Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Fault Localization Using N-gram Analysis., , , , and . WASA, volume 5258 of Lecture Notes in Computer Science, page 548-559. Springer, (2008)Cloud-based malware detection for evolving data streams., , , , , , and . ACM Trans. Manag. Inf. Syst., 2 (3): 16:1-16:27 (2011)A new intrusion detection system using support vector machines and hierarchical clustering., , and . VLDB J., 16 (4): 507-521 (2007)Detecting Recurring and Novel Classes in Concept-Drifting Data Streams., , , , , , and . ICDM, page 1176-1181. IEEE Computer Society, (2011)Efficient Sampling-Based Kernel Mean Matching., , , and . ICDM, page 811-816. IEEE Computer Society, (2016)Efficient handling of concept drift and concept evolution over Stream Data., , , , and . ICDE, page 481-492. IEEE Computer Society, (2016)Securing Data Analytics on SGX with Randomization., , , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 352-369. Springer, (2017)Estimating Twitter User Location Using Social Interactions-A Content Based Approach., , and . SocialCom/PASSAT, page 838-843. IEEE Computer Society, (2011)Assured Information Sharing Life Cycle., , , , , , , , , and 10 other author(s). ISI, page 307-309. IEEE, (2009)Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping., , , , , and . ISI, page 254-261. IEEE, (2007)