Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparison of Markov Random Field and Spatial Regression Models for Mining Geospatial Data., , and . JCIS, page 245-250. JCIS / Association for Intelligent Machinery, Inc., (2002)Robust Outlier Detection Using Commute Time and Eigenspace Embedding., and . PAKDD (2), volume 6119 of Lecture Notes in Computer Science, page 422-434. Springer, (2010)An Efficient Adversarial Learning Strategy for Constructing Robust Classification Boundaries., , , , and . Australasian Conference on Artificial Intelligence, volume 7691 of Lecture Notes in Computer Science, page 649-660. Springer, (2012)A Perspective on Prescriptive Learning ADBIS'2021 Keynote.. ADBIS, volume 12843 of Lecture Notes in Computer Science, page 3-6. Springer, (2021)A Scalable Approach for LRT Computation in GPGPU Environments., , , and . APWeb, volume 7808 of Lecture Notes in Computer Science, page 595-608. Springer, (2013)On Mining Anomalous Patterns in Road Traffic Streams., , , and . ADMA (2), volume 7121 of Lecture Notes in Computer Science, page 237-251. Springer, (2011)COP: Planning Conflicts for Faster Parallel Transactional Machine Learning., , , and . EDBT, page 132-143. OpenProceedings.org, (2017)High Confidence Rule Mining for Microarray Analysis., and . IEEE ACM Trans. Comput. Biol. Bioinform., 4 (4): 611-623 (2007)Deep Learning for Anomaly Detection: A Survey, and . (2019)A3T: accuracy aware adversarial training., , , and . Mach. Learn., 112 (9): 3191-3210 (September 2023)