Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A smart hill-climbing algorithm for application server configuration., , , , and . WWW, page 287-296. ACM, (2004)Classifier evaluation and attribute selection against active adversaries., , and . Data Min. Knowl. Discov., 22 (1-2): 291-335 (2011)Spatial counts under differential privacy mechanism on changing spatial scales., , and . Computers & Security, (2018)Robust Weighted Regression for Ultrasound Image Super-Resolution., and . ICME Workshops, page 1-6. IEEE Computer Society, (2018)Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy., , , and . DBSec, volume 10359 of Lecture Notes in Computer Science, page 123-141. Springer, (2017)Mixture of gaussian models and bayes error under differential privacy., , and . CODASPY, page 179-190. ACM, (2011)Multifractal and Gaussian fractional sum-difference models for Internet traffic., , and . Perform. Eval., (2017)A survey of game theoretic approach for adversarial machine learning., , and . WIREs Data Mining Knowl. Discov., (2019)Adversarial support vector machine learning., , , and . KDD, page 1059-1067. ACM, (2012)Trellis display for modeling data from designed experiments., , and . Statistical Analysis and Data Mining, 4 (1): 133-145 (2011)