Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Peek Into the Hidden Layers of a Convolutional Neural Network Through a Factorization Lens., and . CoRR, (2018)Mining actionable information from security forums: the case of malicious IP addresses., , , , , and . CoRR, (2018)Temporal phenotyping of medically complex children via PARAFAC2 tensor factorization., , , , and . Journal of Biomedical Informatics, (2019)Turbo-SMT: Parallel coupled sparse matrix-Tensor factorizations and applications., , , , , and . Statistical Analysis and Data Mining, 9 (4): 269-290 (2016)Learning Tensor-Based Representations from Brain-Computer Interface Data for Cybersecurity., , , , and . ECML/PKDD (3), volume 11053 of Lecture Notes in Computer Science, page 389-404. Springer, (2018)tHoops: A Multi-Aspect Analytical Framework for Spatio-Temporal Basketball Data., and . CIKM, page 2223-2232. ACM, (2018)Overlap in the Web Search Results of Google and Bing., , and . J. Web Science, 2 (2): 17-30 (2016)Matrix Profile Index Approximation for Streaming Time Series., , , , , , and . IEEE BigData, page 2775-2784. IEEE, (2021)An Empirical Study of Malicious Threads in Security Forums., , , and . WWW (Companion Volume), page 176-182. ACM, (2019)LARC: Learning Activity-Regularized Overlapping Communities Across Time., , , and . KDD, page 1465-1474. ACM, (2018)