Author of the publication

Anomaly Detection for Categorical Observations Using Latent Gaussian Process.

, , , , and . ICONIP (5), volume 10638 of Lecture Notes in Computer Science, page 285-296. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lv, Fengmao
add a person with the name Lv, Fengmao
 

Other publications of authors with the same name

TarGAN: Generating target data with class labels for unsupervised domain adaptation., , , and . Knowl.-Based Syst., (2019)Long short-term memory on abstract syntax tree for SQL injection detection., , , and . IET Softw., 15 (2): 188-197 (2021)An efficient instance selection algorithm to reconstruct training set for support vector machine., , , , and . Knowl.-Based Syst., (2017)Constructing Self-motivated Pyramid Curriculums for Cross-Domain Semantic Segmentation: A Non-Adversarial Approach., , , and . CoRR, (2019)Convolutional Neural Networks for Text Classification with Multi-size Convolution and Multi-type Pooling., , , , , and . DASFAA Workshops, volume 10829 of Lecture Notes in Computer Science, page 3-12. Springer, (2018)Botnet Detection based on Fuzzy Association Rules., , , , and . ICPR, page 578-584. IEEE Computer Society, (2018)Domain Adaptive Semantic Segmentation Through Structure Enhancement., , , , , and . ECCV Workshops (2), volume 11130 of Lecture Notes in Computer Science, page 172-179. Springer, (2018)Improving Target Discriminability for Unsupervised Domain Adaptation., , , , , and . ICONIP (5), volume 11305 of Lecture Notes in Computer Science, page 287-298. Springer, (2018)The Research on Controlling the Iteration of Quantum-Inspired Evolutionary Algorithms for Artificial Neural Networks., , , and . AAIM, volume 8546 of Lecture Notes in Computer Science, page 253-262. Springer, (2014)Integrating Traffics with Network Device Logs for Anomaly Detection., , , , , , and . Security and Communication Networks, (2019)