Author of the publication

Learning from data in the mixed adversarial non-adversarial case: Finding the helpers and ignoring the trolls.

, , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The L-fuzzy vector subspace degrees and its induced convex structure., and . Comput. Appl. Math., 43 (3): 131 (April 2024)Two-stage estimation of inequality-constrained marginal linear models with longitudinal data, and . Journal of Statistical Planning and Inference, 138 (6): 1905--1918 (Jul 1, 2008)Ramp metering based on on-line ADHDP (lambda) controller., , , and . IJCNN, page 1847-1852. IEEE, (2008)Continuous Time Bayesian Network Reasoning and Learning Engine, , , , and . v11, (1137)Cooperative Spectrum Sensing and Communication in Cognitive Radio Networks., , , and . VTC Fall, page 1-5. IEEE, (2010)A Continuous Time Bayesian Network Approach for Intrusion Detection.. University of California, Riverside, USA, (2010)base-search.net (ftcdlib:qt63t9w79s).Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model., , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 42-61. Springer, (2015)ACIK : Association Classifier Based on Itemset Kernel., , , and . IEA/AIE, volume 4570 of Lecture Notes in Computer Science, page 865-875. Springer, (2007)Simultaneous wireless information and power transfer with co-channel interference., , and . PIMRC, page 2125-2129. IEEE, (2014)The UAV image mosaic method based on phase correlation., , , , and . ICCA, page 1387-1392. IEEE, (2014)