Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC., and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 145-164. Springer, (2019)Gain Without Pain: Offsetting DP-Injected Noises Stealthily in Cross-Device Federated Learning., , , , , , , and . IEEE Internet Things J., 9 (22): 22147-22157 (2022)On the Diversity and Explainability of Recommender Systems: A Practical Framework for Enterprise App Recommendation., , , , , , , , and . CIKM, page 4302-4311. ACM, (2021)OmniXAI: A Library for Explainable AI., , , and . CoRR, (2022)MACE: An Efficient Model-Agnostic Framework for Counterfactual Explanation., , , and . CoRR, (2022)A Unified Framework for Outlier-Robust PCA-like Algorithms., and . ICML, volume 37 of JMLR Workshop and Conference Proceedings, page 484-493. JMLR.org, (2015)The Coherent Loss Function for Classification., , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 37-45. JMLR.org, (2014)AI for IT Operations (AIOps) on Cloud Platforms: Reviews, Opportunities and Challenges., , , , , , , , and . CoRR, (2023)LogAI: A Library for Log Analytics and Intelligence., , , , , and . CoRR, (2023)Causality-Based Multivariate Time Series Anomaly Detection., , and . CoRR, (2022)