Author of the publication

Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series.

, , , , , and . SAC, page 87-96. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient File Sharing by Multicast - P2P Protocol using Network Coding and Rank Based Peer Selection., and . VTC Spring, IEEE, (2009)FDFtNet: Facing Off Fake Images Using Fake Detection Fine-Tuning Network., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 416-430. Springer, (2020)Predicting Air Quality using Moving Sensors., and . MobiSys, page 604-605. ACM, (2019)HRFNet: High-Resolution Forgery Network for Localizing Satellite Image Manipulation., , and . ICIP, page 3165-3169. IEEE, (2023)Sliding Cross Entropy for Self-Knowledge Distillation., , and . CIKM, page 1044-1053. ACM, (2022)TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning., , , and . SEC, volume 625 of IFIP Advances in Information and Communication Technology, page 351-366. Springer, (2021)Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial Images., , , and . SAC, page 1248-1255. ACM, (2023)How Do We Create a Fantabulous Password?. WWW, page 1491-1501. ACM / IW3C2, (2020)DLPNet: Dynamic Loss Parameter Network using Reinforcement Learning for Aerial Imagery Detection., and . AIPR, page 191-198. ACM, (2021)Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication., , and . AAAI, page 21976-21985. AAAI Press, (2024)