Author of the publication

Boosted Ensemble Learning for Anomaly Detection in 5G RAN.

, , , and . AIAI (1), volume 583 of IFIP Advances in Information and Communication Technology, page 15-30. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SURE-H: A Secure IoT Enabled Smart Home System., , and . WF-IoT, page 59-63. IEEE, (2019)Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems., , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 266-280. Springer, (2023)ADCluster: Adaptive Deep Clustering for Unsupervised Learning from Unlabeled Documents., , , and . ICNLSP, page 68-77. Association for Computational Linguistics, (2023)NADO: network anomaly detection using outlier approach., , and . ICCCS, page 531-536. ACM, (2011)Identification and Classification of Cyberbullying Posts: A Recurrent Neural Network Approach Using Under-Sampling and Class Weighting., , , , , and . ICONIP (5), volume 1333 of Communications in Computer and Information Science, page 113-120. Springer, (2020)Cformer: Semi-Supervised Text Clustering Based on Pseudo Labeling., , , and . CIKM, page 3078-3082. ACM, (2021)Surveying Port Scans and Their Detection Methodologies., , and . Comput. J., 54 (10): 1565-1581 (2011)An effective unsupervised network anomaly detection method., , and . ICACCI, page 533-539. ACM, (2012)Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach., , and . ARES, page 20:1-20:10. ACM, (2021)Towards Post-disaster Damage Assessment using Deep Transfer Learning and GAN-based Data Augmentation., , , and . ICDCN, page 372-377. ACM, (2023)