Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection in non-stationary data: Ensemble based self-adaptive OCSVM., , , , and . IJCNN, page 2476-2483. IEEE, (2016)Credible vs Fake: A Literature Review on Differentiating Online Reviews based on Credibility., , and . ICIS, Association for Information Systems, (2020)Enhancing the Scalability and Performance of Iterative Graph Algorithms on Apache Storm., , and . IEEE BigData, page 3863-3872. IEEE, (2018)ClusTop: A clustering-based topic modelling algorithm for twitter using word networks., , and . IEEE BigData, page 2009-2018. IEEE Computer Society, (2017)Spatio-temporal Event Detection using Poisson Model and Quad-tree on Geotagged Social Media., , , and . IEEE BigData, page 2247-2256. IEEE, (2019)Privacy-preserving data aggregation in Participatory Sensing Networks., , , and . ISSNIP, page 165-170. IEEE, (2013)Towards Next Generation Touring: Personalized Group Tours., , , and . ICAPS, page 412-420. AAAI Press, (2016)Decentralized multi-dimensional alert correlation for collaborative intrusion detection., , and . J. Netw. Comput. Appl., 32 (5): 1106-1123 (2009)Unsupervised and Active Learning Using Maximin-Based Anomaly Detection., , , and . ECML/PKDD (1), volume 11906 of Lecture Notes in Computer Science, page 90-106. Springer, (2019)Improved Template for Agent Pattern Description., , and . IAT, page 747-750. IEEE Computer Society, (2005)