Author of the publication

On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series.

, , , and . SIGMETRICS Perform. Evaluation Rev., 48 (4): 49-52 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DC-VAE, Fine-grained Anomaly Detection in Multivariate Time-Series with Dilated Convolutions and Variational Auto Encoders., , , , , and . EuroS&P Workshops, page 287-293. IEEE, (2022)An a-contrario Biometric Fusion Approach., , , , , and . CVPR Workshops, page 3585-3593. Computer Vision Foundation / IEEE, (2020)Automatic Eyes and Nose Detection Using Curvature Analysis., , and . CIARP, volume 9423 of Lecture Notes in Computer Science, page 271-278. Springer, (2015)Dairy Cattle Sub-clinical Uterine Disease Diagnosis Using Pattern Recognition and Image Processing Techniques., , , , , , and . CIARP, volume 8827 of Lecture Notes in Computer Science, page 690-697. Springer, (2014)NTL Detection: Overview of Classic and DNN-based Approaches on a Labeled Dataset of 311k Customers., , and . ISGT, page 1-5. IEEE, (2021)3D curvature analysis with a novel one-shot technique., , and . ICIP, page 3818-3822. IEEE, (2014)Comparing Different Labeling Strategies in Anomalous Power Consumptions Detection., , and . ICPRAM (Selected Papers), volume 9443 of Lecture Notes in Computer Science, page 196-205. Springer, (2014)Semisupervised Approach to Non Technical Losses Detection., , , , and . CIARP, volume 8827 of Lecture Notes in Computer Science, page 698-705. Springer, (2014)Performance Evaluation of an Automatic Fingerprint Classification Algorithm Adapted to a Vucetich Based Classification System., , and . AVBPA, volume 2091 of Lecture Notes in Computer Science, page 259-265. Springer, (2001)Improving Electric Fraud Detection using Class Imbalance Strategies., , , and . ICPRAM (2), page 135-141. SciTePress, (2012)