Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explaining anomalies detected by autoencoders using Shapley Additive Explanations., , , and . Expert Syst. Appl., (2021)Data mining and knowledge discovery handbook, and . (2005)Attribute-Driven Hidden Markov Model Trees for Intention Prediction., , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1103-1119 (2012)pcStream: A Stream Clustering Algorithm for Dynamically Detecting and Managing Temporal Contexts., , , and . PAKDD (2), volume 9078 of Lecture Notes in Computer Science, page 119-133. Springer, (2015)Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers., , , and . ACSAC, page 611-626. ACM, (2020)Improving Simple Collaborative Filtering Models Using Ensemble Methods., , , , and . MCS, volume 7872 of Lecture Notes in Computer Science, page 1-12. Springer, (2013)Ensemble of Feature Chains for Anomaly Detection., , and . MCS, volume 7872 of Lecture Notes in Computer Science, page 295-306. Springer, (2013)Scholarly Digital Libraries as a Platform for Malware Distribution., , , , , , and . SG-CRC, volume 15 of Cryptology and Information Security Series, page 107-128. IOS Press, (2017)Source Model Selection for Deep Learning in the Time Series Domain., and . IEEE Access, (2020)Classification Trees., and . Data Mining and Knowledge Discovery Handbook, Springer, (2010)