (2020)Lightweight Automated Feature Monitoring for Data Streams., , , , , , , and . CoRR, (2022)Adversarial training for tabular data with attack propagation., , , , , , and . CoRR, (2023)GuiltyWalker: Distance to illicit nodes in the Bitcoin network., , , , , and . CoRR, (2021)